September 2018 Archive
6571.
How not to do a big deploy (goiabada.blog)
6572.
When Shadows Are Not What They Seem (theatlantic.com)
6573.
The rise of Anti-Notifications (medium.com)
6574.
SonarSnoop: active acoustic side-channel attacks against smartphone unlock codes (arxiv.org)
6575.
Show HN: Review Scraper API – reviews from 50+ review sites in standard JSON (reviewshake.com)
6576.
Introduction to Web Workers in JavaScript (auth0.com)
6577.
The Node.js Ecosystem Is Chaotic and Insecure (medium.com)
6578.
Towards Scalable and Ubiquitous Millimeter-Wave Wireless Networks [pdf] (cse.sc.edu)
6579.
Roguelike Universe: Visualising Influence (spaxe.github.io)
6580.
Brazilian officials fear incalculable loss of artefacts after museum fire (npr.org)
6581.
Mac App Downloads – The Eclectic Light Company (eclecticlight.co)
6582.
Ethereum vs. Stellar: Choosing the Right Platform for Wellmee Tokens (medium.com)
6583.
UFO sighting in NC (charlotteobserver.com)
6584.
C://TEXTRIS.EXE (teame.itch.io)
6585.
Chasing Unicorns (mropert.github.io)
6586.
Understanding Linux Malware [pdf] (s3.eurecom.fr)
6587.
Facebook Having Serious Messenger Outage (facebook.com)
6588.
How to build a rock solit app (medium.freecodecamp.org)
6589.
Real-Time Ray Tracing [pdf] (realtimerendering.com)
6590.
Silicon Valley Doesn’t Like Trump. It Can Still Work with the Government (nytimes.com)
6591.
Google AI Dopamine, GLUE, TransmogrifAI, Machine Learning for Health Care, (medium.com)
6592.
Map of subjective human feelings (emotion.utu.fi)
6593.
Grassroots leaders provide the best hope to a troubled world (economist.com)
6594.
A Visual History of the Creation of Disneyland (milanote.com)
6595.
August 2018 HN Hiring Trends: Summer hiring heats up; React still on fire (hntrends.com)
6596.
Forgotten heroes of the Enigma story (nature.com)
6597.
Machine Learning Cheatsheets for Stanford's CS 229 (github.com)
6598.
These Cultural Treasures Are Made of Plastic. Now They’re Falling Apart (nytimes.com)
6599.
Brazil Museum Fire Leaves Ashes, Recrimination and Little Else (nytimes.com)
6600.
Fraudsters Can Access Sensitive Information from Abandoned Domains (bleepingcomputer.com)