Google Cyberattack Linked To Two Chinese Schools
(informationweek.com)
February 2010 Archive
2911.
2912.
Background behind the Joe Stack Suicide Note
(noslaves.com)
2913.
Mathematics of Hollywood blockbusters
(newscientist.com)
2914.
The New App Store Rules: No Swimsuits, No Skin, And No Innuendo
(techcrunch.com)
2915.
Showing the world that facilitated communication is bogus
(scienceblogs.com)
2916.
How to build a web service in 8 hours
(softwaresweden.com)
2917.
Quality inference code for MTurk
(qmturk.appspot.com)
2918.
4 Simple Principles of Getting to Completion
(zenhabits.net)
2919.
2920.
Measuring Tweets
(blog.twitter.com)
2921.
A cache conscious hash table that outperforms java.util.hashmap
(stochasticgeometry.ie)
2922.
Mint founder on branding: Keep it simple
(news.cnet.com)
2923.
2924.
Customer Development Checklist for My Web Startup – Part 2
(ashmaurya.com)
2925.
Drizzle, Licensing, Having Honest Conversations with your Community
(krow.livejournal.com)
2926.
The Broken Window Fallacy
(mises.org)
2927.
EU Opens Antitrust Investigation Into Google.
(techcrunch.com)
2928.
Compressed Sensing fills in the blanks
(wired.com)
2929.
GoDaddy CSO explains security concerns
(blog.sucuri.net)
2930.
2 Ways to Sync Google Buzz with Twitter
(readwriteweb.com)
2931.
2932.
Classification of HTTP APIs
(nordsc.com)
2933.
Ibis Reader: Cross-platform HTML5 ebook reader
(ibisreader.com)
2934.
XING.com is hiring developers via Firebug console
(twitpic.com)
2935.
2936.
2937.
Django Pony: A Retrospective
(djangoadvent.com)
2938.
Example Clojure Webapp In A Gist
(gist.github.com)
2939.
Secure URL Redirects using Apache, ModRewrite and ModSecurity
(secure.grepular.com)
2940.
Starting JägerMonkey (method-at-a-time JIT for SpiderMonkey)
(blog.mozilla.com)