February 2016 Archive
30931.
30932.
Building relationships with other programmers – Interview with Amanuel Bogale
(youngnprogramming.com)
30933.
Bill Maris Interview
(techcrunch.com)
30934.
30935.
Steal the Look ||Eddie Redmayne||
(apoloformen.com)
30936.
The innovators: Skeleton car that is driving open-source design
(theguardian.com)
30937.
How Creativity Can Kill a Good Website Design
(rafaltomal.com)
30938.
30939.
Docker and wordpress for a better world
(gianarb.it)
30940.
Add Barcode Scanning Functionality to Your Ionic 2 App
(blog.nraboy.com)
30941.
30942.
You Are Not Your Code (2012)
(sstephenson.us)
30943.
Biggest Hack Ever
(howtoendworldwidechaos.blogspot.com)
30944.
30945.
Gogo reveals plans to upgrade its satellite modems
(venturebeat.com)
30946.
Ruby Developers on Slack – Join
(rubydevelopers.typeform.com)
30947.
Named functions in Elixir
(functionalcoder.com)
30948.
30949.
Scema New #NodeJs
(wapmild.n.nu)
30950.
HPE Cyber Risk Report 2016: Top 5 Highlights
(techbeacon.com)
30951.
30952.
Alpine vs. Debain vs Ubuntu docker images comparision
(chillbyte.com)
30953.
Stop throwing bricks at the drowning person
(medium.com)
30954.
How to use animation to improve user experience (UX)
(techbeacon.com)
30955.
Magic Quadrant for Test Automation: How Gartner Got It Wrong
(techbeacon.com)
30956.
Measuring Consciousness in the Lab
(fqxi.org)
30957.
5 mobile threat modeling mistakes and how to avoid
(techbeacon.com)
30958.
30959.
Retefe Banking Trojan
(countuponsecurity.com)
30960.
Apple's congressional testimony: ‘Dangerous precedent’ would weaken all iPhones
(washingtonpost.com)