2015 Archive
38131.
38132.
38133.
Satisficing vs. Optimizing
(moshe-online.com)
38134.
A Tech Boom Aimed at the Few Instead of the World
(nytimes.com)
38135.
38136.
Every Important SaaS Metric in a Single Infographic
(blog.rjmetrics.com)
38137.
Stripe in Talks for Up to $500M in New Funding
(techcrunch.com)
38138.
Software Evolution, Maintenance, Improvement Method Guide
(aim42.github.io)
38139.
38140.
Building a secure computer system (1988) [pdf]
(cs.unomaha.edu)
38141.
Will Superintelligent AI Ignore Humans Instead of Destroying Us?
(motherboard.vice.com)
38142.
Implementing CoAP the Secure Way, Part I: Fundamentals
(blog.nvisium.com)
38143.
38144.
Consul in a Microservices Environment at Neofonie GmbH
(hashicorp.com)
38145.
Social Network Inspired Learning Community
(learnquiq.com)
38146.
Everything You Ever Wanted to Know About Message Latency [pdf]
(computernetworks5e.org)
38147.
38148.
Why are there so few women in Linux? (2002)
(tldp.org)
38149.
Side-Channel Power Analysis of AES Core in Project Vault
(colinoflynn.com)
38150.
38151.
38152.
38153.
Research report on using JIT to trigger RowHammer
(xuanwulab.github.io)
38154.
MapMyCab: How I Chose a Data Engineering Project
(insightdataengineering.com)
38155.
38156.
Twitter CEO Dick Costolo is stepping down July 1
(twitter.com)
38157.
38158.
Deconstructing Process Isolation (2006) [pdf]
(research.cs.wisc.edu)
38159.
Interprocess Communication in the Ninth Edition Unix System (1990)
(cm.bell-labs.co)
38160.