September 2011 Archive
6631.
Our Licensing Deal with Samsung: How IP Drives Innovation and Collaboration (blogs.technet.com)
6632.
Amazon Silk FAQ (amazon.com)
6633.
Microsoft employees walk out during ballmer speech- The Inquirer (theinquirer.net)
6634.
DEAL OF THE CENTURY: US Navy Giveaway- The James Bond Stealth Ship for Free! (dailymail.co.uk)
6635.
Introducing the Humble Frozen Synapse bundle (blog.wolfire.com)
6636.
Show HN: we're launching today: every single photo you've ever taken (techcrunch.com)
6637.
Samsung, Microsoft Patent Sharing Deal Strikes a Blow to Google (online.wsj.com)
6638.
Mobile Devs: Objective-C Cheat Sheet (raywenderlich.com)
6639.
Wikipedia Co-Founder Jimmy Wales Describes The Site's Hold-Out On Social Media (huffingtonpost.com)
6640.
Tablets: Ultimate Buying Machines (online.wsj.com)
6641.
South Korean Army of Government Informers: Busybodies with Cameras (nytimes.com)
6642.
It's Extortation (techcrunch.com)
6643.
Amazon Kindle extinguishes the fire of learning (defectivebydesign.org)
6644.
23andMe Exome Sequencing Pilot (23andme.com)
6645.
Atul Gawande Thinks You’re Not As Good As You Think You Are (calnewport.com)
6646.
(Real) Modern Ruby Development (blog.steveklabnik.com)
6647.
Bug Discovered in Firefox 7, Mozilla Paused Update (browserfame.com)
6648.
JQuery 1.7 Beta Release Preview & Walkthrough (addyosmani.com)
6649.
Editorial: How Amazon picked Android’s lock (thisismynext.com)
6650.
HP is Touching Your Car (startupcirclejerk.com)
6651.
Intimacy and Performance on Facebook (blog.byjoemoon.com)
6652.
Ask HN: Does anyone need a website built? ()
6653.
Better Bit Mixing - Improving on MurmurHash3's 64-bit Finalizer (zimbry.blogspot.com)
6654.
On Perl and backward compatibilities (bulknews.typepad.com)
6655.
50% of an ETL framework in 50 lines of code (arbor.posterous.com)
6656.
Where to Start? (dillongilmore.blogspot.com)
6657.
Kindle Fire to burn Android Tablet Margins (i4u.com)
6658.
Grok Competitive Analysis (michaelarsenault.com)
6659.
'Big Data' Means Business Needs Mathematicians (technologyreview.com)
6660.
Top Techniques Used By Cyber Attackers (securityweek.com)