March 2017 Archive
16831.
Building Scalable and Beautiful Angular Apps (Part 1) (excella.com)
16832.
“Howard West,” and Epidemic of Black Scrutiny (medium.com)
16833.
Complexity is Too Simple (spectator.co.uk)
16834.
“The Rule of Three” is a TERRIBLE strategy for code refactoring / reuse (infiniteundo.com)
16835.
A/B Testing with Hierarchical Models in Python (2015) (blog.dominodatalab.com)
16836.
Operating Systems: Three Easy Pieces (pages.cs.wisc.edu)
16837.
The Crazy New Camera Tech That Made Planet Earth 2 Possible (wired.com)
16838.
AirBnB vs. Berlin: What the data tells us (airbnbvsberlin.com)
16839.
Show HN: Embedded Device Hacking Tools from the /dev/ttyS0 Site (devttys0.com)
16840.
China finds a new source of cutting-edge military technology: US startups (cnbc.com)
16841.
Cyber Arms Race (news.vice.com)
16842.
Audience effect (en.wikipedia.org)
16843.
Postgres-BDR (2ndquadrant.com)
16844.
Inside Uber’s self-driving car mess (recode.net)
16845.
Using pouchdb and couchbase in an offline first application (codementor.io)
16846.
Faqbot: Transform passive FAQ to a conversational experience (faqbot.co)
16847.
Sigma, a Modern Data Workbench (sigmacomputing.io)
16848.
Herbert A. Simon – Wikipedia (en.wikipedia.org)
16849.
The “Satoshi/Bitcoin” approach applied to writing a new healthcare bill (blog.dilbert.com)
16850.
International Cloud Atlas (wmocloudatlas.org)
16851.
Tool for evolving arbitrary p5.js code with genetic algorithms (szymonkaliski.github.io)
16852.
The Why's and How's of E-Commerce Security (getastra.com)
16853.
Google sent me a job offer by mistake (reddit.com)
16854.
Recursive r/w locks (github.com)
16855.
Brendan Eich's new crypto coin (americanbanker.com)
16856.
Code splitting and lazy loading in Webpack (syntaxsuccess.com)
16857.
UK home secretary call for plain-text decrypt access to all end-2-end encryption (rt.com)
16858.
New PyBites Code Challenge #12 – Build a Tic-Tac-toe Game (pybit.es)
16859.
Simons Institute Workshop: Representation Learning (simons.berkeley.edu)
16860.
Crossing the Border? Here’s How to Safeguard Your Data from Searches (nytimes.com)