-
How We Deploy Python Code Without Gitnylas.com
We love Python at Nylas, but tooling around deploying Python is sparse. In this post, we'll explain how we use Debian packages to solve this problem. - tetrisconcept.net
-
Compare LGBT Rights Between Countries | Equaldexequaldex.com
Compare LGBT rights and public opinion data between any country, state, or province. - handbook.selflanguage.org
-
Announcing XHP-JS: Building efficient user interface components with Hack, React, and XHPcode.facebook.com
Today's release of XHP-JS provides the ability to add client-side logic to XHP components and even to create instances of React components from Hack code. -
One Man’s Quest to Save the Most Colossal Fishes on Earthwired.com
Zeb Hogan has spent a decade tracking the world's biggest fish. But these giants may vanish before we get know them. - crymyip.com
-
Our Take on NoSQL DBMS Benchmarks and the New OrientDB Performance Challenge - OrientDB Multi-Model NoSQL Databaseorientdb.com
Vote on Hacker News A recent influx of vendor-sponsored NoSQL database benchmarks have been circulating and creating some buzz. Many have asked us to … - medium.com
-
Senior Full-Stack Engineer (Engineer #1) - Pomello Jobs on AngelListangel.co
Apply now for Senior Full-Stack Engineer (Engineer #1) job at Pomello in San Francisco - Pomello helps companies screen talent for culture fit. Core features include: - Company culture measurement - Culture analytics - Candidate screening - prodigynotes.com
-
Pixar's Scientific Method - The New Yorkernewyorker.com
Pixar co-founder Ed Catmull explains the fusion of art and technology to museum visitors: “It’s hard and messy, but it is fun.” -
No One Is Safe: $300 Gadget Steals Encryption Keys out of the Air, and It's Nearly Unstoppablebgr.com
Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption keys from your laptop right out of the air. You can... -
The Tech Industry Is In Denial, But The Bubble Is About To Bursttechcrunch.com
Euphoric reaction to superstar tech businesses is rampant -- so much so that the tech industry is in denial about looming threats. The tech industry is in a.. -
Office of Personnel Management Says Hackers Got Data of Millions of Individualsnytimes.com
Hackers who intruded into the federal personnel agency’s computer networks last year got sensitive information about 21.5 million people, officials said. -
What Did People Do to Their Teeth Before Braces?theatlantic.com
How did orthodontia—expensive, painful, and often medically unnecessary—become so popular? -
Elm for the Frontend, Right Nowbendyworks.com
Elm is a frontend programming language that combines HTML, CSS, and JavaScript into a highly-effective functional language for building reactive UIs -
Ole André Vadla Ravnås - Frida: The engineering behind the reverse-engineeringyoutube.com
Ever wondered how to build your own debugger? Did you complete that assembly tutorial as a teenager, but never found any real life use for low-level programm... - gamasutra.com
-
Confessions of an Ex-Opponent of Whois Privacycircleid.com
The following is the easyDNS response to ICANN's public comment period on GNSO Privacy & Proxy Services Accreditation Issues Working Group Initial Report. The public comment period is open until July 7, 2015. We strongly urge you to make your voice...