June 2012 Archive
1621.
Ninja Object Properties in JavaScript (patrick-wied.at)
1622.
What Windows 8 Haters Don’t Understand About Windows 8 (7tutorials.com)
1623.
Parody Critiques Popular Khan Academy Videos (chronicle.com)
1624.
HBO Says No, for Now, to Fans Who Want a Web-Only Option (mediadecoder.blogs.nytimes.com)
1625.
Intel dismisses ‘x86 tax’, sees no future for ARM or any of its competitors (extremetech.com)
1626.
3D Printing: The Game Changer (individual.troweprice.com)
1627.
Call PostgreSQL functions via HTTP JSON-RPC (joelonsql.com)
1628.
A $149 ARM laptop that looks like a MacBook Air (and runs Android) (engadget.com)
1629.
Ask HN - How do Quora, Reddit and SO monetize? ()
1630.
Changing Your LinkedIn Password Still May Not Have Kept Your Account Safe (mobileideafactory.com)
1631.
Ask HN: How can I learn "advanced" data modelling for Rails?
1632.
What If My Kid…? (A Guide To Odds) (rationalconspiracy.com)
1633.
Ask HN: AngularJS vs Backbone vs Ember? ()
1634.
Ask HN: possible to get paid $300/hour as a programmer? ()
1635.
Why is the quality of life in SF relatively low? ()
1636.
Judging an App by its Cover - Techniques for Creating & Testing a Pro App Icon (jayfuerstenberg.com)
1637.
Apple's Minimum Viable Product (andrewchen.co)
1638.
Show HN: Bugsnag - Exception tracking app with open source plugins (bugsnag.com)
1639.
Netflix is down (Netflix.com)
1640.
I want to join a Startup Chile team, help me get this noticed (supcofounder.com)
1641.
Silicon Valley Bank Launches In London To Bridge The Tech Funding Gap (techcrunch.com)
1642.
Square Introduces a Digital Loyalty Card (bits.blogs.nytimes.com)
1643.
How to beta test your mobile apps (blog.appstark.com)
1644.
Wising Up to Facebook (nytimes.com)
1645.
Free Music Revolution (sublvl.com)
1646.
An Open Letter to Zee Kane and TNW Regarding Proper Attribution ()
1647.
How One Hour of Action Can Give You 150 Hours of Satisfaction (thomaslarock.com)
1648.
Experimental support for ECMAScript 6 Map and Set objects in Firefox 13 (mozilla.org)
1649.
How to program like an explorer (with Pry). (cirw.in)
1650.
Privilege Escalation/VM-to-Host Vulnerability on Intel 64 bit CPUs (kb.cert.org)