Oracle Responds to Java Security Flaws with 50 Fixes
(esecurityplanet.com)
February 2013 Archive
8641.
8642.
8643.
A nice desk for hackers
(geekdesk.com)
8644.
8645.
8646.
Twitter hacked
(edition.cnn.com)
8647.
C9 Lectures: Erik Meijer - Functional Programming Fundamentals | Channel 9
(channel9.msdn.com)
8648.
Google give up and sets up £52m fund to settle French publishing row
(guardian.co.uk)
8649.
Dependency Injection – Building loosely coupled components
(refactortheworld.wordpress.com)
8650.
Science cafes offer a sip of learning
(newsdaily.com)
8651.
Verge and Huffington Post attempt impossible: smarter comments
(pandodaily.com)
8652.
The Big Money Behind Hit Game Minecraft
(blogs.wsj.com)
8653.
Programmer to be homeless
(google.com)
8654.
Mapping the living cell
(web.mit.edu)
8655.
Modbus controller for .net applications
(modb.us)
8656.
Robot Arena: inspires curiosity in children and creativity in adults
(muroran-it.ac.jp)
8657.
8658.
Coping With the Pain of Souring Apple Shares
(online.wsj.com)
8659.
Iranian Stealth Fighter "Qaher 313" (for midgets)
(pprune.org)
8660.
Worst performances of stocks/bonds/bills over 1,5,10,20,30 year timeframes
(blog.streeteye.com)
8661.
8663.
Making Web Sites Completely Addictive
(nytimes.com)
8664.
F.T.C. Suggests Guidelines on Privacy for Mobile Apps
(nytimes.com)
8665.
20 Must See TED Talks for Computer Scientists
(youtube.com)
8666.
The Motivation Story of Apple and Toshiba
(worldofskunkworks.blogspot.se)
8668.
The Origins of ‘Big Data’: An Etymological Detective Story
(bits.blogs.nytimes.com)
8669.
Genome can reveal surname
(jpost.com)
8670.
Exploiting Loopholes in CAP
(infoq.com)