February 2018 Archive
12841.
12842.
Aura (Expiring Patents make 5.1 surround software for Mac possible)
(alastairs-place.net)
12843.
12845.
Here is how Apple plans to avoid battery material shortages
(news.alphastreet.com)
12846.
The Instant Pot inspires mass devotion
(theguardian.com)
12847.
Zersetzung (psychological warfare technique used by the East German Stasi)
(en.wikipedia.org)
12848.
Hacker awarded US$5k after finding 9 vulnerabilities in MINDEF Singapore systems
(channelnewsasia.com)
12849.
ICOs via Regulation Crowdfunding
(cryptocurrentsblog.com)
12850.
Intel Microcode Revision Guidance, February 20 2018 [pdf]
(newsroom.intel.com)
12851.
Experts to call for more secrecy on AI
(technologyreview.com)
12852.
The Malicious Use of Artificial Intelligence, written by 26 Authors
(maliciousaireport.com)
12853.
Reintegrating scholarly infrastructure: ambiguous role of data sharing platforms
(journals.sagepub.com)
12854.
Colombia’s two anti-coca strategies are at war with each other
(economist.com)
12855.
Advanced Technology and Projects (ATAP)
(atap.google.com)
12856.
How computer vision works with self-driving cars
(readbackline.com)
12857.
12858.
How this AirBnB developer discovered the optimal time for deep work
(blog.rescuetime.com)
12859.
StorSvc SvcMoveFileInheritSecurity Arbitrary File Security Descriptor Overwrite
(bugs.chromium.org)
12860.
35 resources for better dev and test team meetings
(techbeacon.com)
12861.
12862.
12863.
How Bitcoin onboards new users
(useronboard.com)
12864.
Analysis of the XRP Ledger Consensus Protocol
(arxiv.org)
12865.
Pirates Crack Microsoft’s UWP Protection, Five Layers of DRM Defeated
(torrentfreak.com)
12866.
Stealth turns 40: Looking back at the first flight of Have Blue
(arstechnica.com)
12867.
LinksF1nd3r – web information gathering Grab links
(howucan.gr)
12868.
A quickstart guide to finding startup users
(medium.com)
12869.
12870.
Advanced functional programming in TypeScript: Maybe monad
(codewithstyle.info)