-
One Week of Harassment on Twitterfemfreq.tumblr.com
Ever since I began my Tropes vs Women in Video Games project, two and a half years ago, I’ve been harassed on a daily basis by irate gamers angry at my critiques of sexism in video games. It can sometimes be difficult to effectively communicate just ho... -
Not So Spooky: Linux "Ghost" Vulnerabilityblog.trendmicro.com
The recent GHOST vulnerability in Linux is difficult to exploit and has a limited attack surface. -
epistemex/transformation-matrix-jsgithub.com
transformation-matrix-js - 2D transformation matrix implementation for JavaScript -
Netflix’s Secret Special Algorithm Is a Human - The New Yorkernewyorker.com
I do not doubt that companies like Netflix, Amazon, and Google rely more on data every day. But the best human curators still maintain their supremacy. -
Drone Maker to Prevent Some Device Flights Over D.C.wsj.com
In response to the drone crash at the White House this week, the Chinese maker of the device that crashed said it is updating its drones to disable them from flying over much of Washington, D.C. -
Two weeks after Zuckerberg said ‘je suis Charlie,’ Facebook begins censoring images of prophet Muhammadwashingtonpost.com
The incident underscores exactly how difficult it is to preach free speech as an international social network. -
Announcing Hound: A Lightning Fast Code Search Toolcodeascraft.com
Today we are open sourcing a new tool to help you search large, complex codebases at lightning speed. We are calling this tool Hound. We’ve been using it internally for a few months, and it has bec... - fieldturf.com
-
The Connection Between Viral Events, Traffic, and Sales | Deskblog.desk.pm
I shared publicly that one of my previous blog posts “went viral,” as they say, when it hit the Front Page of Hacker News. Consequently, this small indie developer blog saw the biggest traffic day of all time and broke every traffic record to boot. Nee... - vivaldi.com
- pinegram.com
- madebymike.com.au
-
No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn | WIREDwired.com
The debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates c... - labs.domipheus.com
-
Deploying tor relaysblog.mozilla.org
On November 11, 2014 Mozilla announced the Polaris Privacy Initiative. One key part of the initiative is us supporting the tor network by deploying tor ... -
Where does this come from? #UX |blog.pipesapp.com
<p>Earlier this week, a thought crossed my mind. “Where does this come from?”<br /> ‘This’, in this context is the experience which a user must totally sense to overcome his exact needs.</p> -
Boom: Inside a British Bank-Bombing Spreebloomberg.com
No American ATM has ever been robbed with explosive gas. The same was true in Britain — until 2013. Now there have been more than 90. Inside the birth of a bomb spree. - ryanhileman.info
-
RiotJS Examplerobertwpearce.com
When I look at any of the myriad JavaScript UI libraries out there, I now ask two questions: -
9 Types of Cardio Exercises Very Effective in Weight Loss - HealthQuehealthque.com
Cardio exercises are very effective ways to keep yourself fit and strong. These 9 types of Cardio exercises will help you to lose weight quickly and without any pain.