Pull to Refresh effect using Hook.js
(dzyngiri.com)
February 2013 Archive
21481.
21482.
Cyber, Identity, and Information Assurance Strategy (2009) [pdf]
(dodcio.defense.gov)
21483.
Product Management Report: Salary/Role/etc
(productfocus.com)
21484.
Foregn hackers steal more than 1TB every day
(theverge.com)
21486.
Survey finds gap in Internet access between rich, poor students
(washingtonpost.com)
21487.
Three Lessons I Learned from a Hackathon
(geoffreylitt.com)
21488.
21489.
Beta software for managing literature research notes
(litblitz.net)
21490.
21491.
Cyberattack leaves natural gas pipelines vulnerable to sabotage
(csmonitor.com)
21492.
'Wet' computer server could cut Internet waste
(leeds.ac.uk)
21493.
Managing Proxy Authentication and Exclusion List with CNTLM
(codingepiphany.com)
21494.
Draft: version control and collaboration for writers
(draftin.com)
21495.
Cooperative group game ideas
(jillkuzma.wordpress.com)
21496.
The future of the Internet is quantum.
(humansinvent.com)
21497.
Top Unity Plugins to Increase your Mobile Game Revenue
(blog.soom.la)
21498.
Bill Gates and Michael Bloomberg: Our Plan to Eradicate Polio
(online.wsj.com)
21499.
Hustling Mobile World Congress when you’re a startup
(siimteller.com)
21500.
Why a B2B mobile strategy increases customer loyalty and retention
(hub.productworld.com)
21501.
21502.
JUnitBenchmarks: Code benchmarking in JUnit4
(labs.carrotsearch.com)
21503.
The New Face of IP Scanning
(securityskeptic.typepad.com)
21504.
New web app-centric time-series database for sensors, server metrics.
(mikestirling.co.uk)
21505.
What’s going on in laptop land?
(blog.thestateofme.com)
21506.
21507.
21508.
21509.
21510.
The journal Nature buys into open access publisher
(blogs.nature.com)