2015 Archive
14161.
My experience as a business consultant in Dubai (2010)
(tech.mit.edu)
14162.
FireEye Exploitation: Project Zero’s Vulnerability of the Beast
(googleprojectzero.blogspot.com)
14163.
John Oliver's Interview of Edward Snowden
(youtube.com)
14164.
Contributing to OpenBSD
(homing-on-code.blogspot.com)
14165.
Show HN: Dependency-based prioritization makes HTTP/2 much faster than SPDY
(blog.kazuhooku.com)
14166.
A technical comparison of open source drone autopilots (2012)
(online.qmags.com)
14167.
Zenefits CEO publicly rescinds an offer on Quora
(quora.com)
14168.
14169.
Unix System V Release 1 Programming Guide (1983) [pdf]
(bitsavers.trailing-edge.com)
14170.
IntermezzOS: a teaching operating system for experienced developers
(intermezzos.github.io)
14171.
Quantum Computing Playground
(qcplayground.withgoogle.com)
14172.
Gunther, Christine and Otto (2014)
(bbc.co.uk)
14173.
Newer TCP implementations
(intronetworks.cs.luc.edu)
14174.
Scaling lessons from the CEO of Zenefits
(medium.com)
14175.
Medical Emergencies In Space (1998)
(chapters.marssociety.org)
14176.
AutoConnect: Computational Design of 3D-Printable Connectors
(disneyresearch.com)
14177.
A Jellyfish-Obsessed Engineer Upended Our Understanding of Swimming
(theatlantic.com)
14178.
De-listing of Chilling Effects Home Page from Google Caused by Mistake
(chillingeffects.org)
14179.
Augmenting Human Intellect (1962)
(web.stanford.edu)
14180.
14181.
Personal data of Dutch telecom providers poorly protected
(sijmen.ruwhof.net)
14182.
Unix on a PDP-11 emulator on the Game Boy Advance (2004)
(kernelthread.com)
14183.
14184.
14185.
The diary of Stalin's man in Churchill's London
(bostonglobe.com)
14186.
Timeout: Ruby's Most Dangerous API
(mikeperham.com)
14187.
The Magic Thread
(blog.geoffralston.com)
14188.
A Commemoration for Rachel Bryk
(dolphin-emu.org)
14189.
Building a dataflow graph with Python
(mattkeeter.com)
14190.