How Professional Hackers Understand Protected Code While Performing Attack Tasks [pdf]
(pdfs.semanticscholar.org)
August 2017 Archive
1651.
1652.
1653.
Google's Anti-Bullying AI Mistakes Civility for Decency
(motherboard.vice.com)
1654.
What dinner time looks like across the USA
(huckmagazine.com)
1656.
Exagear: Run x86 Applications on Raspberry Pi
(eltechs.com)
1657.
1658.
Who should be shamed, and who not?
(marginalrevolution.com)
1659.
WiMonitor: Wi-Fi Threat Monitoring Simplified
(hackerarsenal.com)
1660.
The software routing 260,000 grocery deliveries a week
(ocadotechnology.com)
1662.
The future of the human-computer interface?
(insights.hpe.com)
1663.
Why George Guidall Is the Undisputed King of Audiobooks
(nytimes.com)
1664.
1665.
C++17 Features and STL Fixes in VS 2017 15.3
(blogs.msdn.microsoft.com)
1666.
The extraordinary story of Britain’s efforts to finance the First World War
(bankunderground.co.uk)
1667.
A polyglot's guide to multiple dispatch (2016)
(eli.thegreenplace.net)
1668.
Production-Level Facial Capture Using Deep Convolutional Neural Networks
(research.nvidia.com)
1669.
Nvm will **not** be adding support for Ayo.js
(github.com)
1670.
1671.
Getting Started in Star Lisp (1991) [pdf]
(people.csail.mit.edu)
1672.
1673.
Extracting Chrome Cookies with Clojure
(blog.laurentcharignon.com)
1674.
Blue Apron Tumbles After Losing Customers in Second Quarter
(bloomberg.com)
1675.
1676.
1678.
1679.
Show HN: Shareable reasons to upgrade to Python 3
(whypy3.com)
1680.