2016 Archive
3691.
The Moral Economy of Tech (idlewords.com)
3692.
The State of Babel (babeljs.io)
3693.
Google employees have enjoyed revolving door during Obama administration (watchdog.org)
3694.
Intake – American's largest psychiatric chain (buzzfeed.com)
3695.
Dash for iOS is now open source (github.com)
3696.
The best board games of 2016 (arstechnica.com)
3697.
Hacker Monthly Shuts Down (blog.hackermonthly.com)
3698.
Securing PostgreSQL [pdf] (thebuild.com)
3699.
Forget Comcast. Here’s a DIY Approach to Internet Access (backchannel.com)
3700.
Show HN: QBE – a new compiler back end (c9x.me)
3701.
Eyes Everywhere: Encryption programmer Paul Le Roux and his commando kill squad (mastermind.atavist.com)
3702.
Ask HN: How do news networks get election data?
3703.
Designing a SaaS Database for Scale with Postgres (citusdata.com)
3704.
Cracking the Adventure Time cipher (aaronrandall.com)
3705.
CS294: Program Synthesis for Everyone (people.eecs.berkeley.edu)
3706.
Ask HN: Is Python dying?
3707.
Alan Kay on the misunderstanding of OOP (1998) (lists.squeakfoundation.org)
3708.
To Know If the Election Was Hacked, Look at the Ballots (medium.com)
3709.
Break Up the Insulin Racket (nytimes.com)
3710.
Dark Patterns are designed to confuse and enroll (arstechnica.com)
3711.
Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s (2013) (nytimes.com)
3712.
The connection between modern slavery and ecological disaster (blog.longreads.com)
3713.
Y Combinator cofounder Jessica Livingston to take year-long sabbatical (venturebeat.com)
3714.
The management myth (2006) (theatlantic.com)
3715.
U.S. chicken prices may have been artificially inflated for years (washingtonpost.com)
3716.
Google Cast is now built-in to Chrome (chrome.googleblog.com)
3717.
Document 17 Declassified – 9/11 attackers may have had links to Saudi Arabia [pdf] (28pagesdotorg.files.wordpress.com)
3718.
Data points that Facebook uses to target ads (washingtonpost.com)
3719.
More contributions on your profile (github.com)
3720.
European Union dedicated questionnaire on the Encryption of Data (blog.lukaszolejnik.com)