- bertolami.com
-
Getting Started With Elm | The Pragmatic Studiopragmaticstudio.com
The Pragmatic Studio: Top developer training from the folks who wrote the books -
Why influence mapping matters to journalism - pudo.org (Friedrich Lindenberg)pudo.org
Building Grano started with a desire to map political and economic influences. Developing it further has made us re-examine our motivations: why would journalists want software to help map out the connections between people in politics and industry? -
Introducing BitShares Object Graphbytemaster.bitshares.org
Join me as I explore free market solutions to secure life, liberty, and property for all. -
Welcoming Brad Feld to the Mattermark Team — Announcing our $6.5M Series Amedium.com
Mattermark has closed a $6.5M Series A led by Foundry Group, with Brad Feld joining our Board of Directors. - sccn.ucsd.edu
-
The Real Story of How America Became an Economic Superpowertheatlantic.com
Adam Tooze's study of the two world wars traces a new history of the 20th century. - medium.com
-
What happens when a software bot goes on a darknet shopping spree?theguardian.com
The Random Darknet Shopper, with bitcoin to burn, has purchased counterfeit jeans, dodgy cigs and even a bag of ecstasy tablets. Who is legally liable? -
The Missing Borgestheparisreview.org
Seven years ago, a stolen first edition of Borges’s early poems was returned to Argentina’s National Library. But was it the right copy? -
What's Tylenol Doing to Our Minds?theatlantic.com
The same pathways that help with physical pain seem to moderate existential distress. - collegetransitions.com
-
Introducing Slurslur.io
Slur is an open source, decentralized and anonymous marketplace for the selling of secret information in exchange for bitcoin. - github.com
- mrale.ph
- wsj.com
- news.ycombinator.com
-
Chase Attackers Exploited Basic Flawsbankinfosecurity.com
A new report now claims the breach at JPMorgan Chase is linked to a server the bank’s security team overlooked when upgrading to two-factor authentication -
How Should U.S. Respond to Sony Breach?bankinfosecurity.com
Seeking a measured response to an attack on a non-critical infrastructure company requires carefully balancing a strong message to North Korea with one that doesn't - ajkl.github.io