May 2009 Archive
4231.
Largest field experiment in history devoted to studying tornadoes (cnn.com)
4232.
DIY festival (makerfaire.com)
4233.
Secret Memoir Offers Look Inside China’s Political Elite on Eve of Tiananmen (nytimes.com)
4234.
Security Checks Reaching Towards Your Brain (singularityhub.com)
4235.
Google Gets Its Own Fail Whale (techcrunch.com)
4236.
The Reasons Behind Google and IBM Being Ahead of the Competition (time.com)
4237.
Clang Checker: Making your development and debugging life easier (blog.ablepear.com)
4238.
Tour Asia With GeeksOnAPlane, Get To Know Half The World’s Internet Users (techcrunch.com)
4239.
Steve Jobs to miss Apple WWDC keynote (telegraph.co.uk)
4240.
Nocture - OS X app for nighttime hackers (docs.blacktree.com)
4241.
Using the memcached binary protocol for building a realtime search engine (lshift.net)
4242.
Google Outage Visualized (wired.com)
4243.
Coding style: Helpers that return params (37signals.com)
4244.
Does RoR have too many testing frameworks? (gilesbowkett.blogspot.com)
4245.
The Recipe for a Web 2.0 Homepage (scribnia.com)
4246.
Class-Action Suit Against Google Cites Trademarks as Search Terms (nytimes.com)
4247.
The rebirth of the news business: Tossed by a gale (economist.com)
4248.
Bash tips for power users (tuxradar.com)
4249.
SEO Dreck (whattofix.com)
4250.
Walkenfs: a distributed filesystem using FUSE and Mnesia (code.google.com)
4251.
Sun "Career Stimulus Package" - Solaris/Java/JavaFX training material (learning.sun.com)
4252.
IPhone and Seaside (lukas-renggli.ch)
4253.
Beyond the Glory - The Mark Cuban Story [video] (youtube.com)
4254.
Lawyer in Pirate Bay case facing real-life 'DDo$' hack (news.cnet.com)
4255.
The Physics of Startups (ecorner.stanford.edu)
4256.
Facebook’s Revenue Per Employee Is Comparable To eBay (allfacebook.com)
4257.
DevCentral Weekly Roundup Episode 86 – The Countdown (devcentral.f5.com)
4258.
An idea for enforcing the golden rule on the internet via "empathy views". ()
4259.
_why's classic content_for post, still applies today (errtheblog.com)
4260.
A Blueprint to Stop Browser Attacks (technologyreview.com)