December 2015 Archive
10861.
Stalking the Wild Madras Wearers of the Ivy League (newyorker.com)
10862.
Opec bid to kill off US shale sends oil price down to near seven-year low (theguardian.com)
10863.
Liquid Sky: collaborative cloud cost communication for software teams and DevOps (liquidsky.singtel-labs.com)
10864.
The cumulonimbus cloud of creative destruction (vitochin.com)
10865.
Politics, murdered by the Internet (medium.com)
10866.
Why Twitter Broke for Me. And a Few Easy Ways to Fix It (medium.com)
10867.
Microsoft to open source Chakra, the JavaScript heart of its Edge browser (arstechnica.com)
10868.
Ask HN: Best RSS (Mostly US) News Feeds
10869.
What I've Learned After a Year of Prioritizing My Health (danielodio.com)
10870.
On the awesomeness of ocaml-bitstring (rwmj.wordpress.com)
10871.
Deploying a Go App to Cloud Foundry Using Visual Studio Code (seroter.wordpress.com)
10872.
Bloomberg's Best Photos of 2015 (bloomberg.com)
10873.
How to Store SSH Passphrases in LastPass (koszek.com)
10874.
Rube Goldberg Startups (whilewest.com)
10875.
Mortgages, Gasoline and Bankruptcy (bloombergview.com)
10876.
Thank you for using Carousel (blogs.dropbox.com)
10877.
Join Us as We Dive 70 Feet Underwater and See NSA-Tapped Cables (news.artnet.com)
10878.
Show HN: Flare – Reactive web interfaces in PureScript (david-peter.de)
10879.
Back from the Brink: Akatsuki Returns to Venus (planetary.org)
10880.
Tech Gadgets You Wish You Could Afford (slideshow) (informationweek.com)
10881.
Keurig Green Mountain to Be Bought for $13.9B (nytimes.com)
10882.
My fridge is listening to me (cringely.com)
10883.
Ask HN: How do I prepare myself for a Blockchain job?
10884.
The design of my magic getopt (daemonology.net)
10885.
LattePanda – A £45 Win10 Computer for Everything (kickstarter.com)
10886.
All models may be wrong, but it’s not a contest to see how wrong you can be (genehughson.wordpress.com)
10887.
Introducing Bliss: A 3KB Library for Happier Vanilla JS (lea.verou.me)
10888.
After 74 years, bones from Pearl Harbor tomb ship could be identified (washingtonpost.com)
10889.
Coding with the Grip It and Rip It Mentality (orlandodevs.com)
10890.
“Nemesis” malware hijacks PC’s boot process to gain stealth, persistence (arstechnica.com)