Rethinking How To Approach Your Social Networks
(globality.be)
February 2014 Archive
4801.
4802.
Boeing's secure phone
(arstechnica.com)
4803.
4804.
4805.
App-pocalypse Now
(blog.codinghorror.com)
4806.
The Graph of Math
(rjlipton.wordpress.com)
4807.
Apple details Touch ID and the A7′s Secure Enclave
(techcrunch.com)
4808.
4809.
4810.
Reflections on Imagine K12's First Three Years
(imaginek12.com)
4811.
4812.
What is going on with my Apple security update download?
(security.stackexchange.com)
4813.
Boeing Black. A secure phone
(androidcentral.com)
4814.
Who Stole $400 Million From Mt. Gox?
(theverge.com)
4815.
The Vietnam of Computer Science (2006)
(blogs.tedneward.com)
4816.
New Art from 'Calvin and Hobbes' Creator Bill Watterson
(thewire.com)
4817.
Clojure from the ground up: modeling
(aphyr.com)
4818.
What's New for Web Development in IntelliJ IDEA 13
(blog.jetbrains.com)
4819.
New type of DDoS? Authoritative Name Server attack
(dnsamplificationattacks.blogspot.nl)
4820.
Obama's Trauma Team
(content.time.com)
4821.
4822.
Accelerated Life Cycle Testing and the Myo Armband
(thalmic.com)
4823.
What is the most egregious Xbox achievement of all time?
(redbull.com)
4824.
CloudFlare Publishes Transparency Report for 2013
(blog.cloudflare.com)
4825.
4826.
Dawn of Autonomous Corporations Powered by Bitcoin
(btcgeek.com)
4827.
Dawn of Autonomous Corporations
(btcgeek.com)
4828.
4829.
4830.
Obama's Trauma Team: Inside the Nightmare Launch of HealthCare.Gov
(content.time.com)