September 2016 Archive
7891.
Tearing Down the Model T of Our Time (youtube.com)
7892.
How to Generate Secure Random Numbers in Various Programming Languages (paragonie.com)
7893.
Samsung urges Galaxy Note 7 phone exchange urgently (bbc.com)
7894.
Making a Tool-Assisted Speedrun for PICO-8 (justinjaffray.com)
7895.
Debugging unfamiliar code (bitfunnel.org)
7896.
Haskell Foundation – A new hope (tab.snarc.org)
7897.
Show HN: Use micro-bounties to crowdsource tech hiring (swarmintro.com)
7898.
Hacking Street Fighter: CPS2 Encryption in R2 (youtube.com)
7899.
Paramount Wipes “Infringing” Ubuntu Torrent from Google (torrentfreak.com)
7900.
10 things you may have forgotten about 9/11 (usatoday.com)
7901.
Project Sand Hill: Google’s Campaign to Track the World’s Hottest Startups (wired.com)
7902.
Am I structuring my React application correctly? (github.com)
7903.
Transhumanism Is Inevitable (reason.com)
7904.
What I Learned from a Successful Launch: RemoteBase (sungwoncho.io)
7905.
Most tech is made by tech companies, for tech people (recode.net)
7906.
Chain Boats (en.wikipedia.org)
7907.
The unbitten Apple (roughtype.com)
7908.
Best JAVA Books for Beginners – Best books for learning java 8 (how-to-program-in-java.com)
7909.
Psychotherapy via Skype (theschooloflife.com)
7910.
Rethinking Hardware-Software Codesign for Exascale Systems [pdf] (exactcodesign.org)
7911.
Wal-Mart stops selling Egyptian cotton sheets made by India's Welspun (reuters.com)
7912.
Economic law finds new home in some S.F. neighborhoods (sfchronicle.com)
7913.
Why the Discovery of an Earth-Like Planet Is Such a Big Deal (npr.org)
7914.
Is Artificial Intelligence Just Automation? (thaxist.com)
7915.
Caddy HTTP/2 web server with automatic HTTPS (caddyserver.com)
7916.
PIC versus AVR (41j.com)
7917.
Garbage-eating drone starts cleaning up the Port of Rotterdam (siliconangle.com)
7918.
How the Oil and Gas Industry Awakened Oklahoma’s Sleeping Fault Lines (fivethirtyeight.com)
7919.
New drug clears malaria from mice in a single dose (arstechnica.com)
7920.
Jump Over ASLR: Attacking Branch Predictors to Bypass ASLR [pdf] (cs.binghamton.edu)