March 2011 Archive
1531.
Show HN: Tinfoil Security -- Security For Startups. Launching soon (tinfoilsecurity.com)
1532.
Clojure: if-let and when-let (blog.jayfields.com)
1533.
Connect.Me : from Hoax to 20k users in a few hours (equalsdrummond.name)
1534.
Search Your Cloud From Your Browser: Greplin (YC S10) Adds a Chrome Extension (techcrunch.com)
1535.
George Hotz (GeoHot) Runs Away to South America; Lies About Having PSN Account (vghq.net)
1536.
Call to Action Buttons - Examples and Best Practices (smashingmagazine.com)
1537.
My notes and complete solutions to "Discrete Mathematics using a Computer" (kanak.kshetri.com)
1538.
Common Lisp Music (ccrma.stanford.edu)
1539.
Boost Interval Container Library (boost.org)
1540.
Brian Kernighan is trying to write a new book (dailyprincetonian.com)
1541.
Code turbulence - What you can learn graphing churn vs complexity (programmingtour.blogspot.com)
1542.
Moki.tv (YC W11) is shaping the media graph. (thenextweb.com)
1543.
What programming languages do people hate most? (quora.com)
1544.
Revisiting the Home Theater PC (codinghorror.com)
1545.
Myhrvold: $700M in licensing revenue in 2010, $2B to date (techflash.com)
1546.
As a VC, how is a $41 million investment in Color justified? (quora.com)
1547.
Unusual Ways to Live Forever (jamesaltucher.com)
1548.
O2 installs 18+ filter on the mobile web (wired.co.uk)
1549.
The Future of the Tablet, and It Isn’t the iPad 2 (fastcompany.com)
1550.
Indian entrepreneurs in US stuck with temporary, non-immigrant work visas (economictimes.indiatimes.com)
1551.
Echelon (signals intelligence) (en.wikipedia.org)
1552.
Chernobyl survivor's message for Japan: Run (aolnews.com)
1553.
Analysis of the Comodo hacker's manifesto (erratasec.blogspot.com)
1554.
Talk on making an impact by Seth Godin at Business of Software last year (businessofsoftware.org)
1555.
Cats Adore, Manipulate Women (news.discovery.com)
1556.
Xfs is still faster but ext4 is catching up on large file creation (tytso.livejournal.com)
1557.
How to Get to Genius (jamesthornton.com)
1558.
Comodo attack appears to have originated from Iran (comodo.com)
1559.
Convert Ruby 1.8 to 1.9.2 (github.com)
1560.
What Makes Entrepreneurs Entrepreneurial? (scribd.com)