Newest Stories by apg
Home
Recent
Comments
Search
Login
1
Glyph Bitmap Distribution Format
☶
design
graphics
en.wikipedia.org
via
apg
2 years ago
|
cached
|
no comments
0
11
PyPy 4.0.0 Released - A Jit with SIMD Vectorization and More
compilers
python
morepypy.blogspot.com
via
apg
2 years ago
|
cached
|
5 comments
5
-1
Forget Standing Desks: Are You Ready to Lie Down and Work?
practices
wired.com
via
apg
2 years ago
|
cached
|
1 comment
1
4
In Which Phil Stops By
games
lua
person
us11.campaign-archive2.com
authored by
apg
2 years ago
|
cached
|
no comments
0
14
hifi: hacks I find interesting
show
sigusr2.net
authored by
apg
2 years ago
|
cached
|
2 comments
2
39
Scanabanana
show
lisp
programming
sigusr2.net
authored by
apg
3 years ago
|
cached
|
6 comments
6
5
Deploying Go Apps to Heroku with Docker
go
web
icanhazdowntime.org
via
apg
3 years ago
|
cached
|
2 comments
2
6
Mozilla InvestiGator
security
mig.mozilla.org
via
apg
3 years ago
|
cached
|
no comments
0
5
On eval in dynamic languages generally and in Racket specifically (2011)
lisp
practices
programming
blog.racket-lang.org
via
apg
3 years ago
|
cached
|
no comments
0
7
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
privacy
security
tau.ac.il
via
apg
3 years ago
|
cached
|
1 comment
1
6
Scaling concurrent log-structured data stores
video
databases
youtube.com
via
apg
3 years ago
|
cached
|
no comments
0
3
Yacking About Yet Another Yak Shave Called Lack
practices
programming
sigusr2.net
via
apg
3 years ago
|
cached
|
2 comments
2
3
Systems at Facebook Scale (Applicative Conference 2015)
video
scaling
youtube.com
via
apg
3 years ago
|
cached
|
1 comment
1
6
Reliable Cron across the Planet
distributed
queue.acm.org
via
apg
3 years ago
|
cached
|
no comments
0
17
OpenSSL Security Advisory [19 Mar 2015]
security
openssl.org
via
apg
3 years ago
|
cached
|
2 comments
2
8
Fast Bounded-Concurrency Hash Tables
compsci
programming
backtrace.io
via
apg
3 years ago
|
cached
|
no comments
0
21
Forthcoming OpenSSL releases (undisclosed vulnerabilities)
security
mta.openssl.org
via
apg
3 years ago
|
cached
|
14 comments
14
1
Reduce, Reuse, Recycle
philosophy
sigusr2.net
via
apg
3 years ago
|
cached
|
no comments
0
4
Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise
privacy
security
firstlook.org
via
apg
3 years ago
|
cached
|
no comments
0
15
Russian researchers expose breakthrough U.S. spying program
privacy
security
mobile.reuters.com
via
apg
3 years ago
|
cached
|
8 comments
8
5
Worst-Case Distributed Systems Design
distributed
bailis.org
via
apg
3 years ago
|
cached
|
1 comment
1
14
modules + network = microservices
distributed
programming
programmingisterrible.com
via
apg
3 years ago
|
cached
|
1 comment
1
22
Hackers can't solve Surveillance
culture
privacy
dmytri.info
via
apg
3 years ago
|
cached
|
1 comment
1
12
Randomness Is Pretty Great
compsci
freefour.com
via
apg
3 years ago
|
cached
|
no comments
0
3
Analysis of a Brute-Force Shuffle
compsci
programming
freefour.com
via
apg
3 years ago
|
cached
|
no comments
0
<< Page 3
|
Page 5 >>