Top Posts for July 14, 2015

New Horizons: Nasa spacecraft speeds past Pluto Summary: The stretching amplifies surface differences Image caption David Shukman talks to Al Tombaugh, the son of Pluto discoverer Clyde The cheering and jubilation are phenomenal. Keywords: pluto, flyby, horizons, image, caption Full article on bbc.co.uk | 558 Points and 190 Comments A Neural Network in 11 Lines of Python Summary: I worked with neural networks for a couple years before performing this exercise, and it was the best investment of time I’ve made in the field (and it didn’t take long).

Read More

Top Posts for July 13, 2015

Firefox makes click-to-activate Flash the default Summary: Note: If there is not an updated version to install, you may need to contact the developer of the add-on that was blocked. Keywords: firefox, plugin, unsafe, blocked, blocklist Full article on support.mozilla.org | 931 Points and 377 Comments The Really Big One Summary: That is enough time for earthquake early-warning systems, such as those in use throughout Japan, to automatically perform a variety of lifesaving functions: shutting down railways and power plants, opening elevators and firehouse doors, alerting hospitals to halt surgeries, and triggering alarms so that the general public can take cover.

Read More

Top Posts for July 12, 2015

Nintendo CEO Satoru Iwata has died [pdf] Full article on nintendo.co.jp | 937 Points and 179 Comments 7 Rejections Summary: On June 26, 2008, our friend Michael Seibel introduced us to 7 prominent investors in Silicon Valley. Keywords: clap, rejections, investors, rejected, time Full article on medium.com | 720 Points and 192 Comments Firefox, you’re supposed to be in my pocket, not the other way around Summary: Also, you can’t modify, translate, reverse engineer, decompile, disassemble, or create any derivative works based on the Pocket Technologies, including any of its files, tables or documentation, or any portion thereof, or determine or attempt to determine any source code, algorithms, methods or techniques embodied in the Pocket application or any portion thereof .

Read More

Top Posts for July 11, 2015

If you’ve nothing to hide, you’ve got nothing to fear Summary: If you really strongly feel that you have nothing that you consider private ask yourself this: Even if you have done nothing wrong, are you willing to publish your pin code, a high resolution scan of your signature, your passport, your SSN, your passwords, your photographs (naked, preferably), your medical records, the conversations with your attorney, the amount of money you currently have, your criminal record (if you have any), your bank statements, your tax returns for the last 10 years, your license plate and a copy of your driving license, your sexual orientation, your infidelities, the names of the people that you love, the names of the people you despise, the contents of your diary, all the emails you ever wrote and received, your report cards, your entire credit history, all the stuff you ever bought, all the movies you’ve ever watched, all the books you ever read, your religion, your home address and so on for all the world to see?

Read More

Top Posts for July 10, 2015

Ellen Pao Is Stepping Down as Reddit’s Chief Summary: Last October, Reddit raised $50 million in venture capital from investors including Andreessen Horowitz, Mr. Altman and the rapper Snoop Dogg. Keywords: reddit, pao, kleiner, board, site Full article on nytimes.com | 862 Points and 822 Comments Revised and much faster, run your own high-end cloud gaming service on EC2 Summary: Huge thanks for helping me with this goes out to: @crisg , @martinmroz , Jeff K.

Read More

Top Posts for July 9, 2015

The Coder Who Encrypted Your Texts Summary: ET SAN FRANCISCO—In the past decade, Moxie Marlinspike has squatted on an abandoned island, toured the U.S. by hopping trains, he says, and earned the enmity of government officials for writing software. Keywords: marlinspike, moxie, coder, encrypted, texts Full article on wsj.com | 473 Points and 180 Comments Amazon API Gateway – Build and Run Scalable Application Backends Summary: Self-Service & Highly Usable – Allow you to define, revise, deploy, and monitor APIs with a couple of clicks, without requiring specialized knowledge or skills, including easy SDK generation.

Read More

Top Posts for July 8, 2015

Facebook’s Piracy Problem Full article on slate.com | 439 Points and 236 Comments DigitalOcean Raises $83M in Series B Funding Summary: We’ve raised a seed round and Series A which we used to build out servers in six locations (New York, London, Singapore, Frankfurt, Amsterdam, and San Francisco), added features like user data, IPv6, private networking, team account management, and updated our Community platform. Keywords: developers, digitalocean, series, cloud, infrastructure

Read More

Top Posts for July 7, 2015

Project Oberon Full article on projectoberon.com | 417 Points and 87 Comments Code Specialists Oppose U.S. and British Access to Encrypted Communication Summary: Today, the government’s plans could affect the technology used to lock data from financial and medical institutions, and poke a hole in mobile devices and countless other critical systems that are moving rapidly online, including pipelines, nuclear facilities and the power grid. Keywords: communications, government, paper, technical, security

Read More

Top Posts for July 6, 2015

Stuff in Space Summary: Find all objects from this launch… Keywords: find, objects, launch, downloading, resources Full article on stuffin.space | 629 Points and 130 Comments Show HN: “Who is hiring?” Map Full article on whoishiring.it | 546 Points and 136 Comments Snow – A layer 3 virtual network that uses public keys instead of IP addresses Summary: Packets sent to and from that IP address are transparently delivered to and from the machine with that key over a datagram TLS tunnel, e.

Read More

Top Posts for July 5, 2015

Hacking Team hacked, attackers claim 400GB in dumped data Summary: Specializing in surveillance technology, Hacking Team is now learning how it feels to have their internal matters exposed to the world, and privacy advocates are enjoying a bit of schadenfreude at their expense. Keywords: hacking, team, world, security, hacked Full article on csoonline.com | 582 Points and 221 Comments Thomas Piketty: “Germany has never repaid.” Summary: The original German interview with Thomas Piketty can be found here .

Read More

Top Posts for July 4, 2015

Greece Summary: If perceived credit risk leaves public finance too expensive Europe-wide, then the EU should develop a mechanism whereunder states are permitted to sell equity securities to the ECB up to a fixed limit, set uniformly across Europe in per capita terms. Keywords: greece, european, creditors, banks, greek Full article on interfluidity.com | 236 Points and 199 Comments How I’d redesign piano sheet music Summary: Traditional sheet music relies on symbols, scales and memorization, and can be difficult to learn and read, so this new notation uses visual cues by showing “fingers and hands” on keys.

Read More

Top Posts for July 3, 2015

Things Rust shipped without Summary: a shared root namespace variables with runtime “before main” static initialization (the .ctors section) a compilation model that relies on textual inclusion ( #include ) or textual elision (#ifdef) a compilation model that relies on the order of declarations (possible caveat: macros) accidental identifier capture in macros random-access strings UTF-16 or UCS-2 support anywhere outside windows API compatibility routines signed character types (hah! Keywords: operators, silent, coercions, things, proud

Read More

Top Posts for July 2, 2015

Front Page Subreddits Go Private in Response to Firing of Reddit Admin Full article on reddit.com | 963 Points and 592 Comments Dutch universities start their Elsevier boycott plan Summary: On behalf of the Dutch universities, he and his colleague Gerard Meijer negotiate with scientific publishers about an open access policy. Keywords: elsevier, access, universities, publishers, published Full article on universonline.nl | 542 Points and 126 Comments A Quick Puzzle to Test Your Problem Solving Summary: They were too eager to find “green shoots” of economic recovery that would suggest that the answer to the big question in their minds was, just as they hoped and believed: “Yes, the crisis response is aggressive enough, and it’s working.

Read More

Top Posts for July 1, 2015

1⁄999999999999999999999998999999999999999999999999 Summary: Divide the number 999,999,999,999,999,999,999,998,999,999,999,999,999,999,999,999 into 1 and express the result as a decimal expansion, and you’ll find the Fibonacci sequence presented in tidy 24-digit strings: Keywords: made, order, divide, number, express Full article on futilitycloset.com | 446 Points and 84 Comments A Dutch city is giving money away to test the basic income theory Summary: “What you lose by limiting the program to current welfare recipients is the possibility of making life better for the working poor—people earning low wages in part-time or contractual jobs who sometimes fall between the cracks of the existing system,” said Forget.

Read More

Top Posts for June 30, 2015

Safari is the new IE Summary: This is a strategy I highlighted in my opening talk for the frontend data panel, where I showed that you can get nearly the same features as Service Worker by using AppCache and PouchDB (which falls back to WebSQL on Safari). Keywords: apple, web, safari, indexeddb, developers Full article on nolanlawson.com | 753 Points and 356 Comments John Carmack working on Scheme as a VR scripting language Summary: Hidden fieldsSearch for groups or messages

Read More

Top Posts for June 29, 2015

Tota11y Summary: Instead, tota11y aims to reduce this barrier of entry by helping visualize accessibility violations (and successes), while educating on best practices. Keywords: page, accessibility, violations, button, bottom Full article on khan.github.io | 747 Points and 91 Comments Own-Mailbox, the first 100% confidential mailbox Summary: 3)In case of large amount of missed attempt to login the user is immediately warned so that he can change his password This makes Brute Force attacks almost impossible.

Read More

Top Posts for June 28, 2015

The NoScript Misnomer Summary: Recently I took a stab at auditing a popular Firefox addon NoScript , which is fairly well known among the netsec and privacy community due to its bold functionality of blocking active content such as Flash, Java, and JavaScript on all sites by default. Keywords: noscript, whitelist, domain, trust, site Full article on thehackerblog.com | 275 Points and 66 Comments Squib: A Ruby DSL for prototyping card and board games Summary: A concise set of rules for laying out your cards Loading PNGs and SVGs Complex text rendering using Pango Reading xlsx and csv files Rendering to PNGs, PDFs, and SVGs (sheets or individual files) Flexible, data-driven layouts in Yaml Basic shape drawing, blending operators, gradients, etc.

Read More

Top Posts for June 27, 2015

ICANN’s assault on personal and small business privacy Summary: The whole proposal is a giant pile of BS that does nothing but service ICANN’s friends in governments and intellectual property (think RIAA/MPAA) at the expense of anyone who’s ever set up a web site and thought that maybe it would be good if their detractors didn’t have their home address. Keywords: privacy, domain, icann, providers, proxy Full article on blog.

Read More

Top Posts for June 26, 2015

Same-Sex Marriage Is a Right, Supreme Court Rules Summary: “Love has won,” the crowd chanted as courtroom witnesses raised their arms in victory.Credit Zach Gibson/The New York Times “If you are among the many Americans — of whatever sexual orientation — who favor expanding same-sex marriage, by all means celebrate today’s decision,” Chief Justice Roberts wrote. Keywords: justice, marriage, court, wrote, opinion Full article on nytimes.com | 1905 Points and 1195 Comments

Read More

Top Posts for June 25, 2015

Atom 1.0 Summary: Atom has become more modular through stabilizing the API , built-in ES6 support using babel , services for inter-package communication, decorations for extending the core editor, and new themes that automatically adapt the UI to the syntax colors. Keywords: atom, today, packages, editor, defunkt Full article on blog.atom.io | 1096 Points and 439 Comments What happens when you stop relying on resumes Summary: He hadn’t attended a brand-name school, his GPA wasn’t high enough to stand out, and his only professional programming experience was a multiyear cybersecurity stint at a huge defense contractor, the nature of which he was forbidden from discussing, on a resume or otherwise.

Read More

Top Posts for June 24, 2015

What’s Really Warming the World? Full article on bloomberg.com | 750 Points and 523 Comments Mattermost: Open-source, on-premises, Slack alternative Full article on mattermost.org | 432 Points and 216 Comments How mosquitos deal with getting hit by raindrops Summary: All that happens is that our mosquito is suddenly scooped up by the raindrop and finds itself hurtling toward the ground at a velocity of roughly nine meters per second, an acceleration which can’t be very comfortable, because it puts enormous pressure on the insect’s body, up to 300 gravities worth, says professor Hu.

Read More

Top Posts for June 23, 2015

I spent the last 15 years trying to become an American and failed Summary: Americans may romanticize New Zealand for its natural beauty, for being Middle Earth, but we from the small country often dreamed of the metropolis, longed for its culture, its opportunities, its sense of being the center of the world. Keywords: immigration, work, visa, american, america Full article on vox.com | 526 Points and 589 Comments

Read More

Top Posts for June 22, 2015

Organizing complexity is the most important skill in software development Summary: I’ve worked on large telecommunications systems, console games, blogging software, a bunch of personal tools, and very rarely is there some tricky data structure or algorithm that casts a looming shadow over everything else. Keywords: organization, skill, blog, care, important Full article on johndcook.com | 742 Points and 276 Comments Docker, CoreOS, Google, Microsoft, Amazon to Develop Common Container Standard Summary: Other members of this coalition include Apcera, Cisco, EMC, Fujitsu Limited, Goldman Sachs, HP, Huawei, IBM, Intel, Joyent, Mesosphere, Pivotal, Rancher Labs, Red Hat and VMware — that is, virtually everybody who has a stake in building a thriving container ecosystem.

Read More

Top Posts for June 21, 2015

Megaprocessor Summary: The Megaprocessor has featured in a several articals, for example: The Register , the BBC News web site, IEEE Spectrum . Keywords: megaprocessor, built, long, inside, large Full article on megaprocessor.com | 728 Points and 125 Comments Asciinema Full article on asciinema.org | 513 Points and 90 Comments Wooden combination lock Summary: Ideally, they would turn with a bit of friction so they wouldn’t overshoot with momentum when dialing a combination quickly.

Read More

Top Posts for June 20, 2015

Suddenly, a leopard print sofa appears Summary: When each student was given a heavy book of MNIST database, hundreds of pages filled with endless hand-written digit series, 60000 total, written in different styles, bold or italic, distinctly or sketchy. Keywords: leopard, image, lot, features, recognition Full article on rocknrollnerd.github.io | 530 Points and 109 Comments Management things I learned at Imgur Summary: A personal mantra I’ve found useful is “we were lucky but now is the time to be good.

Read More

Top Posts for June 19, 2015

Show HN: Wayback HN, a cross between the Wayback Machine and Hacker News Summary: 1 Good books for deep hacks (begriffs.com) 70 points by signa11 today | 6 comments 2 Bitcoin: Update network descriptions to be more accurate (github.com) 61 points by SnowProblem today | 49 comments 3 Telegram shuts down major Iranian anti government channel (twitter.com) 4 points by chvid today | 3 comments 4 Ad targeters are pulling data from your browser’s password manager (theverge.

Read More

Top Posts for June 18, 2015

Why Greet Apple’s Swift 2.0 With Open Arms? Summary: Here’s a great example: Apple is a wily opponent, utilizing Open Source (the cooption of Free Software) to manipulate the press and hoodwink the would-be spokespeople for Linux to support them. Keywords: apple, software, swift, open, freedom Full article on ebb.org | 421 Points and 313 Comments Redis re-implemented in Rust Summary: IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Read More

Top Posts for June 17, 2015

How Naughty Dog Fit Crash Bandicoot into 2MB of RAM on the PS1 Summary: Andy even controlled the physical layout of bytes on the CD-ROM disk so that—even at 300KB/sec—the PS1 could load the data for each piece of a given level by the time Crash ended up there. Keywords: crash, fit, code, packing, andy Full article on quora.com | 934 Points and 247 Comments From Asm.js to WebAssembly Summary: I’d like to single out for highest praise JF Bastien , K.

Read More

Top Posts for June 16, 2015

Chromium unconditionally downloads binary blob Summary: Last modified: Sun Dec 31 11:03:57 2017; Machine Name: beach Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors. Keywords: chromium, gmt, full, text, mbox Full article on bugs.debian.org | 550 Points and 176 Comments How to receive a million packets per second Summary: Since both threads are using the same socket descriptor, they spend a disproportionate amount of time fighting for a lock around the UDP receive buffer.

Read More

Top Posts for June 15, 2015

LastPass Security Notice Summary: The investigation has shown, however, that LastPass account email addresses, password reminders, server per user salts, and authentication hashes were compromised. Keywords: password, master, lastpass, data, security Full article on blog.lastpass.com | 544 Points and 305 Comments The Art of Command Line Summary: Java system debugging is a different kettle of fish, but a simple trick on Oracle’s and some other JVMs is that you can run kill -3 and a full stack trace and heap summary (including generational garbage collection details, which can be highly informative) will be dumped to stderr/logs.

Read More

Top Posts for June 14, 2015

Philae comet lander wakes up Summary: Esa’s senior scientific advisor, Prof Mark McCaughrean, told the BBC: “It’s been a long seven months, and to be quite honest we weren’t sure it would happen - there are a lot of very happy people around Europe at the moment.” Keywords: philae, comet, scientists, media, life Full article on bbc.co.uk | 922 Points and 154 Comments Greenwald: “The Sunday Times’ Snowden Story Is Journalism at Its Worst” Summary: Last night, the Murdoch-owned Sunday Times published their lead front-page Sunday article, headlined “British Spies Betrayed to Russians and Chinese.

Read More

Top Posts for June 13, 2015

Why did Borland fail? Summary: Hot rodders, hackers, and modern day makers were tasked with making things they had no passion for - building the software analogs of sewer systems, utility poles, or synthetic hairballs for ceramic cats. Keywords: market, enterprise, borland, software, company Full article on quora.com | 381 Points and 262 Comments Why Open Source Misses the Point of Free Software Summary: The philosophy of open source, with its purely practical values, impedes understanding of the deeper ideas of free software; it brings many people into our community, but does not teach them to defend it.

Read More

Top Posts for June 12, 2015

Let’s Encrypt Overview Summary: So you google a few random keywords like “secure website https” and you end up with a bunch of links and services (which may not be free) and you suddenly have to understand what are certificates, PKI, x509, public-key cryptography, RSA, FQDN, haaa…. Well, worry no more, Let’s Encrypt was thought so that you wouldn’t have to go through all that trouble and destroy your server on the way.

Read More

Top Posts for June 11, 2015

What Is Code? Full article on bloomberg.com | 1384 Points and 352 Comments Open-sourcing Facebook Infer: Identify bugs before you ship Summary: Acknowledgements: The Infer engineering team @FB includes Sam Blackshear, Jeremy Dubreil, Andrzej Kotulski, Martino Luca, Irene Papakonstantinou, Dulma Rodriguez, and Jules Villard, in addition to Calcagno, Distefano, and O’Hearn. Keywords: facebook, infer, code, logic, program Full article on code.facebook.com | 475 Points and 117 Comments Oculus Rift Summary: Overcome ten devious dungeons, decipher mind-bending puzzles, avoid terrifying traps, and vanquish hordes of vicious monsters to save your kidnapped master!

Read More

Top Posts for June 10, 2015

Google: 90% of our engineers use the software you wrote (Homebrew), but… Summary: CloseCloseCloseCloseCloseCountryCodeFor customers ofUnited States40404(any)Canada21212(any)United Kingdom86444Vodafone, Orange, 3, O2Brazil40404Nextel, TIMHaiti40404Digicel, VoilaIreland51210Vodafone, O2India53000Bharti Airtel, Videocon, RelianceIndonesia89887AXIS, 3, Telkomsel, Indosat, XL AxiataItaly4880804Wind3424486444Vodafone » See SMS short codes for other countries Keywords: tweet, location, instant, love, add Full article on twitter.com | 1257 Points and 654 Comments I quit the tech industry Summary: We make fun of Google and Apple for just going back and forth copying each other, as though the entire proprietary world weren’t the same fucking story.

Read More

Top Posts for June 9, 2015

It’s the Future Summary: So I just need to split my simple CRUD app into 12 microservices, each with their own APIs which call each others’ APIs but handle failure resiliently, put them into Docker containers, launch a fleet of 8 machines which are Docker hosts running CoreOS, “orchestrate” them using a small Kubernetes cluster running etcd, figure out the “open questions” of networking and storage, and then I continuously deliver multiple redundant copies of each microservice to my fleet.

Read More

Top Posts for June 8, 2015

Goodbye Marco Summary: Another contributor, Tomeu Vizoso, said: “He reviewed my first patches ever to a free software project and his contagious enthusiasm was what put into motion my career in open source.” Keywords: marco, gnome, epiphany, community, project Full article on gnome.org | 567 Points and 57 Comments A Constructive Look at TempleOS Summary: While I can appreciate Terry’s philosophy, it’s probably fair to point out that the C64 did come with one other thing - an ecosystem where it was commonplace to exchange and distribute programs on physical media, via stores and magazines.

Read More

Top Posts for June 7, 2015

Paris Metro lines on a Git graph Summary: New pull request Latest commit 8f56b3b Jun 7, 2015Vincent Barbaresi init for README only Keywords: stations, commit, readme, version, latest Full article on github.com | 262 Points and 35 Comments Pixel City – Procedurally generated city (2009) [video] Full article on youtube.com | 210 Points and 32 Comments Grid Style Sheets – Replace CSS with a Constraint-Solver Summary: Brittiläisiä hedelmäkoneita, jotka ovat klassisia hedelmäteemoja, mutta bonuksena pelaajilla voi olla ajoittain mahdollisuus joko korjata 1-2 rumpua ja kierrättää jäljellä olevat rummut tai siirtää minkä tahansa rummun yhdelle symbolille alaspäin.

Read More

Top Posts for June 6, 2015

Winners of the 7th Underhanded C Contest Summary: The attack is realistically achievable without triggering some effect in the computer, like tampering with a system clock or a file permission; It uses a real-world approach to comparing spectra, rather than something simple or contrived; If you miss the type confusion, there is nothing at all about the remaining code that looks the slightest bit suspicious or unusual; It gets down to the bitwise representation of floating-point numbers, and causing a confusion of datatypes with usable results is ingenious; It exploits the fact that the doubles hold whole number counts, which allows the miscasting of doubles to work; The attack is actually transparent to all the filtering and preprocessing, which preserves the whole-number property of the data; Despite all this, it’s still only 60-odd lines of code, that looks incredibly innocent.

Read More

Top Posts for June 5, 2015

Autopsy: Lessons from Failed Startups Summary: “Pioneers get slaughtered and the settlers proper”@youngbloodjoe August 2016 Shipbeat A single platform for e-commerce logistics.We failed in building a logistics setup that we could power up with software Shipbeat Post-Mortem@svenningsen June 2016 Brisk.io Recommend actions to salespeople from their data (CRM, email, etc)Lack of focus and couldn’t e Turning the page: What we learned at Brisk@hajak June 2016 sociavstre.am Aggregate Instagram content by both location and hashtagReliance on third party API Why we killed our latest startup@bamcreative May 2016 cookisto Cookisto is an online community marketplace for homemade food.

Read More

Top Posts for June 4, 2015

FBI: Companies should help us ‘prevent encryption above all else’ Summary: Earlier this year, National Security Agency chief Adm. Michael Rogers floated an idea that would involve splitting up the keys to decode encryption to provide more oversight and make an access point harder for hackers to exploit. Keywords: encryption, security, companies, access, steinbach Full article on washingtonpost.com | 519 Points and 319 Comments Nobody’s Going to Steal Your Idea Summary: Being such an extremely niche thing, I thought at most someone reading my posts would think “hmm, I guess this kind of subscription business is pretty neat, I will apply this information to start my own crocodile leather underwear of the month club”.

Read More

Top Posts for June 3, 2015

Let Snowden Come Home Summary: In a statement that President Obama issued shortly before signing the new law, he said, “For the past eighteen months, I have called for reforms that better safeguard the privacy and civil liberties of the American people while ensuring our national security officials retain tools important to keeping Americans safe … enactment of this legislation will strengthen civil liberty safeguards and provide greater public confidence in these programs.

Read More

Top Posts for June 2, 2015

Looking Forward: Support for Secure Shell Summary: This site uses cookies for analytics, personalized content and ads. Keywords: site, content, cookies, analytics, personalized Full article on blogs.msdn.com | 828 Points and 390 Comments Auditing GitHub users’ SSH key quality Summary: If you have just/as of late gotten an email about your keys being revoked, this is because of me, and if you have, you should really go through and make sure that no one has done anything terrible to you, since you have opened yourself to people doing very mean things to you for what is most likely a very long time.

Read More

Top Posts for June 1, 2015

Is ReactJS really fast? Summary: Most developers and decision-makers take it for granted that ReactJS offers high performance and incredible speed much better than other frameworks like AngularJS and EmberJS. Keywords: angularjs, reactjs, speed, performance, dom Full article on blog.500tech.com | 409 Points and 186 Comments Securing Email Communications from Facebook Summary: Where encrypted notifications are enabled, Facebook will sign outbound messages using our own key to provide greater assurance that the contents of inbound emails are genuine.

Read More

Top Posts for May 31, 2015

Section 215 Expires For Now Summary: One of the government’s most powerful surveillance tools is scheduled to sunset in less than three weeks, and, for months, EFF has fought multiple legislative attempts to either extend or expand the NSA’s spying powers—warning the public, Representatives, and Senators about circling bills that threaten Americans’ privacy. Keywords: surveillance, nsa, bill, deeplinks, blog Full article on eff.org | 471 Points and 158 Comments

Read More

Top Posts for May 30, 2015

Lego Universe’s Dong Detection Problem Full article on exquisitetweets.com | 479 Points and 203 Comments Why do airplane windows have tiny holes? Summary: Bret Jensen, an aerospace engineering guru at Boeing Commercial Airplanes , told me about a separate but related function of the hole: to release moisture from the air gap and stop (most) fog or frost from forming on the window. Keywords: hole, window, cabin, pane, air

Read More

Top Posts for May 29, 2015

GitTorrent: A Decentralized GitHub Summary: That limits the kind of projects we can create and imagine at that scale to those that we can make a business plan for raising tens of millions of dollars a year to run. Keywords: git, github, hash, key, bittorrent Full article on blog.printf.net | 1038 Points and 169 Comments Ross Ulbricht Sentenced to Life in Prison Summary: The father, identified as Richard, whose 25-year-old son had died after using heroin that prosecutors said was purchased on Silk Road, accused Mr.

Read More

Top Posts for May 28, 2015

The Hacker Shelf: Collection of free books for the intellectually curious Full article on hackershelf.com | 483 Points and 98 Comments Jump – Experiences like you’re actually there Summary: With long battery life, live preview via mobile app, plus an up camera, the YI HALO allows you to capture even more of the world in VR. Keywords: jump, vr, videos, video, assembler Full article on google.com | 445 Points and 191 Comments

Read More

Top Posts for May 27, 2015

Rearchitecting GitHub Pages Summary: We run a pretty simple nginx config on the fileservers too - all we do is set the document root to $http_x_github_pages_root (after a little bit of validation to thwart any path traversal attempts, of course) and the rest just works. Keywords: pages, nginx, mysql, pair, infrastructure Full article on githubengineering.com | 477 Points and 149 Comments Rust for Python Programmers Summary: To show this in a better way, let’s go with a complex Python example and the Rust equivalent:

Read More

Top Posts for May 26, 2015

Web vs. native: let’s concede defeat Summary: You take native functionality (scrolling, selection, links, loading) that is fast and efficient and you rewrite it with ‘cutting edge’ javascript toolkits and frameworks so that it is slow and buggy and broken. Keywords: web, native, sites, news, apps Full article on quirksmode.org | 605 Points and 506 Comments Go in Go Summary: New library, internal/obj , part of original linker, captures details about machines, writes object files.

Read More