How Tor Works: Part 1
(jordan-wright.com)
May 2015 Archive
6751.
6752.
6753.
The end for Mandriva
(lwn.net)
6754.
Oculus Acquires Surreal Vision to Bring the Real World to VR
(techcrunch.com)
6755.
I think I may be done …
(skitterman.wordpress.com)
6756.
Meteor, SQL and other databases
(compose.io)
6757.
Watch Out: The Consumer Credit Tsunami from India
(statspotting.com)
6758.
Solitude and Sandaya: The History of Pianos in Burma (2013)
(theappendix.net)
6759.
Google – Introduction to Material design
(google.com)
6760.
6761.
Why JetBrains needs Kotlin (2011)
(blog.jetbrains.com)
6762.
Core algorithms deployed
(cstheory.stackexchange.com)
6764.
6765.
Computability – Philip Wadler [video]
(youtube.com)
6766.
Safe Haskell
(begriffs.com)
6767.
Correctly Hashing Passwords with PHP
(codular.com)
6768.
This is not the UEFI backdoor you are looking for
(mjg59.dreamwidth.org)
6769.
Securing a Restful JSON API with JWT Authentication in GO
(blog.brainattica.com)
6770.
Down-to-earth tech tips for real businesses
(hubblehq.com)
6771.
IBM Watson TED application demo
(youtube.com)
6773.
6774.
British navigation tech “eLoran” is under examination
(securityaffairs.co)
6775.
Tips for Scaling Web Apps
(alexgaynor.net)
6776.
‘Thought vectors’ could revolutionize artificial intelligence
(extremetech.com)
6777.
6778.
Holy Crop
(medium.com)
6779.
6780.
Traits of Exceptional Engineers
(blog.intercom.io)