February 2015 Archive
3781.
3782.
How do security issues happen?
(reactos.org)
3783.
Reusability Revival
(thespacereview.com)
3784.
Ejabberd 15.02 has been released
(blog.process-one.net)
3785.
Under the hood of I2P, the Tor alternative that reloaded Silk Road
(arstechnica.com)
3786.
3787.
Spherical Textures
(vterrain.org)
3789.
Model of a zombie outbreak in Sweden, Norway and Finland (Denmark is fine)
(maxberggren.github.io)
3790.
The Case for Flux
(medium.com)
3791.
The Perils of Implementing Functor in Java
(jnape.com)
3792.
Destroyed by the Espionage Act
(firstlook.org)
3793.
3794.
3795.
Google open sources a MapReduce framework for C/C++
(google-opensource.blogspot.com)
3796.
Some notes on SuperFish
(blog.erratasec.com)
3797.
3798.
Financial Event Study Conducted in iPython Notebook
(quantopian.com)
3799.
The Boys Who Loved Birds: After the Iron Curtain
(thebigroundtable.com)
3800.
Thoughts on Hustling: Why Some Founders Win and Others Don't
(blog.onevest.com)
3801.
3802.
3803.
3804.
Lenovo officially apologizes on Twitter
(twitter.com)
3805.
3806.
Language change: slowly does it
(economist.com)
3807.
Microsoft CEO Satya Nadella Looks to a Future Beyond Windows
(bloomberg.com)
3808.
Node.js fork JXcore goes open source, aims for mobile developers
(infoworld.com)
3809.
Darkness Visible (1989)
(vanityfair.com)
3810.