March 2018 Archive
11731.
Part One: Deep Dive into 2018 Trends in Life Sciences HPC (hpcwire.com)
11732.
An All Terrain Soft Bodied Robot to Wriggle Across Human Body (aeon.co)
11733.
Why you don't have to raise funds (blog.evantodesk.com)
11734.
Expert community annotated scientific papers (fermatslibrary.com)
11735.
Why Apple Should Buy Aston Martin (bloomberg.com)
11736.
Bionic Nerf Artillery Replaces Prosthetic Hand (makezine.com)
11737.
The Podcasting Juggernaut Has (Finally) Arrived (wired.com)
11738.
Transgender activists and the real war on women (spectator.co.uk)
11739.
How I learned to love parallelized applies with Dask and Numba (medium.com)
11740.
Bloom Programming Language: programming for the cloud and distributed systems (bloom-lang.net)
11741.
Folding satellites: How origami inspired a 'space geek' (money.cnn.com)
11742.
Which Distribution of Linux Should I Use? (jeremymorgan.com)
11743.
The Moon Will Get Its Own Mobile Phone Network in 2019 (space.com)
11744.
A first look at browser-based Cryptojacking (arxiv.org)
11745.
‘Splinternet’ to herald a trade war for the ages (ft.com)
11746.
SML# version 3.4.0 released (2017) (pllab.riec.tohoku.ac.jp)
11747.
Is your API broken? (blog.hackensplat.com)
11748.
Why are so many coders musicians? Part 2: Abstraction and language (medium.com)
11749.
10 things developers should know about building apps for kids (blog.superawesome.tv)
11750.
Why American Workers Aren’t Getting a Raise: Detective Story (mauldineconomics.com)
11751.
TOP 5 Swift Tips for iOS Developers (gbksoft.com)
11752.
Why Crystal is a promising programming language for 2018 (medium.com)
11753.
"The above was posted by the Chinese hacker(s) who hijacked my account." (amazon.com)
11754.
Adversary Tactics to Watch Out For (nehemiahsecurity.com)
11755.
Software Center Redesign – The Roundup #5 (solus-project.com)
11756.
GTK Global Menu (blog.broulik.de)
11757.
AI DJ Project: A Dialogue Between an AI and a Human (qosmo.jp)
11758.
First ICO registered with the SEC (renaissancecapital.com)
11759.
Geometric Algebra Methods in Quantum Information Processing [pdf] (web.mit.edu)
11760.
CIGslip: Bypass Microsoft Code Integrity Guard (CIG) (blog.morphisec.com)