February 2015 Archive
5281.
Do, by IFTTT (ifttt.com)
5282.
Grunt task for automatically updating NPM modules and tests to catch regressions (npmjs.com)
5283.
Why Can't the Public See FCC's Proposed Internet Regulations? (weeklystandard.com)
5284.
Five things I wish I knew before starting in Customer Experience (blog.natero.com)
5285.
Comcast: Data caps are “mandated by law” (arstechnica.com)
5286.
Distributed GPU password cracker for pentesters and network auditors (hashcrack.org)
5287.
Free Software (fsf.org)
5288.
Smart Contracts, More Disruptive Than Bitcoin (motherboard.vice.com)
5289.
Apple launches repair program for longstanding 2011 MacBook Pro GPU problems (arstechnica.com)
5290.
Russian Researchers Uncover Sophisticated NSA Malware (mnch.tk)
5291.
Gophercon live blogging (sourcegraph.com)
5292.
How to be a 'bad girl' in India (bbc.com)
5293.
Christ the Redeemer mapped by drone (theverge.com)
5294.
Seastar: an open-source C++ framework for high performance on modern hardware (seastar-project.org)
5295.
Embedded Rust Right Now (spin.atomicobject.com)
5296.
Sandwich Video Said No, We Decided to Make Our Own Startup Explainer Video (blog.angelbacker.co)
5297.
Lenovo Under Sustained Man in Middle Management Attack (bitbanter.com)
5298.
Show HN: Ko-calendar – A datetime picker built with knockout.js (github.com)
5299.
This Stunning Time Lapse Video of Dubai Will Leave You Speechless (nextshark.com)
5300.
Taming Your Go Dependencies (digitalocean.com)
5301.
Experimenting with Honeypots Using the Modern Honey Network (zeltser.com)
5302.
ForerunnerDB.js (forerunnerdb.com)
5303.
Airborne (stewd.io)
5304.
Free Email Course “The Basics of Growth Hacking and User Acquisition” (gohighbrow.com)
5305.
Learn Lua in One Hour (youtube.com)
5306.
React.js, Flux, Om: I am trying to think it through (blog.elsdoerfer.name)
5307.
The death of Austin Ventures (fortune.com)
5308.
How Much Longer Before Companies Start to Run Themselves? (io9.com)
5309.
Show HN: Websockets proxy server written in haskell (github.com)
5310.
NSA Hacked Sim Card Database, Stole Encryption Keys (cyberkendra.com)