February 2010 Archive
3721.
Track Mouse Activity On Your Computer (flowingdata.com)
3722.
Programming by Sketching (youtube.com)
3723.
Ask: Grails Hosting? ()
3724.
Early Quora Design Notes (artypapers.com)
3725.
An online tool to test how much info your email/webmail client exposes about you (secure.grepular.com)
3726.
Inching toward a virtual new Detroit at $1 a square (freep.com)
3727.
The Quiet Energy Revolution (american.com)
3728.
Outfielders use an optical technique, not trajectories, to catch fly balls (journalofvision.org)
3729.
Less Code is More (codelord.net)
3730.
TEDTalks in a spreadsheet (spreadsheets.google.com)
3731.
Finally: How to leverage social media, right now (go.DanielOdio.com)
3732.
You Bought It, You Own It: Vernor v. Autodesk (eff.org)
3733.
5 Fresh and Extreme Useful Fonts for Logos (woorkup.com)
3734.
Visualizing the Cosmic All (foresight.org)
3735.
Seth Godin on What it Takes to be a Linchpin [INTERVIEW] (mashable.com)
3736.
Top Sources Of Funding For Start-ups (forbes.com)
3737.
Beautiful Motion Graphics Created With Programming (smashingmagazine.com)
3738.
Django Advent, Day 6: Object Permissions (Florian Apolloner) (djangoadvent.com)
3739.
A factor of a thousand: five general-interest notes on hardware performance (itworld.com)
3740.
Facebook directs more online users than Google (sfgate.com)
3741.
Algebraic statistics for random graph models: Markov bases and their uses (videolectures.net)
3742.
The Client Is Not Always Right (merttol.com)
3743.
Timing a China Bubble Collapse: Currency Revaluation Higher Imminently (blindreason.org)
3744.
Google Buzz Has Completely Changed the Game: Here’s How (mashable.com)
3745.
Markets don't reward smart people. They reward value. (reason.com)
3746.
Coder on the cross (salon.com)
3747.
What makes Apple's App Store tick? (results to a previous HN survey) (iseff.com)
3748.
LA Ruby Conference: Luigi Montanez on Civic Hacking (thebitsource.com)
3749.
Statistics for Programmers (part 3) (lovehateubuntu.blogspot.com)
3750.
Microsoft’s Many Eyeballs and the Security Development Lifecycle (blogs.msdn.com)