September 2013 Archive
3811.
A pretty test runner for Go ()
3812.
Think Distributed Podcast - Episode 2: Causality (thinkdistributed.io)
3813.
Interview With The Founders Of Hubski (urbantimes.co)
3814.
Android Dessert History (android.com)
3815.
Clojure Language Fundamentals Overview (braveclojure.com)
3816.
Is mathematics an effective way to describe the world? (phys.org)
3817.
Why Concatenative Programming Matters (evincarofautumn.blogspot.com)
3818.
Amazon’s AWS Command Line Tool Hits General Availability (techcrunch.com)
3819.
The Angular Way (flippinawesome.org)
3820.
Scientists show how antibiotics enable pathogenic gut infections (med.stanford.edu)
3821.
Board Game Designed By A Googler To Teach Kids Core Coding Principles (techcrunch.com)
3822.
Fun With Just-In-Time Compiling: Julia, Python, R and pqR (randyzwitch.com)
3823.
Windows 9 concept (eiskis.net)
3824.
The Ghost of Bitcoin (polygon.com)
3825.
JanRain OpenID - EOL ()
3826.
English is a Dialect of Germanic (or, Cantonese is not just a Dialect) (languagelog.ldc.upenn.edu)
3827.
Twitter Open Sources Streaming MapReduce Framework (gigaom.com)
3828.
Ars does Soylent, the finale (arstechnica.com)
3829.
Amazon hiring 'top secret' IT staff as it fights for CIA work (computerworld.com)
3830.
“World’s most secure smartphone” looks like snake oil (arstechnica.com)
3831.
Beez, a WebRTC Audio Synthesizer using smartphones as effect controllers (greweb.me)
3832.
Using smartphones in P2P (WebRTC) as collaborative Synth effect controllers (beez.greweb.fr)
3833.
Programming for the Expression of Ideas - Gerald Jay Sussman -- Lambda Jam 2013 (infoq.com)
3834.
Chip-Equipped Ball Heralds New 'Money Ball' Era (internetevolution.com)
3835.
Oyster Launches Netflix For Books (forbes.com)
3836.
Parse Developer Day Conference launches five new products (blog.parse.com)
3837.
How I grew my business by understanding Metcalfe’s Law and fragmentation (torrenegra.com)
3838.
Classifying News Articles with Clojure (jackdschultz.com)
3839.
SVG and tag tricks (lynn.ru)
3840.
NSA inserted backdoors into commercial encryption software (theguardian.com)