Tuesday, March 31, 2015

Porting Emacs to Chromebooks and the Web [pdf]

Comments



from Hacker News http://ift.tt/1F0HOYj

The Extraordinary Artwork of Francis Tsai

Comments



from Hacker News http://ift.tt/1EW1aOm

How are third-platform devices transforming healthcare? http://t.co/FwyTwZEmg5 http://t.co/lzLfpqzrHM






EMC logo
How are third-platform devices transforming healthcare? http://t.co/FwyTwZEmg5 http://t.co/lzLfpqzrHM






via EMC Feeds http://ift.tt/1CvHHWi

How are third-platform devices transforming healthcare? http://t.co/FwyTwZEmg5 http://t.co/lzLfpqzrHM






EMC logo
How are third-platform devices transforming healthcare? http://t.co/FwyTwZEmg5 http://t.co/lzLfpqzrHM






via EMC Feeds http://ift.tt/1CvHHWi

How are third-platform devices transforming healthcare? http://emc.im/1bO9FUA






EMC logo
How are third-platform devices transforming healthcare? http://emc.im/1bO9FUA










via EMC Feeds http://ift.tt/1IllwUe

How are third-platform devices transforming healthcare? http://emc.im/1bO9FUA






EMC logo
How are third-platform devices transforming healthcare? http://emc.im/1bO9FUA










via EMC Feeds http://ift.tt/1IllwUe

Orbit: EA's first open source project

Comments



from Hacker News http://ift.tt/1EYAVH8

Vocabulary based programming

Comments



from Hacker News http://ift.tt/1IjJteu

Life After Cyberspace (1999)

Comments



from Hacker News http://ift.tt/19AIVpb

The OnePlus Drone

Comments



from Hacker News http://ift.tt/19BTHvv

Trying Something New on Immigration in Colorado

Comments



from Hacker News http://ift.tt/1Gcb6HE

Costa Rica Is Now Running on 100% Renewable Electricity

Comments



from Hacker News http://ift.tt/1Dnfjb0

Critical Vulnerabilities in JSON Web Token Libraries

Comments



from Hacker News http://ift.tt/1Ikuq4d

The Man Who Makes Hollywood's Smallest Sounds

Comments



from Hacker News http://ift.tt/1C3Ec5Q

Bloodborne creator Hidetaka Miyazaki: ‘I didn’t have a dream, wasn’t ambitious'

Comments



from Hacker News http://ift.tt/1EZ3xjj

All Systems Down (2003)

Comments



from Hacker News http://ift.tt/1F1c59v

Robber Barons Would Have Loved Facebook’s Employee Housing

Comments



from Hacker News http://ift.tt/1IM99kP

Show HN: NYC Film Permits Map

Comments



from Hacker News http://ift.tt/1CHoK4p

Fans have dropped $77M on this guy’s buggy, half-built game

Comments



from Hacker News http://ift.tt/1NyguVZ

Show HN: A simple note taking app built in React

Comments



from Hacker News https://notello.com

The End of College? Not So Fast

Comments



from Hacker News http://ift.tt/1C1rWmc

Show HN: Code Fight Club – Become a better developer by fighting

Comments



from Hacker News http://code-fight.club

10X Programmer and Other Software Engineering Myths

Comments



from Hacker News http://ift.tt/18GQqdI

DDoS attack on GitHub has stopped? Status is green again.

Comments



from Hacker News http://ift.tt/1EwbMZo

SunSpider – Spartan vs. Chrome 41.0.2272.101 – Number's Don't Lie

Comments



from Hacker News http://ift.tt/1ILA9ks

Anonymous Hackers Threaten Israel with 'Electronic-Holocaust' on 7th April

The famous cyber hacker group Anonymous has vowed an 'Electronic Holocaust' against Israel in response to what the group calls 'crimes in the Palestinian territories'. In a spooky video "message to Israel" posted on YouTube March 4, Anonymous declared yet another cyber attack on April 7, which is one week before Holocaust Remembrance day.<!-- adsense --> Totally in news delivering style, the





from The Hacker News http://ift.tt/1MtgnzJ

China Appears to Attack GitHub by Diverting Web Traffic

Comments



from Hacker News http://ift.tt/1OUoRyK

Music video with WebGL shader overlay (control by mouse/webcam)

Comments



from Hacker News http://ift.tt/13BLuBo

How to Avoid the Worst Mistake in Website Conversion Optimization

Comments



from Hacker News http://ift.tt/1Csmixf

DDoS attacks costs enterprise £100,000 per hour, study finds

DDoS attacks are not only a disruption but can also cost businesses dearly, according to Neustar research.









from Latest topics for ZDNet in Security http://ift.tt/1aedFgy

Python library for controlling Phillips Hue light bulbs

Comments



from Hacker News http://ift.tt/1IgxBd9

Kaspersky Lab Congratulates Scuderia Ferrari on its First Victory of the 2015 Formula One Season

Kaspersky Lab, the official sponsor of Scuderia Ferrari, is pleased to congratulate the team on its success at the Formula One Grand Prix of Malaysia.



from http://ift.tt/1DkNdwW

Serious Fraud Office in Serious Trouble With ICO

Privacy watchdog fines SFO £180,000 after breach



from http://ift.tt/1C130LS

The state and rate of HTTP/2 adoption

Comments



from Hacker News http://ift.tt/1EuOfYE

Why you should care about Vim

Comments



from Hacker News http://ift.tt/1Nyouq2

Studying the brain can actually helps us analyze Big Data http://t.co/rQXk7u8jWv http://t.co/ZmVlCplx1U






EMC logo
Studying the brain can actually helps us analyze Big Data http://t.co/rQXk7u8jWv http://t.co/ZmVlCplx1U






via EMC Feeds http://ift.tt/1DkrsgW

Studying the brain can actually helps us analyze Big Data http://t.co/rQXk7u8jWv http://t.co/ZmVlCplx1U






EMC logo
Studying the brain can actually helps us analyze Big Data http://t.co/rQXk7u8jWv http://t.co/ZmVlCplx1U






via EMC Feeds http://ift.tt/1DkrsgW

Data and Goliath, book review: A handbook for the information age

Modern lives leave a digital trail, and most people are unaware of just who is auditing it. Security expert Bruce Schneier examines how governments, corporations, individuals and society as a whole can deliver a better balance between security and privacy.









from Latest topics for ZDNet in Security http://ift.tt/1DkprkM

Silk Road Investigators Charged With Stealing Bitcoins

Two federal special agents accused in complaint issued last week



from http://ift.tt/1OU59mJ

Next Generation of Dense-Storage Instances for EC2

Comments



from Hacker News http://ift.tt/1IhmuAG

Show HN: ParrotHunt – ThreeJS WebGL Game with Node.js Back End

Comments



from Hacker News http://ift.tt/1bLTQxB

Beijing May Target Foreign Websites in New DDoS Campaign

Rights group claims Great Firewall is now imposing Chinese censorship on users globally



from http://ift.tt/1EvuOPD

Two Federal Agents Charged with Stealing Bitcoins During Silk Road Investigation

Two former Federal investigators who helped to shut down the infamous black-market website 'Silk Road' accused of fraud and stealing more than a Million dollars in Bitcoins during their investigation. Silk Road, an infamous online drug market that hosted more than $200 Million in transactions, was seized by the FBI in 2013, but during that period two of FBI agents took advantage of their





from The Hacker News http://ift.tt/1IhqeSU

Farewell From Shari Steele

Comments



from Hacker News http://ift.tt/1xQfVFv

French civil code now on GitHub

Comments



from Hacker News http://ift.tt/1Msp1P9

A Chess Program in PL/I

Comments



from Hacker News http://ift.tt/1BFSsSn

Building Halo 4, a Video Game, Using the Actor Model

Comments



from Hacker News http://ift.tt/1xuHDHj

The Log File Navigator

Comments



from Hacker News http://lnav.org/

How to Split Sentences (2014)

Comments



from Hacker News http://ift.tt/1OSTsfZ

Quantum entanglement of a single particle has been observed by researchers

Comments



from Hacker News http://ift.tt/1GHJbji

New ARM-powered chip aims for battery life measured in decades

Comments



from Hacker News http://ift.tt/1IKNPMK

Pigeonly (YC W15) Is Looking for a UI/UX Designer

Comments



from Hacker News http://ift.tt/1NCcypa

The founding story of SanDisk

Comments



from Hacker News http://ift.tt/1GzL9SO

The Mother of All Demos Is Now an Opera

Comments



from Hacker News http://ift.tt/1EpyQZH

How Hong Kong's subway turns a $2B annual profit

Comments



from Hacker News http://ift.tt/1GawD3o

World's largest aircraft looking for investors to give it liftoff

Comments



from Hacker News http://ift.tt/1bJLd6M

Beckett in Love

Comments



from Hacker News http://ift.tt/19IxwEp

Using drones and big data to stop poaching

Comments



from Hacker News http://ift.tt/19M2ETw?

U.S. Supreme Court: GPS Trackers Are a Form of Search and Seizure

Comments



from Hacker News http://ift.tt/1DmVLVG

High-Performance Log Parsing in Haskell: Part One

Comments



from Hacker News http://ift.tt/1GHJbjc

Monday, March 30, 2015

CEO Paul Martiz discusses what's next for @Pivotal: http://t.co/YyTb2r6RhS http://t.co/5OF2aUrwwn






EMC logo
CEO Paul Martiz discusses what's next for @Pivotal: http://t.co/YyTb2r6RhS http://t.co/5OF2aUrwwn






via EMC Feeds http://ift.tt/1OToLY9

CEO Paul Martiz discusses what's next for @Pivotal: http://t.co/YyTb2r6RhS http://t.co/5OF2aUrwwn






EMC logo
CEO Paul Martiz discusses what's next for @Pivotal: http://t.co/YyTb2r6RhS http://t.co/5OF2aUrwwn






via EMC Feeds http://ift.tt/1OToLY9

How I reverse-engineered Google Docs to play back any document's keystrokes

Comments



from Hacker News http://ift.tt/1tcuLMY

You're probably using the wrong dictionary

Comments



from Hacker News http://ift.tt/1ob5rrb

Immigration's G20 email bungle was only the first fail

The Department of Immigration and Border Protection's response to the G20 data breach was precisely wrong. Twice.









from Latest topics for ZDNet in Security http://ift.tt/1EuBZHO

New reconnaissance threat Trojan.Laziok targets the energy sector

A new information stealer, Trojan.Laziok, acts as a reconnaissance tool allowing attackers to gather information and tailor their attack methods for each compromised computer.



Read More



from Symantec Connect - Security - Blog Entries http://ift.tt/19DrvI4

In depth post on ES6 generators

Comments



from Hacker News http://ift.tt/1xrRwph

Python vs. Ruby – The Workshape.io Smackdown

Comments



from Hacker News http://ift.tt/1EpSjJK

A 63-pass FORTRAN compiler for the IBM 1401 illustrated

Comments



from Hacker News http://ift.tt/1DkoPx2

Show HN: cta.js – Animate your 'action-to-effect' paths

Comments



from Hacker News http://ift.tt/19A1iuc

Thousands of Hacked Uber Accounts Selling on Dark Web for $1

$US1 may be a very little amount, but it is enough to buy you a stolen Uber account and free car rides around the city. Two separate vendors on AlphaBay, a relatively new Dark Web marketplace launched in late 2014, are selling active Uber accounts with usernames and passwords for $1 each, Motherboard reports. Once purchased, these active Uber accounts let you order up rides using the





from The Hacker News http://ift.tt/1bIZwZq

Bugtraq: [ MDVSA-2015:166 ] clamav

[ MDVSA-2015:166 ] clamav



from SecurityFocus Vulnerabilities http://ift.tt/1BVSGVj

Bugtraq: [ MDVSA-2015:156 ] libcap-ng

[ MDVSA-2015:156 ] libcap-ng



from SecurityFocus Vulnerabilities http://ift.tt/1MncSLl

Bugtraq: [ MDVSA-2015:129 ] ruby

[ MDVSA-2015:129 ] ruby



from SecurityFocus Vulnerabilities http://ift.tt/1BVSGVh

Bugtraq: [ MDVSA-2015:101 ] jbigkit

[ MDVSA-2015:101 ] jbigkit



from SecurityFocus Vulnerabilities http://ift.tt/1MncSLa

React Native: Initial Thoughts

Comments



from Hacker News http://ift.tt/1Nye6AA

Namecoin

Comments



from Hacker News https://namecoin.org/

Infrastructure as code

Comments



from Hacker News http://ift.tt/1Dds9bz

This is what happened when I drove my Mercedes to pick up food stamps

Comments



from Hacker News http://ift.tt/1Ifhk8i

Challenging Path of the Lone Startupper

Comments



from Hacker News http://ift.tt/1G8cLOk

We will build your web or mobile app prototype – in two weeks and for a flat fee

Comments



from Hacker News http://ift.tt/1DdkF8z

Volvo Life Paint

Comments



from Hacker News http://ift.tt/1ByA7aO

Ask HN: Tell Us Your Best RILT(Remember It Like This..)

Comments



from Hacker News http://ift.tt/1DdkGcw

New threat intelligence report skewers industry confusion, charlatans

Are you getting threat intel -- or just antivirus software? A government-backed report designs a framework for threat intelligence that can be scaled to different sectors, sizes of organization, and organizational goals.









from Latest topics for ZDNet in Security http://ift.tt/19o2EZc

Improving compression with a preset DEFLATE dictionary

Comments



from Hacker News http://ift.tt/1bIFHBo

10%? 20%? Apps Are Changing How We Tip

Comments



from Hacker News http://ift.tt/1ETFlBF

Memo from Slack CEO

Comments



from Hacker News http://ift.tt/1bIFHBm

Microsoft and Law Enforcement Transparency

Comments



from Hacker News http://ift.tt/1MaPyjM

Aussie Government Red-Faced After Major G20 Privacy Breach

Personal information of 31 world leaders was emailed to the wrong person



from http://ift.tt/1BDiKF0

Your Location has been Shared 5,398 Times in Last 14 Days

Do you realize how often your smartphone is sharing your location data with various companies? It is more than 5000 times in just two weeks. That is little Shocking but True! A recent study by the security researchers from Carnegie Mellon reveals that a number of smartphone applications collect your location-related data — a lot more than you think. The security researcher released a





from The Hacker News http://ift.tt/1NxW0hY

An API is only as good as its documentation

Comments



from Hacker News http://ift.tt/1D6AdLg

Volvo Life Paint

Comments



from Hacker News http://ift.tt/1ByA7aO

Massive DDoS Takes Out Anti-China GitHub Pages

Beijing suspected once again as developer platform struggles



from http://ift.tt/1EU5cXx

PyMusique Software Lets You Download Songs from iTunes Store

If you owned an Apple device and frustrated with its iTunes Music Store limits and strict policies, then there is something you would really like. Earlier this month, a group of young programmers released "PyMusique," which allows users of Linux as well as Windows Operating System to access iTunes Music Store, without using Apple’s iTunes software. PyMusique a third-party





from The Hacker News http://ift.tt/19nhvDc

“An Oasis for Aliens”

Comments



from Hacker News http://ift.tt/1Nr5I5M

My Top essentials tools I could not work without

Comments



from Hacker News http://ift.tt/1DjFeSr

Dunning-Kruger and other memes

Comments



from Hacker News http://ift.tt/1IebfJu

OTree: a framework for multiplayer strategy games and economics experiments

Comments



from Hacker News http://ift.tt/1GFrml3

The Systemd Project Forks the Linux Kernel

Comments



from Hacker News http://ift.tt/1NvL58E

The Great Green Wall of Africa

Comments



from Hacker News http://ift.tt/18nwlXB

MGBA: Game Boy Advance Emulator

Comments



from Hacker News http://ift.tt/1NtgqXt

Tutorial: Theorem Proving in Lean

Comments



from Hacker News http://ift.tt/1IAUwkq

Amazon Home Services

Comments



from Hacker News http://ift.tt/1BVnTbe

For Hardware Makers, Sharing Their Secrets Is Now Part of the Business Plan

Comments



from Hacker News http://ift.tt/1DbBfWh

Interest in Bitcoin Grows on Wall Street

Comments



from Hacker News http://ift.tt/1yqw0MG

Apple Watch app developers are facing weird problems

Comments



from Hacker News http://ift.tt/1Nt8bLh

​Puush calls for password change after malware hit

Online screenshot-sharing service Puush is warning its users to change their passwords after it emerged that the platform had been infected with malware.









from Latest topics for ZDNet in Security http://ift.tt/19mmfJl

Why you shouldn’t believe that exciting new medical study

Comments



from Hacker News http://ift.tt/1Or7vsX

Death March: The Long, Tortured Journey of Homefront (2012)

Comments



from Hacker News http://ift.tt/QpXl12

Sunday, March 29, 2015

The Mercedes Robo-Car That Made Me Want to Stop Driving

Comments



from Hacker News http://ift.tt/1xU2Zc3

Intel’s Powered-Up Core I7 Broadwell Mini PC

Comments



from Hacker News http://ift.tt/1xq1veB

An experimental Go cross platform UI library

Comments



from Hacker News http://ift.tt/1x8MbmY

Tim Cook: Pro-discrimination ‘religious freedom’ laws are dangerous

Comments



from Hacker News http://ift.tt/19kqrZW

Puush hacked, installs malware via auto-updater

Comments



from Hacker News http://ift.tt/1Nwghoi

Announcing: open sourcing of ide-back end

Comments



from Hacker News http://ift.tt/1a9ucT2

In Silicon Valley, Auto Racing Becomes a Favorite Hobby for Tech Elites

Comments



from Hacker News http://ift.tt/1NwuYHP

Show HN: Squirrel feeder based on Raspberry Pi

Comments



from Hacker News http://ift.tt/1ElrxSU

Racing goes electric: At the track with Formula E, the first e-racing series

Comments



from Hacker News http://ift.tt/19gLhJz

Aeron: High-Performance Open Source Message Transport [video]

Comments



from Hacker News http://ift.tt/1ClznIz

TPP leak: states give companies the right to repeal nations' laws

Comments



from Hacker News http://ift.tt/1EYR9lT

V8worker – Minimal golang binding to V8

Comments



from Hacker News http://ift.tt/1D4PoEX

Why America's obsession with STEM education is dangerous

Comments



from Hacker News http://ift.tt/19wo99K

Context Free Art

Comments



from Hacker News http://ift.tt/ACDK8h

How do I find Waldo with Mathematica?

Comments



from Hacker News http://ift.tt/1ON4PGe

Twitter Data Mining Reveals the Origins of Support for Islamic State

Comments



from Hacker News http://ift.tt/1Hqwpn7

The Wacky, Wiggly, Razor-Thin World of the Flexi Disc

Comments



from Hacker News http://ift.tt/1E6XYUV

Predicting Test Failures

Comments



from Hacker News http://ift.tt/1EnTEN5

Red Hat OpenShift 3 design document

Comments



from Hacker News http://ift.tt/1rvkEEa

The story of Monkey Island

Comments



from Hacker News http://ift.tt/19gEYWA

Retiring SRFI

Comments



from Hacker News http://ift.tt/1a5ypXT

Why Aren't We Reading Turing?

Comments



from Hacker News http://ift.tt/1D64Ikx

U.S. Coding Website GitHub Hit with Cyberattack – WSJ

Comments



from Hacker News http://ift.tt/1G5h257

Introduction to Apache Mesos

Comments



from Hacker News http://ift.tt/1F6k8nZ

Services: Declaration of Independence

Comments



from Hacker News http://ift.tt/1Cme1e7

Ask HN: How do you keep track of everything?

Comments



from Hacker News http://ift.tt/1ON4O5a

Uber possibly hacked

Comments



from Hacker News http://ift.tt/1NoIuNw

Ellen Pao V. Kleiner Perkins Wrap-Up

Comments



from Hacker News http://ift.tt/1Ckurnp

Neurokernel: Emulating the Fruit Fly Brain

Comments



from Hacker News http://ift.tt/1G53JBA

Linux kernel memory management Part 1

Comments



from Hacker News http://ift.tt/19grFW8

Server-Side Validering Med PHP – Free Ressources

Comments



from Hacker News http://ift.tt/19gksVX

Sheep Marketplace Owner Arrested While Trying to Buy Luxury Home

Thomas JiÅ™ikovský, an alleged Owner of one of the most popular Darknet website ‘Sheep Marketplace,’ has been arrested after laundering around $40 Million, making it one of the biggest exit scams in Darknet history. After the arrest of Silk Road owner 'Ross Ulbricht' in 2013 -- Sheep Marketplace became the next famous anonymous underground marketplace among Black Market customers for





from The Hacker News http://ift.tt/1ypqz0u

Ask HN: I want to write a simple webapp, how should I start?

Comments



from Hacker News http://ift.tt/19gktcw

Messaging Apps Shouldn't Make Money

Comments



from Hacker News http://ift.tt/1G53JBy

Before There Were Stars: The unlikely heroes that made starlight possible

Comments



from Hacker News http://ift.tt/1FexPCJ

The Elevators That Never Stop

Comments



from Hacker News http://ift.tt/PYg0Ri

Competition and working conditions

Comments



from Hacker News http://ift.tt/1EQ4NoS

4 proven ways that data-driven insights are changing businesses today: http://e...






EMC logo
4 proven ways that data-driven insights are changing businesses today: http://emc.im/1NpyuDL










via EMC Feeds http://ift.tt/1D76YrF

4 proven ways that data-driven insights are changing businesses today: http://e...






EMC logo
4 proven ways that data-driven insights are changing businesses today: http://emc.im/1NpyuDL










via EMC Feeds http://ift.tt/1D76YrF