September 2015 Archive
5971.
Here's how the new iPhone 6S and 6S Plus compare to the top Android phones (theverge.com)
5972.
OptiKey: free and open-source alternative eye tracking for sufferers of ALS/MND (github.com)
5973.
Manage Python Script Options (blog.endpoint.com)
5974.
PresentationDomainDataLayering (martinfowler.com)
5975.
Brief Thoughts and Observations Regarding Today’s ‘Hey Siri’ Apple Event (daringfireball.net)
5976.
GM Took 5 Years to Fix a Full-Takeover Hack (wired.com)
5977.
TCP Over IP Anycast – Pipe Dream or Reality? (engineering.linkedin.com)
5978.
5 open source alternatives to Gmail (opensource.com)
5979.
JuliaCon 2015 Videos (youtube.com)
5980.
Hadoop co-founder Mike Cafarella: “the Pete Best of big data” (radar.oreilly.com)
5981.
Jonyjive (jonyjive.com)
5982.
FireEye sought to conceal that it ran compromised servers (thestack.com)
5983.
Great Roundup of Sleep Hackers (vanwinkles.com)
5984.
The Siege of Herbalife (fortune.com)
5985.
Don't Build That Killer App JUST Yet (medium.com)
5986.
Blue Cross Hacked, again (legallevity.com)
5987.
Microsoft is downloading Windows 10 to your machine 'just in case' (theinquirer.net)
5988.
Testing Requirements for Android Marshmallow and iOS 9 (testdroid.com)
5989.
The Next to Die (themarshallproject.org)
5990.
Suicide Prevention Day: How Data Science+Crisis Text Line Are Helping Save Teens (blog.pivotal.io)
5991.
Guided Genetic Algorithm: A New Template Concept (sciencedirect.com)
5992.
Morphological computation: The hidden superpower of soft-bodied robots (robohub.org)
5993.
Build software of any size, quickly and reliably, just as engineers do at Google (bazel.io)
5994.
Meet OptiKey - Free & Open-source Eye tracking Software (reddit.com)
5995.
Docker and Logging (linux.com)
5996.
Run Linux on Mac OS Yosemite from the Command Line (github.com)
5997.
Deep learning at Microsoft (GTC2015) (on-demand.gputechconf.com)
5998.
Bitbucket now supports two-factor authentication (blog.bitbucket.org)
5999.
A TV Is Just a Large Screen on a Wall (medium.com)
6000.
The Next Wave of Cyberattacks Won’t Steal Data – They’ll Change It (defenseone.com)