August 2016 Archive
2311.
Scientist believes the summer ice cover at the north pole is about to disappear (theguardian.com)
2312.
The top 10 h1B employers are IT offshore outsourcing firms (epi.org)
2313.
Ask HN: What does it take to get a job at Google?
2314.
Anti-submarine Warfare: Seek, but shall ye find? (economist.com)
2315.
Treehouse lays off 21% (edsurge.com)
2316.
Paywalling the laws of the universe (authorea.com)
2317.
Tokyo may have found the solution to soaring housing costs (vox.com)
2318.
Nim Game (en.wikipedia.org)
2319.
JSON API – A Specification for Building APIs in JSON (jsonapi.org)
2320.
Comparison of opensource time series db's (blog.dataloop.io)
2321.
‘Shadow Brokers’ Claim to Be Selling NSA Malware, in What Could Be Historic Hack (foreignpolicy.com)
2322.
How a GIF of Aly Raisman's Floor Routine Got Me Permanently Banned from Twitter (linkedin.com)
2323.
Nike.com's robots.txt file (nike.com)
2324.
Securing Bitcoin Core with Blockstack (lightco.in)
2325.
Scientists discover light could exist in a previously unknown form (phys.org)
2326.
How I Learned to Stop Worrying and Love Ephemeral Storage (svds.com)
2327.
Medium acquires Embedly (YC W10) (medium.com)
2328.
Graphene Doubles Up on Quantum Dots’ Promise in Quantum Computing (spectrum.ieee.org)
2329.
Boon Companion: Çelebi’s Seyahatname is one of history’s greatest travelogues (theparisreview.org)
2330.
Microsoft open-sources PowerShell and extends it to Linux (venturebeat.com)
2331.
Gladwell: Wealthy 'sound like idiots' explaining donations to large universities (businessinsider.com)
2332.
A homeless woman’s battle to prove Social Security owes her more than $100K (washingtonpost.com)
2333.
Announcing Tokio a Finagle inspired network application framework for Rust (medium.com)
2334.
Guided in-process fuzzing of Chrome components (security.googleblog.com)
2335.
Uncovering the brutal truth about the British empire (theguardian.com)
2336.
Kaspersky’s Analysis of Equation Group’s RC6 Is Wrong (cs.uic.edu)
2337.
How we accidentally over-engineered seeding Memcached in Python, Redis and Celery (goshippo.com)
2338.
Entropy Explained, with Sheep (aatishb.github.io)
2339.
Leveraging Search Stages with Filters, Sorting, and Search Terms (blog.octopart.com)
2340.
Serious vulnerability lets attackers hijack Web and chat communications (arstechnica.com)