February 2013 Archive
8641.
Oracle Responds to Java Security Flaws with 50 Fixes (esecurityplanet.com)
8642.
Startup delivers personalized content tailored to patient’s disease stage (medcitynews.com)
8643.
A nice desk for hackers (geekdesk.com)
8644.
The MEGA Vulnerability Reward Program - Up to 10,000 EURO Per Vulnerability (mega.co.nz)
8645.
Is Streaming Music a Viable Model in the Arab World? (wamda.com)
8646.
Twitter hacked (edition.cnn.com)
8647.
C9 Lectures: Erik Meijer - Functional Programming Fundamentals | Channel 9 (channel9.msdn.com)
8648.
Google give up and sets up £52m fund to settle French publishing row (guardian.co.uk)
8649.
Dependency Injection – Building loosely coupled components (refactortheworld.wordpress.com)
8650.
Science cafes offer a sip of learning (newsdaily.com)
8651.
Verge and Huffington Post attempt impossible: smarter comments (pandodaily.com)
8652.
The Big Money Behind Hit Game Minecraft (blogs.wsj.com)
8653.
Programmer to be homeless (google.com)
8654.
Mapping the living cell (web.mit.edu)
8655.
Modbus controller for .net applications (modb.us)
8656.
Robot Arena: inspires curiosity in children and creativity in adults (muroran-it.ac.jp)
8657.
How number of threads affects application performance (plumbr.eu)
8658.
Coping With the Pain of Souring Apple Shares (online.wsj.com)
8659.
Iranian Stealth Fighter "Qaher 313" (for midgets) (pprune.org)
8660.
Worst performances of stocks/bonds/bills over 1,5,10,20,30 year timeframes (blog.streeteye.com)
8661.
How did Instagram build up its community in its early days? (quora.com)
8662.
Sought: Backend developer co-founder amsterdam ()
8663.
Making Web Sites Completely Addictive (nytimes.com)
8664.
F.T.C. Suggests Guidelines on Privacy for Mobile Apps (nytimes.com)
8665.
20 Must See TED Talks for Computer Scientists (youtube.com)
8666.
The Motivation Story of Apple and Toshiba (worldofskunkworks.blogspot.se)
8667.
IPhone Plus Could Steal A Winning Play From The iPad Mini's Playbook, In Reverse (forbes.com)
8668.
The Origins of ‘Big Data’: An Etymological Detective Story (bits.blogs.nytimes.com)
8669.
Genome can reveal surname (jpost.com)
8670.
Exploiting Loopholes in CAP (infoq.com)