- Conversations with a six-year-old on functional programmingbyorgey.wordpress.com
- The Ulam Spiral of Primes (2012)scienceblogs.com
- Fonts for Complex Datatypography.com
- List of screw driveswikipedia.org
- Tech watchdogs call on Facebook, Google for transparency around censored contenttechcrunch.com
- Ask HN: How do you continuously monitor web logs for hack attempts?
- The Weird Science Behind Chain Restaurant Menusvice.com
- The Economics of Writing a Technical Bookmedium.com
- Cutting Edge Deep Learning for Coders, Part 2fast.ai
- Max Roser: “The world split into 7 equal areas of population.”twitter.com
- CSE 392 – Programming Challenges (2012)stonybrook.edu
- Show HN: How to Tune a Guitarmathisonian.github.io
- Cambly (YC W14) is hiring a lead iOS engineer to transform language learningcambly.com
- Examples of marketing tacticsjohnmcelborough.com
- The path that the decimal number system took from India to medieval Europethonyc.wordpress.com
- Who controls glibc?lwn.net
- Using Prediction Markets to Track Information Flows: Evidence from Google [pdf]berkeley.edu
- Math from Three to Seven: The Story of a Mathematical Circle for Preschoolers [pdf]msri.org
- That New Memory Smell: Tech Can Tell If Your Flash Is New or Recycledieee.org
- How We Found New Patterns in LA’s Homeless Arrest Dataopennews.org
- How to get your personal data from apps you usemydatarequest.com
- Operation Ivy Bellswikipedia.org
- Uber vehicle reportedly saw but ignored woman it strucktechcrunch.com
- Volvo to Use Google Assistant, Play Store and Maps in Next-Gen Infotainmentvolvocars.com
- Bitcoin Sees Wall Street Warm to Trading Virtual Currencynytimes.com
- Three Decades Later, Mystery Numbers Explainedquantamagazine.org
- Walmart Beats Amazon in $15B Flipkart Battlebloomberg.com
- As Kubernetes grows, a startup ecosystem develops in its waketechcrunch.com
- Equifax statement regarding extent of security incident announced Sep 7 2017sec.gov
- How to accelerate revenue for SaaS startupsplainflow.com