#rss-bot | Logs for 2015-12-28

« return
[00:09:47] <Bender> [ForbesTech] - Buffett's Bolshevik: Dissecting NV Energy's Soviet-Style Sabotage Of Distributed Energy - http://www.forbes.com
[00:34:57] <Bender> [SoylentNews] - Feeling Abandoned by Adobe? Check Out the Video Editing Suites for Penguins - http://sylnt.us
[00:35:10] <Bender> [HackerNews] - Motivation, Stress and Neatness - http://www.amitshanbhag.com
[00:50:20] <Bender> [HackerNews] - North Korea's computer operating system mirrors its political one - http://www.reuters.com
[01:00:28] <Bender> [HackerNews] - A Letter to a Young Programmer Considering a Startup (2013) - https://al3x.net
[01:10:35] <Bender> [HackerNews] - At Theranos, Many Strategies and Snags - http://www.wsj.com
[01:15:39] <Bender> [HackerNews] - GitHub Email Thief - http://maxmautner.com
[01:15:43] <Bender> [HackerNews] - The New Masters of the Universe: From Silicon Valley, a New Elite Is Coming - http://www.spiked-online.com
[01:20:43] <Bender> [HackerNews] - What is the Birch and Swinnerton-Dyer conjecture? – lccs - http://www.math.harvard.edu
[02:04:32] Bytram|away is now known as Bytram
[02:06:20] <Bender> [HackerNews] - How bad are things? - http://slatestarcodex.com
[02:06:24] <Bender> [HackerNews] - Why software ecosystem of single-board computers is so ugly? - https://news.ycombinator.com
[02:21:30] <Bender> [HackerNews] - Any Suggestions for My Awesome Reference Tools Repo? - http://sylnt.us
[02:21:34] <Bender> [ITWorld] - New Chinese law takes aim at encryption - http://www.itworld.com
[02:31:37] <Bender> [HackerNews] - ISIS Influence on Web Prompts Second Thoughts on First Amendment - http://www.nytimes.com
[02:31:41] <Bender> [HackerNews] - ISIS Influence on Web Prompts Second Thoughts on First Amendment - http://www.nytimes.com
[02:36:30] <Bender> [SoylentNews] - Hierarchy is Detrimental for Human Cooperation - http://sylnt.us
[02:41:45] <Bender> [HackerNews] - Startup Failure by Industry - http://www.statisticbrain.com
[02:46:49] <Bender> [HackerNews] - Four Columbia House insiders explain the shady math behind “8 CDs for a penny” - http://www.avclub.com
[02:51:53] <Bender> [HackerNews] - Animals think, therefore - http://www.economist.com
[03:00:12] Bytram is now known as Bytram|away
[03:07:06] <Bender> [HackerNews] - React/JavaScript fatigue - https://medium.com
[03:07:10] <Bender> [HackerNews] - Gonorrhoea 'could become untreatable' - http://www.bbc.com
[03:27:04] <Bender> [ArsTechnica] - Scientists find 1,500-year-old Viking settlement beneath new airport site - http://arstechnica.com
[03:27:20] <Bender> [HackerNews] - Getting Started with Apache Zeppelin and Airbnb Visualization - http://www.racketracer.com
[03:27:24] <Bender> [HackerNews] - Elemental: Distributed-memory dense and sparse-direct linear algebra and optimzation - http://sylnt.us
[03:37:29] <Bender> [HackerNews] - Should I use React.createClass, ES6 Classes or stateless functional components? - http://jamesknelson.com
[04:02:47] <Bender> [HackerNews] - Sanders: Why I don't care about Edward Snowden - http://www.sanders.senate.gov
[04:28:06] <Bender> [HackerNews] - Test results for Broadwell and Skylake - http://www.agner.org
[04:33:08] <Bender> [ForbesTech] - How To Share Apple Live Photos On Facebook - http://www.forbes.com
[04:33:10] <Bender> [HackerNews] - If Doctors Learned to Cook, They Might Give Better Advice - http://www.npr.org
[04:33:14] <Bender> [HackerNews] - Pricks - http://pricks.com
[04:38:02] <Bender> [SoylentNews] - 19-Hour "Standoff" Ends With Cops Destroying an Empty House - http://sylnt.us
[04:38:14] <Bender> [ForbesTech] - Why The 'Star Wars' Rebel Alliance Is Nothing Like ISIS - http://www.forbes.com
[05:04:27] <Bender> [TheScientist] - New Species Abound - http://www.the-scientist.com
[05:08:38] <Bender> [HackerNews] - Show HN: Created a Workout tracking web app during xmas vacation - http://www.strengthstats.com
[05:18:44] <Bender> [HackerNews] - How much money has been spent bringing Matt Damon back home? - https://www.quora.com
[05:34:04] <Bender> [MITTech] - Best of 2015: The Truth About Smartphone Apps That Secretly Connect to User Tracking and Ad Sites - http://www.technologyreview.com
[05:34:08] <Bender> [MITTech] - Tax Credit Extension Gives Solar Industry a New Boom - http://www.technologyreview.com
[05:34:12] <Bender> [MITTech] - Four Important Things to Expect in Virtual Reality in 2016 - http://www.technologyreview.com
[05:59:15] <Bender> [HackerNews] - The man who made Edward Snowden inevitable - http://www.economist.com
[06:14:25] <Bender> [ForbesTech] - Japan's Space Security Worries Are Not Just China And N. Korea, But Also The U.S. - http://www.forbes.com
[06:19:30] <Bender> [HackerNews] - Legacy Verified: Legacy Solutions - https://medium.com
[06:25:25] <Bender> [TheRegister] - Jez Humble to deliver keynote at Continuous Lifecycle London - http://go.theregister.com
[06:29:38] <Bender> [HackerNews] - Nearley 2.0.0: a complete JavaScript parser toolkit - http://nearley.js.org
[06:39:34] <Bender> [SoylentNews] - antiX MX-15 Linux Released; Based on Debian 8.2 Jessie; Has Xfce 4.12 - http://sylnt.us
[06:54:55] <Bender> [ForbesTech] - Wrapping Up A Busy Year For Digital Storage - http://www.forbes.com
[07:04:55] <Bender> [Bugtraq] - Bugtraq: libtiff bmp file Heap Overflow (CVE-2015-8668) - http://www.securityfocus.com
[07:10:11] <Bender> [HackerNews] - NSA knew about Juniper backdoors and kept quiet about them - http://thenextweb.com
[07:15:13] <Bender> [HackerNews] - The DevOp - https://thedevop.com
[07:15:17] <Bender> [HackerNews] - Hashcat and oclHashcat have gone open source - https://hashcat.net
[07:42:42] -!- u has quit [Ping timeout: 268 seconds]
[07:43:19] -!- richardboegliAFK has quit [Ping timeout: 268 seconds]
[07:43:19] -!- CoolHand has quit [Ping timeout: 268 seconds]
[07:43:56] -!- stderr has quit [Ping timeout: 268 seconds]
[07:43:56] -!- Deucalion has quit [Ping timeout: 268 seconds]
[07:43:56] -!- chromas has quit [Ping timeout: 268 seconds]
[08:00:02] -!- richardboegli [richardboegli!~r@053-536-545-43.dyn.iinet.net.au] has joined #rss-bot
[08:00:08] -!- juggs [juggs!~juggs@Soylent/Staff/IRC/juggs] has joined #rss-bot
[08:00:08] -!- mode/#rss-bot [+o juggs] by Imogen
[08:00:13] -!- u [u!~u@192.65.nmh.hwt] has joined #rss-bot
[08:00:23] -!- stderr [stderr!~pohol@GetOffMyLawn/stderr] has joined #rss-bot
[08:00:48] <Bender> [HackerNews] - Minorities exploited by Warren Buffett’s mobile-home empire - http://www.seattletimes.com
[08:00:52] <Bender> [HackerNews] - German code-breakers expose huge credit card flaw - https://www.rt.com
[08:00:56] -!- chromas [chromas!~chromas@0::1] has joined #rss-bot
[08:01:55] -!- CoolHand [CoolHand!~CoolHand@Soylent/Staff/Editor/CoolHand] has joined #rss-bot
[08:16:41] <Bender> [PhysOrg] - River ecosystems show 'incredible' initial recovery after dam removal - http://phys.org
[08:16:45] <Bender> [PhysOrg] - Spain deploys aircraft to battle wildfires - http://phys.org
[08:31:10] <Bender> [HackerNews] - What is the Birch and Swinnerton-Dyer conjecture? - http://www.math.harvard.edu
[08:41:07] <Bender> [SoylentNews] - How Hollywood Caught the UK's Most Prolific Movie Pirates - http://sylnt.us
[08:46:22] <Bender> [HackerNews] - Former Columbia House insiders explain the shady math behind “8 CDs for a penny” - http://www.avclub.com
[08:51:26] <Bender> [HackerNews] - Core Bitcoin Devs Leave Project, Create New Currency Called Decred - http://news.softpedia.com
[08:51:30] <Bender> [HackerNews] - Ask HN: Why is the software ecosystem of single-board computers so ugly? - https://news.ycombinator.com
[08:51:34] <Bender> [HackerNews] - Outdated payment protocols expose customers and merchants - https://srlabs.de
[08:56:30] <Bender> [HackerNews] - Show HN: CodeUpStart – Learn Python/Flask by Cloning Kickstarter - http://www.codeupstart.com
[09:06:37] <Bender> [HackerNews] - The Pirate Book - http://thepiratebook.net
[09:06:41] <Bender> [HackerNews] - On the Surfaces of Things: Mathematics and the Realm of Possibility - http://www.hypocritereader.com
[09:21:49] <Bender> [HackerNews] - Input methods for Unicode characters in editors and the shell - http://doc.perl6.org
[09:21:53] <Bender> [HackerNews] - The Ancient Egyptian Discovery of Algol’s Period Confirmed - http://journals.plos.org
[09:21:57] <Bender> [HackerNews] - 32c3: edited recordings - https://media.ccc.de
[09:26:53] <Bender> [HackerNews] - Should more OEMs cater to the small smartphone segment? - http://www.androidauthority.com
[09:26:57] <Bender> [HackerNews] - Python concept learned by solving a simple problem - http://www.ownlocal.xyz
[09:27:01] <Bender> [HackerNews] - Reforms Abound for Cross-Border Data Requests - https://www.eff.org
[09:27:05] <Bender> [HackerNews] - The Ancient Egyptian Discovery of Binary Star Algol’s Period Confirmed - http://journals.plos.org
[09:27:09] <Bender> [HackerNews] - Naked Unicorns in Subprime Valley - http://www.worth.com
[09:37:00] <Bender> [HackerNews] - Sugarfoot Stomp - http://www.oxfordamerican.org
[09:52:10] <Bender> [ForbesTech] - Japanese Fans Aren't Happy With 'Gundam Extreme Versus Force' But They've Got It Wrong - http://www.forbes.com
[09:52:12] <Bender> [HackerNews] - The Anamorphic Skull in Holbein's “The Ambassadors” - https://en.wikipedia.org(Holbein)#Anamorphic_skull
[09:57:14] <Bender> [ForbesTech] - Top Web Design Trends To Watch In 2016 - http://www.forbes.com
[09:57:16] <Bender> [HackerNews] - DHH on the immediacy of PHP (2008) - http://david.heinemeierhansson.com
[10:12:29] <Bender> [HackerNews] - ES6 Rest/Spread, Defaults and Destructuring - http://www.datchley.name
[10:12:33] <Bender> [HackerNews] - 32c3 media - https://media.ccc.de
[10:27:39] <Bender> [HackerNews] - Programming Languages: Application and Interpretation - http://cs.brown.edu
[10:42:39] <Bender> [SoylentNews] - What to do with Old Smart Phones? - http://sylnt.us
[10:42:52] <Bender> [HackerNews] - Used bookstores are making an unlikely comeback - https://www.washingtonpost.com
[10:52:58] <Bender> [HackerNews] - Show HN: CodeHalf – Write Code Everyday, new design and new features - http://codehalf.com
[11:03:06] <Bender> [HackerNews] - Fast Data Transfer - http://monalisa.cern.ch
[11:13:10] <Bender> [ComputerWorld] - So you expect an accountant to be detail oriented? - http://rss.computerworld.com
[11:13:16] <Bender> [HackerNews] - Social Engineering from Kevin Mitnick - http://henrikwarne.com
[11:14:06] <Bender> [TheRegister] - Bah humbug. It's Andrew's Phones of the Year - http://go.theregister.com
[11:23:24] <Bender> [InnovationsReport] - Gene analysis could allow the risk determination for esophageal cancer - http://www.innovations-report.com
[11:23:28] <Bender> [InnovationsReport] - Understanding the mechanism for generating electric current without energy consumption at room temperature - http://www.innovations-report.com
[11:23:32] <Bender> [InnovationsReport] - Lifestyle switching – Bacillus cereus is able to resist certain antibiotic therapies - http://www.innovations-report.com
[11:23:36] <Bender> [InnovationsReport] - A vocabulary of ancient peptides - http://www.innovations-report.com
[11:43:33] <Bender> [ComputerWorld] - The dark side of the coming chatbot revolution - http://rss.computerworld.com
[11:43:37] <Bender> [ComputerWorld] - 5 helpful Chromebook tools for marking up documents, photos and web pages - http://rss.computerworld.com
[11:43:39] <Bender> [HackerNews] - Simplified and community-driven man pages - http://sylnt.us
[11:48:41] <Bender> [HackerNews] - Japan, South Korea Reach Agreement on ‘Comfort Women’ - http://www.wsj.com
[11:58:47] <Bender> [ForbesTech] - Jaguar XF, On Sale Now, Will Joined By XE Sedan, And SUV In 2016 - http://www.forbes.com
[11:58:51] <Bender> [ForbesTech] - Apple's Big Problem With The Apple Watch Must Be Fixed - http://www.forbes.com
[11:58:55] <Bender> [ForbesTech] - The World's Most Expensive Watches - http://www.forbes.com
[12:03:50] <Bender> [ForbesTech] - Samsung Galaxy S6 and S6 Edge - http://www.forbes.com
[12:03:52] <Bender> [HackerNews] - Secret Atari DRAM Resale Operation Revealed by FBI (2013) - http://www.atariarchives.org
[12:08:40] <Bender> [ArsTechnica] - The App-ocalypse: can Web standards make mobile apps obsolete? - http://arstechnica.com
[12:08:54] <Bender> [ForbesTech] - House Of Representatives To Tackle Concussions In 2016 - http://www.forbes.com
[12:13:49] <Bender> [SoylentNews] - Web Design Tools for Moderate Users - http://sylnt.us
[12:19:04] <Bender> [HackerNews] - Characterizing the SBM-20 Geiger-Müller Tube - http://uvicrec.blogspot.com
[12:29:34] Bytram|away is now known as Bytram
[12:34:16] <Bender> [HackerNews] - Common Stock Ownership Spreads Among Startup Investors - http://bits.blogs.nytimes.com
[12:44:19] <Bender> [ComputerWorld] - Samsung Galaxy S7 rumors -- magnesium, iris scanner, and panic - http://rss.computerworld.com
[12:49:27] <Bender> [HackerNews] - Digital History Projects That Dazzled Us in 2015 - http://www.slate.com
[12:54:31] <Bender> [HackerNews] - How Blue Lights on Train Platforms Combat Tokyo’s Suicide Epidemic - https://nextcity.org
[12:55:16] <Bender> [Schneier] - NSA/GCHQ Exploits Against Juniper Networking Equipment - https://www.schneier.com
[12:59:29] <Bender> [ComputerWorld] - New Chinese law takes aim at encryption - http://rss.computerworld.com
[13:04:37] <Bender> [ForbesTech] - Should You Invest In Bitcoin? 10 Arguments Against As Of December 2015 - http://www.forbes.com
[13:04:39] <Bender> [HackerNews] - EverythingMe – Open and Out - https://medium.com
[13:05:25] <Bender> [SecurityWeek] - Vulnerable Joomla Servers See 16,000 Daily Attacks - http://feedproxy.google.com
[13:09:43] <Bender> [HackerNews] - Analysis of .NET Core Libraries (CoreFX) - http://www.viva64.com
[13:09:47] <Bender> [HackerNews] - GWT: The Good Bits - http://gwt.fr
[13:09:51] <Bender> [HackerNews] - Firefox's Share Falls Under 20% in November 2015 - http://www.w3schools.com
[13:09:55] <Bender> [HackerNews] - Unused logo designs, available for free - http://logodust.com
[13:09:59] <Bender> [HackerNews] - Methods count for Android libraries - http://www.methodscount.com
[13:14:35] <Bender> [SoylentNews] - What to do with Old Smart Phones? [Updated] - http://sylnt.us
[13:20:37] <Bender> [ScienceMag] - Feature: Solving the mystery of dog domestication - http://news.sciencemag.org
[13:24:52] <Bender> [ForbesTech] - Galaxy S7 Leak Reveals Two New Sizes - http://www.forbes.com
[13:24:54] <Bender> [HackerNews] - Do Data Have Politics? - http://www.mpiwg-berlin.mpg.de
[13:24:56] <Bender> [ForbesTech] - Galaxy S6 Edge Vs Galaxy S6 - http://www.forbes.com
[13:35:00] <Bender> [ForbesTech] - Top Energy Issues For 2015-2016: Looking Back While Going Forward - http://www.forbes.com
[13:35:48] <Bender> [SecurityWeek] - China Adopts First Counter-Terrorism Law - http://feedproxy.google.com
[13:39:50] <Bender> [ArsTechnica] - Yandex worker stole search engine source code, tried selling for just $40K - http://arstechnica.com
[13:39:54] <Bender> [ArsTechnica] - Mysterious collector opens world’s largest private Apple exhibition in Prague - http://arstechnica.com
[13:40:06] <Bender> [HackerNews] - TSA Body Scan? Just Say 'No,' Leading Expert Says - http://www.forbes.com
[13:40:10] <Bender> [HackerNews] - A Specification for a Conservation Pamphlet Binding Structure - http://cool.conservation-us.org
[13:40:14] <Bender> [HackerNews] - ParparVM – Open Source JVM for iOS - http://sylnt.us
[13:40:18] <Bender> [HackerNews] - Ancient sword suggests Romans might have discovered America - http://www.bostonstandard.co.uk
[13:40:22] <Bender> [HackerNews] - ASCII table – Pronunciation Guide - http://ascii-table.com
[13:40:26] <Bender> [HackerNews] - CS143: Compilers (2011) - http://www.keithschwarz.com
[13:40:48] <Bender> [PhysOrg] - Israeli defense official sacked for information breach - http://phys.org
[13:40:52] <Bender> [PhysOrg] - Facebook founder urges India to approve free Internet plan - http://phys.org
[13:40:56] <Bender> [PhysOrg] - Rome, Milan clamp down on cars as smog smothers Italy - http://phys.org
[13:41:00] <Bender> [PhysOrg] - 'Forbidden' substances on super-Earths - http://phys.org
[13:41:04] <Bender> [PhysOrg] - Project scientist discusses the James Webb Space Telescope - http://phys.org
[13:45:54] <Bender> [PhysOrg] - Image: For the first time ever, a Curiosity Mastcam self-portrait from Mars - http://phys.org
[13:45:58] <Bender> [PhysOrg] - Scientists identify fragments of proteins that already existed billions of years ago - http://phys.org
[13:46:02] <Bender> [PhysOrg] - Optoelectronic microprocessors built using existing chip manufacturing - http://phys.org
[13:46:06] <Bender> [PhysOrg] - 'Shared bad memories' bind fighters and terrorists to their groups - http://phys.org
[13:49:57] <Bender> [ArsTechnica] - The App-ocalypse: Can Web standards make mobile apps obsolete? - http://arstechnica.com
[13:50:12] <Bender> [ForbesTech] - Galaxy S7 Leak Reveals Two Surprising Sizes - http://www.forbes.com
[13:50:55] <Bender> [PhysOrg] - Researchers seek help digitizing decades-old observations of African trees - http://phys.org
[13:55:15] <Bender> [ForbesTech] - 191 Million US Voter Registration Records Leaked In Mystery Database - http://www.forbes.com
[13:55:17] <Bender> [HackerNews] - The Tehran Museum of Contemporary Art Is Re-Emerging - http://www.bloomberg.com
[13:55:19] <Bender> [ForbesTech] - The Reasons That Apple's Shares Have Dropped The Past Two Weeks - http://www.forbes.com
[14:00:21] <Bender> [HackerNews] - Direct links to free Springer maths books (pdf versions) - http://sylnt.us
[14:01:03] <Bender> [PhysOrg] - Biotron puts any environment on Earth in researchers' reach - http://phys.org
[14:01:07] <Bender> [PhysOrg] - Image: Christmas Pluto - http://phys.org
[14:01:11] <Bender> [PhysOrg] - Water conservation policy effectiveness depends on farmer economics - http://phys.org
[14:01:15] <Bender> [PhysOrg] - In 2015, chasing illegal downloaders backfired—Netflix and VPN were the winners - http://phys.org
[14:01:19] <Bender> [PhysOrg] - 'Bad' inequality on the rise, scholar says - http://phys.org
[14:05:25] <Bender> [HackerNews] - But Can You Make Pong? - http://tinodidriksen.com
[14:05:29] <Bender> [HackerNews] - Should You Become a Full Stack Developer? - http://logz.io
[14:05:29] <Bender> [ITWorld] - The next wave of cybercrime will come through your smart TV - http://www.itworld.com
[14:06:07] <Bender> [PhysOrg] - Radar images of a Christmas Eve asteroid—an early gift for astronomers - http://phys.org
[14:06:15] <Bender> [TheRegister] - 2015 wasn't about AWS. It was about everybody getting ready to try to beat AWS - http://go.theregister.com
[14:10:29] <Bender> [HackerNews] - Employee tried to sell Yandex source code - http://arstechnica.com
[14:10:33] <Bender> [HackerNews] - Popper's Philosophy of Science: Looking Ahead (2007) [pdf] - http://petergodfreysmith.com
[14:11:11] <Bender> [PhysOrg] - Simultaneous detection of the polarities of hundreds of semiconducting nanowires - http://phys.org
[14:11:15] <Bender> [PhysOrg] - Long-time white-tailed deer study a training ground for young researchers - http://phys.org
[14:11:27] <Bender> [WiredScience] - The Best of the Year’s Otherworldly Science Images - http://feeds.wired.com
[14:15:22] <Bender> [SoylentNews] - "Where To Invade Next": Michael Moore Wants to Make USA Great Again - http://sylnt.us
[14:20:36] <Bender> [HackerNews] - Put Reforms into State Prison Guards’ Contract - http://www.nytimes.com
[14:21:18] <Bender> [PhysOrg] - Frictional heat dehydrates magma - http://phys.org
[14:21:22] <Bender> [PhysOrg] - Magnetic fields in powerful radio jets - http://phys.org
[14:21:26] <Bender> [PhysOrg] - Scientific spotlight identifies threat to unique shrubs - http://phys.org
[14:30:36] <Bender> [CNET] - Internet-connected homes open the door to hackers - CNET - http://feedproxy.google.com
[14:30:44] <Bender> [HackerNews] - Modula-2 Reloaded – A Modern Typesafe and Literate Programming Language - http://modula-2.info
[14:30:48] <Bender> [HackerNews] - Show HN: Build a React Native real-time chat app in 5 minutes (without Xcode) - https://getsiphon.com
[14:31:26] <Bender> [PhysOrg] - Engineering students fix common glitch in digitization of books published before 1700 - http://phys.org
[14:31:30] <Bender> [PhysOrg] - Fire threatens Christmas kisses - http://phys.org
[14:41:34] <Bender> [PhysOrg] - Lifestyle switching – Bacillus cereus is able to resist certain antibiotic therapies - http://phys.org
[14:41:38] <Bender> [PhysOrg] - Understanding the mechanism for generating electric current without energy consumption at room temperature - http://phys.org
[14:45:58] <Bender> [HackerNews] - When will librarians start to throw offline literature away? - http://www.roger-pearse.com
[14:46:40] <Bender> [PhysOrg] - An ice core study to determine the timing and duration of historical climate stages - http://phys.org
[14:50:45] <Bender> [BBCTech] - Spy tools found in N Korea software - http://www.bbc.co.uk
[14:51:42] <Bender> [PhysOrg] - Resin film for stretchable electronics - http://phys.org
[14:56:50] <Bender> [SecurityWeek] - Raspberry Pi Gets Offer to Pre-Install Malware - http://feedproxy.google.com
[15:00:51] <Bender> [ArsTechnica] - 2015: The year that Microsoft started getting the benefit of the doubt - http://arstechnica.com
[15:01:05] <Bender> [ForbesTech] - 2016 Predictions For Datacenter Networking - http://www.forbes.com
[15:01:07] <Bender> [HackerNews] - PQCHacks, a gentle introduction to post-quantum cryptography [djb, Lange – 32c3] - https://media.ccc.de
[15:01:11] <Bender> [HackerNews] - LifePaint Safety Spray - http://www.volvocars.com
[15:01:49] <Bender> [PhysOrg] - Glove interface device powered by converting the user's biomechanical energy - http://phys.org
[15:01:53] <Bender> [PhysOrg] - Determining the solar energy potentials of private homes - http://phys.org
[15:05:55] <Bender> [ArsTechnica] - Scott Kelly unable to science the @$!# out of space veggies - http://arstechnica.com
[15:06:53] <Bender> [PhysOrg] - Researchers find evidence of cavity-dwelling microbial life from 3 billion years ago - http://phys.org
[15:11:15] <Bender> [HackerNews] - 191M US Voters’ Personal Info Exposed by Misconfigured Database - http://www.databreaches.net
[15:11:57] <Bender> [PhysOrg] - Why a famous technologist is being branded a Luddite - http://phys.org
[15:16:19] <Bender> [ForbesTech] - 'Star Wars: The Force Awakens' Was Once Called 'Shadow of the Empire' - http://www.forbes.com
[15:16:21] <Bender> [HackerNews] - How the Norwegian Broadcasting (NRK) made its first vertical documentary film - https://nrkbeta.no
[15:16:25] <Bender> [HackerNews] - TensorFlow White Paper Notes - http://sylnt.us
[15:16:29] <Bender> [HackerNews] - Writing manual pages - http://liw.fi
[15:16:33] <Bender> [HackerNews] - Somebody Offered Money to Raspberry Pi Foundation for Pre-Installing Malware - http://secjet.com
[15:16:37] <Bender> [HackerNews] - 2015: The year that Microsoft started getting the benefit of the doubt - http://arstechnica.com
[15:16:47] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up — Public Comments Welcomed - http://www.nist.gov
[15:16:51] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[15:16:57] <Bender> [NISTPhys] - NIST/JILA aposDark Pulse Laserapos Produces Bursts of … Almost Nothing - http://www.nist.gov
[15:17:01] <Bender> [NISTPhys] - Gates Foundation Rep Visits PML Vaccine Transport Lab - http://www.nist.gov
[15:17:05] <Bender> [NISTPhys] - NIST Seeks Comments on Plan to Simplify Access to Its Research Data and Publications - http://www.nist.gov
[15:17:09] <Bender> [NISTPhys] - The Incredible Shrinking ESR Machine - http://www.nist.gov
[15:17:13] <Bender> [NISTPhys] - NIST Shows Organic Solar Industry Something New Under the Sun - http://www.nist.gov
[15:17:17] <Bender> [NISTPhys] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[15:17:21] <Bender> [NISTPhys] - Gaily Tread the [Quantum] Measure - http://www.nist.gov
[15:17:25] <Bender> [NISTPhys] - NIST Method for Spotting Quantum Dots Could Help Make High-Performance Nanophotonic Devices - http://www.nist.gov
[15:17:29] <Bender> [NISTPhys] - NIST Puts the Twist on Neutrons – Because It Takes One to Know One - http://www.nist.gov
[15:17:33] <Bender> [NISTPhys] - NIST, UC Davis Scientists Float New Approach to Creating Computer Memory - http://www.nist.gov
[15:17:37] <Bender> [NISTPhys] - New Facility for Infrared Calibration - http://www.nist.gov
[15:17:41] <Bender> [NISTPhys] - Tracking the Solar Spectrum - http://www.nist.gov
[15:21:49] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[15:21:53] <Bender> [NISTIT] - Cybersecurity and Innovation in the Information Economy - http://www.nist.gov
[15:21:57] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[15:21:59] <Bender> [NISTPhys] - AFM Systems Take a Tip from Nanowires - http://www.nist.gov
[15:22:01] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[15:22:03] <Bender> [NISTPhys] - Hybrid Memory Device for Superconducting Computing - http://www.nist.gov
[15:22:05] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[15:22:07] <Bender> [NISTPhys] - Precocious GEM: Shape-Shifting Sensor Can Report Conditions from Deep in the Body - http://www.nist.gov
[15:22:09] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[15:22:11] <Bender> [NISTPhys] - 40th Time and Frequency Seminar - http://www.nist.gov
[15:22:13] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[15:22:15] <Bender> [NISTPhys] - Today, Pause for a Second - http://www.nist.gov
[15:22:17] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[15:22:19] <Bender> [NISTPhys] - Progress Report with Photos: Restoration of NISTs Million-Pound Deadweight Machine - http://www.nist.gov
[15:22:21] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[15:22:23] <Bender> [NISTPhys] - Ultra-stable JILA Microscopy Technique Tracks Tiny Objects for Hours - http://www.nist.gov
[15:22:26] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[15:22:27] <Bender> [NISTPhys] - Four PML Scientists Honored - http://www.nist.gov
[15:22:30] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[15:22:34] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[15:22:38] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[15:22:42] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[15:22:46] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[15:22:50] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[15:22:54] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[15:22:58] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[15:23:02] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[15:23:06] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[15:23:10] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[15:23:14] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[15:23:18] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[15:23:22] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[15:23:26] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[15:23:30] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[15:23:34] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[15:23:38] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[15:23:42] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[15:23:46] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[15:23:50] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[15:23:54] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[15:23:58] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[15:24:02] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[15:24:06] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[15:24:10] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[15:24:14] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[15:24:18] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[15:24:22] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[15:24:26] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[15:24:30] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[15:24:34] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[15:24:38] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[15:24:42] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[15:24:46] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[15:24:50] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[15:24:54] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[15:24:58] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[15:25:02] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[15:25:06] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[15:25:10] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[15:25:14] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[15:25:18] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[15:25:22] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[15:25:26] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[15:25:30] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[15:25:34] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[15:25:38] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[15:25:42] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[15:25:46] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[15:25:50] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[15:25:54] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[15:25:58] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[15:26:02] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[15:26:06] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[15:26:10] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[15:26:14] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[15:26:18] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[15:26:22] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[15:26:26] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[15:26:30] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[15:26:35] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[15:26:39] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[15:26:43] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[15:26:47] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[15:26:51] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[15:26:55] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[15:26:59] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[15:27:03] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[15:27:07] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[15:27:11] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[15:27:15] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[15:27:19] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[15:27:23] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[15:27:27] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[15:27:31] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[15:27:35] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[15:27:39] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[15:27:43] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[15:27:47] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[15:27:51] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[15:27:55] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[15:27:59] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[15:28:03] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[15:28:07] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[15:28:11] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[15:28:15] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[15:28:19] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[15:28:23] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[15:28:27] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[15:28:31] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[15:28:35] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[15:28:39] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[15:28:43] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[15:28:47] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[15:28:51] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[15:28:55] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[15:28:59] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[15:29:03] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[15:29:07] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[15:29:11] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[15:29:15] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[15:29:19] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[15:29:23] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[15:29:27] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[15:29:31] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[15:29:35] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[15:29:39] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[15:29:43] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[15:29:47] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[15:29:51] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[15:29:55] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[15:29:59] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[15:30:03] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[15:30:07] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[15:30:11] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[15:30:15] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[15:30:19] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[15:30:23] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[15:30:27] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[15:30:31] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[15:30:35] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[15:30:39] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[15:30:43] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[15:30:48] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[15:30:52] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[15:30:56] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[15:31:00] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[15:31:04] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[15:31:08] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[15:31:12] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[15:31:16] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[15:31:20] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[15:31:24] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[15:31:28] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[15:31:30] <Bender> [HackerNews] - Color harmony and color design - http://www.handprint.com
[15:31:32] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[15:31:36] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[15:31:40] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[15:31:44] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[15:31:48] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[15:31:52] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[15:31:56] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[15:32:00] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[15:32:04] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[15:32:08] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[15:32:12] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[15:32:16] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[15:32:16] <Bender> [SecurityWeek] - "High Fidelity" - My Cybersecurity Holiday Top 5 List - http://feedproxy.google.com
[15:32:20] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[15:32:21] <Bender> [SecurityWeek] - Misconfigured Database Exposes Details of 191 Million Voters - http://feedproxy.google.com
[15:32:24] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[15:32:28] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[15:32:32] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[15:32:36] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[15:32:40] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[15:32:44] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[15:32:48] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[15:32:52] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[15:32:56] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[15:33:00] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[15:33:04] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[15:33:08] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[15:33:12] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[15:33:16] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[15:33:20] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[15:33:24] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[15:33:28] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[15:33:32] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[15:33:36] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[15:33:40] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[15:33:44] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[15:33:48] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[15:33:52] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[15:33:56] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[15:34:00] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[15:34:04] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[15:34:08] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[15:34:12] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[15:34:16] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[15:34:20] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[15:34:24] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[15:34:28] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[15:34:32] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[15:34:36] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[15:34:40] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[15:34:44] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[15:34:48] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[15:34:52] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[15:34:56] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[15:35:00] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[15:35:04] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[15:35:09] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[15:35:13] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[15:35:17] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[15:35:21] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[15:35:25] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[15:35:29] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[15:35:33] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[15:35:37] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[15:35:41] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[15:35:45] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[15:35:49] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[15:35:53] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[15:35:57] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[15:36:01] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[15:36:05] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[15:36:09] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[15:36:13] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[15:36:17] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[15:36:21] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[15:36:25] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[15:36:29] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[15:36:32] <Bender> [ForbesTech] - The Next Major Airport Security Breach Will Probably Not Be In Sharm El-Sheikh - http://www.forbes.com
[15:36:33] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[15:36:37] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[15:36:41] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[15:36:45] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[15:36:49] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[15:36:53] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[15:36:57] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[15:37:01] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[15:37:05] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[15:37:09] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[15:37:13] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[15:37:17] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[15:37:21] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[15:37:25] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[15:37:29] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[15:37:33] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[15:37:37] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[15:37:41] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[15:37:45] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[15:37:49] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[15:37:53] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[15:37:57] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[15:38:01] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[15:38:05] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[15:38:09] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[15:38:13] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[15:38:17] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[15:42:20] <Bender> [PhysOrg] - Carbon doped with nitrogen dramatically improves storage capacity of supercapacitors - http://phys.org
[15:46:31] <Bender> [SoylentNews] - SPOILER ALERT: Vatican Newspaper Pans "The Force Awakens" - http://sylnt.us
[15:46:44] <Bender> [HackerNews] - Mixins, Subclass Factories, and Method Advice in JavaScript - http://raganwald.com
[15:47:26] <Bender> [PhysOrg] - Nanoworld 'snow blowers' carve straight channels in semiconductor surfaces - http://phys.org
[15:47:30] <Bender> [PhysOrg] - Seventy-four cuckoos in the nest: A new key to all North European cuckoo wasp species - http://phys.org
[15:47:34] <Bender> [PhysOrg] - Preferences for changing landscape color, complexity determined - http://phys.org
[15:51:44] <Bender> [ForbesTech] - NetApp's CIO Helps Drive The Company's Transformation and Innovation By Being Customer One - http://www.forbes.com
[15:56:34] <Bender> [ArsTechnica] - BMW thinks the future of car UI is gesture control - http://arstechnica.com
[15:56:50] <Bender> [HackerNews] - Our sons' $189,000 student debt is delaying our retirement - http://money.cnn.com
[15:56:54] <Bender> [HackerNews] - Handwritten Parsers and Lexers in Go - https://blog.gopheracademy.com
[15:57:32] <Bender> [PhysOrg] - Amazon adds 3 million Prime subscribers - http://phys.org
[16:01:48] <Bender> [ComputerWorld] - Coming soon to your smart TV: The next wave of cybercrime - http://rss.computerworld.com
[16:01:52] <Bender> [ForbesTech] - New Galaxy S7 Leak Reveals Surprising Size Changes - http://www.forbes.com
[16:01:56] <Bender> [ForbesTech] - The Hottest Cybersecurity Startups Of 2015 - http://www.forbes.com
[16:02:00] <Bender> [ForbesTech] - The Hottest Cybersecurity Startups Of 2015 - http://www.forbes.com
[16:02:04] <Bender> [ForbesTech] - Can US Retail Banks Survive The Mobile Revolution? - http://www.forbes.com
[16:11:59] <Bender> [ForbesTech] - Amazing View Of Galaxies That Aren't Colliding, But Look Like They Are - http://www.forbes.com
[16:12:03] <Bender> [ForbesTech] - Will The Rumoured Microsoft Surface Phone Run iOS Apps Natively On Launch? - http://www.forbes.com
[16:17:01] <Bender> [ComputerWorld] - New Samsung Galaxy S7 rumors -- sizes, magnesium, iris scanner, panic! - http://rss.computerworld.com
[16:17:05] <Bender> [ForbesTech] - Galaxy S7 Leak Reveals Surprising Size Changes - http://www.forbes.com
[16:17:07] <Bender> [HackerNews] - The Best and Worst Ads of 2015 - http://www.wsj.com
[16:17:37] <Bender> [NISTNano] - Nanoworld Snow Blowers Carve Straight Channels in Semiconductor Surfaces - http://www.nist.gov
[16:27:11] <Bender> [ForbesTech] - The 10 Most Incredible Fossils Finds Of 2015 - http://www.forbes.com
[16:27:13] <Bender> [HackerNews] - Rigetti (YC 2014) is hiring engineers to write software for quantum computers - https://jobs.lever.co
[16:27:15] <Bender> [ForbesTech] - Piracy Group Pulls Out Of Plans For Huge Set Of Movie Releases - http://www.forbes.com
[16:32:15] <Bender> [ForbesTech] - Galaxy S7 Leak Reveals New Smartphone Sizes - http://www.forbes.com
[16:32:17] <Bender> [HackerNews] - The Anti-IF Campaign - http://antiifcampaign.com
[16:32:21] <Bender> [HackerNews] - AT&T Makes It Clear, Microsoft Can Upgrade Your OS Without Carrier Approval - https://www.thurrott.com
[16:37:19] <Bender> [ForbesTech] - Galaxy S7 Leak Reveals Samsung's Size Gamble - http://www.forbes.com
[16:37:20] <Bender> [HackerNews] - Why Responsive Web Design Will Soon Be Required - http://www.infront.com
[16:37:24] <Bender> [HackerNews] - Proposal for an ideal extensible instruction set - http://www.agner.org
[16:37:28] <Bender> [HackerNews] - Is Being a Digital Nomad a Lie? - http://coastery.com
[16:37:33] <Bender> [HackerNews] - Phonefive - http://phonefiveme.com
[16:47:30] <Bender> [HackerNews] - When the Market, Including San Francisco, Built Housing for the Low Income - http://oldurbanist.blogspot.com
[16:47:34] <Bender> [HackerNews] - Jet.com’s Strategy: Low Prices, Fast Delivery, Happy Workers - http://www.nytimes.com
[16:57:34] <Bender> [ForbesTech] - Turn 'The Witcher 3' Into 'Skyrim' With A Brilliant Companion Mod - http://www.forbes.com
[16:57:38] <Bender> [ForbesTech] - Dublin's Startup Scene Set To Grow 30%, Spurred By American Influence & Culture - http://www.forbes.com
[17:02:38] <Bender> [ForbesTech] - Galaxy S7 Leak Reveals Massive Size Gamble - http://www.forbes.com
[17:02:40] <Bender> [HackerNews] - Animals think, therefore... - http://www.economist.com
[17:02:44] <Bender> [HackerNews] - AI Anxiety - http://www.washingtonpost.com
[17:03:26] <Bender> [SecurityWeek] - Android Malware Uses Firewall Rules to Block Security Apps - http://feedproxy.google.com
[17:07:44] <Bender> [HackerNews] - React-Towel: Rapid React Prototyping. Sans Build Tools and Fluff - http://sylnt.us
[17:12:47] <Bender> [HackerNews] - Picture Swap: Upload a picture to discover what the last visitor uploaded - http://pictureswap.herokuapp.com
[17:17:40] <Bender> [SoylentNews] - Martian Gullies May Not be Water-Related - http://sylnt.us
[17:22:56] <Bender> [HackerNews] - Show HN: Runiq, a little Lisp-inspired language that runs on JavaScript - http://sylnt.us
[17:23:00] <Bender> [HackerNews] - Picture Swap [NSFW]: Upload a picture to discover what the last visitor uploaded - http://pictureswap.herokuapp.com
[17:32:47] <Bender> [ArsTechnica] - Samsung will reportedly release the Galaxy S7 in two different sizes - http://arstechnica.com
[17:33:01] <Bender> [ForbesTech] - Massive Galaxy S7 Leak Suggests Goodbye Galaxy Note - http://www.forbes.com
[17:33:03] <Bender> [HackerNews] - How 88 slaves were betrayed and left for dead on a deserted island for 15 years - http://www.economist.com
[17:38:07] <Bender> [HackerNews] - Solus 1.0 Released - https://solus-project.com
[17:38:11] <Bender> [HackerNews] - The flawed system that allows companies to make millions off the injured - https://www.washingtonpost.com
[17:42:55] <Bender> [ArsTechnica] - Better with age: The year’s best video game DLC - http://arstechnica.com
[17:53:17] <Bender> [ForbesTech] - 'Game of Thrones' And 'The Walking Dead' Are The Most Pirated Shows Of 2015 - http://www.forbes.com
[17:53:19] <Bender> [HackerNews] - Languages and IDEs you can try online - http://www.tutorialspoint.com
[17:58:22] <Bender> [HackerNews] - How I Created a $350M Software Company Knowing Nothing About Software - http://techcrunch.com
[18:03:24] <Bender> [ForbesTech] - IBMVoice: Four Ways The Internet Of Things Will Innovate The Retail Industry - http://www.forbes.com
[18:08:30] <Bender> [HackerNews] - Announcing vue-cli - http://vuejs.org
[18:08:34] <Bender> [HackerNews] - Where Unwanted Christmas Gifts Get a Second Life - http://www.wsj.com
[18:08:38] <Bender> [HackerNews] - The Kolmogorov-Smirnov Test - http://daithiocrualaoich.github.io
[18:08:42] <Bender> [HackerNews] - 5 Common Misconceptions About Adventure Travelers - http://www.raindrop.com
[18:13:32] <Bender> [ForbesTech] - Massive Galaxy S7 Leak Suggests Goodbye Galaxy Note 6 - http://www.forbes.com
[18:13:34] <Bender> [HackerNews] - DIY air filter for polluted cities - http://particlecounting.tumblr.com
[18:13:36] <Bender> [ForbesTech] - Amazon Celebrates Various Record-Setting Holiday 'Highs' This Holiday Season - http://www.forbes.com
[18:13:38] <Bender> [HackerNews] - Beware of the Silicon Valley Cult - http://thinkfaster.co
[18:13:42] <Bender> [HackerNews] - The true story of Roland the farter and the demise of professional farting - http://www.atlasobscura.com
[18:13:46] <Bender> [HackerNews] - 3 Degrees of LinkedIn Separation from the Military-Industrial-Surveillance State - http://linkedd.s3.amazonaws.com
[18:18:40] <Bender> [HackerNews] - The power of the command-line as a programming environment - http://pindexis.github.io
[18:23:40] <Bender> [ForbesTech] - Massive Galaxy S7 Leak Suggests Galaxy Note Ending - http://www.forbes.com
[18:23:42] <Bender> [HackerNews] - Xv6, a simple Unix-like teaching operating system - https://pdos.csail.mit.edu
[18:23:49] <Bender> [Krebs] - 2016 Reality: Lazy Authentication Still the Norm - http://krebsonsecurity.com
[18:28:44] <Bender> [ForbesTech] - Two Galaxy S7 Models Revealed In Massive New Leak - http://www.forbes.com
[18:33:48] <Bender> [ForbesTech] - Two Galaxy S7 Designs Revealed In Massive New Leak - http://www.forbes.com
[18:34:36] <Bender> [SecurityWeek] - Adobe Issues Emergency Patch For Flash Zero-Day Under Attack - http://feedproxy.google.com
[18:38:52] <Bender> [ForbesTech] - Massive Galaxy S7 Leak Reveals Dangerous Design Changes - http://www.forbes.com
[18:38:53] <Bender> [HackerNews] - 5 Myths About Traveling That You Need to Set Straight - http://www.raindrop.com
[18:43:49] <Bender> [CNET] - Is this the working hoverboard we've been waiting for? - CNET - http://feedproxy.google.com
[18:43:57] <Bender> [HackerNews] - When slaves and free men were shipwrecked together - http://www.economist.com
[18:48:51] <Bender> [SoylentNews] - China Passes Law Requiring Tech Firms to Hand Over Encryption Keys - http://sylnt.us
[18:49:01] <Bender> [ForbesTech] - Galaxy S7 Size Changes Revealed By Massive Leak - http://www.forbes.com
[18:49:03] <Bender> [HackerNews] - Ask HN: Copyright infringement alert from ISP - https://news.ycombinator.com
[18:49:07] <Bender> [HackerNews] - Introducing d3-scale - https://medium.com
[18:49:11] <Bender> [HackerNews] - Implementing a programming language in D: Lexical Analysis - http://blog.felixangell.com
[18:59:09] <Bender> [HackerNews] - Guido van Rossum: Tail Recursion Elimination (2009) - http://neopythonic.blogspot.com
[18:59:13] <Bender> [HackerNews] - Human Research Loopholes: Alive and Well - https://www.eff.org
[18:59:17] <Bender> [HackerNews] - China passes law requiring tech firms to hand over encryption keys - http://betanews.com
[18:59:21] <Bender> [HackerNews] - Free Springer math books - http://sylnt.us
[18:59:59] <Bender> [TheRegister] - Patch now! Flash-exploitin' PC-hijackin' attack spotted in the wild by Huawei bods - http://go.theregister.com
[19:04:11] <Bender> [ForbesTech] - Silos Can Be Costly In Banks - http://www.forbes.com
[19:04:13] <Bender> [HackerNews] - The Ford Foundation's Quest to Fix the World - http://www.newyorker.com
[19:04:17] <Bender> [HackerNews] - TLDR pages - http://tldr-pages.github.io
[19:04:55] <Bender> [PhysOrg] - James Webb Space Telescope mirror halfway complete - http://phys.org
[19:09:01] <Bender> [ArsTechnica] - TSA may soon stop accepting drivers’ licenses from nine states - http://arstechnica.com
[19:09:15] <Bender> [ForbesTech] - Galaxy S7 Leak Reveals Controversial Size Changes - http://www.forbes.com
[19:09:19] <Bender> [ForbesTech] - How One Bitcoin Startup Is Changing Public Perception Of Bitcoin - http://www.forbes.com
[19:09:59] <Bender> [PhysOrg] - New acoustic technique reveals structural information in nanoscale materials - http://phys.org
[19:19:10] <Bender> [ArsTechnica] - Dealmaster: Get a 1000VA uninterruptible power supply for $94.99 - http://arstechnica.com
[19:24:28] <Bender> [HackerNews] - Ask HN: What system do you use for tracking and annotating academic papers? - https://news.ycombinator.com
[19:24:32] <Bender> [HackerNews] - Introducing d3-scale - https://medium.com
[19:34:20] <Bender> [ArsTechnica] - Anti-vaccine Californians are rich, white, but not necessarily highly educated - http://arstechnica.com
[19:39:32] <Bender> [CNET] - 'X-Files' reopened in this 21-minute preview video - CNET - http://feedproxy.google.com
[19:40:30] <Bender> [SingularityHub] - Six Technologies That Hit Their Tipping Points in 2015 - http://singularityhub.com
[19:44:44] <Bender> [HackerNews] - A Moss Girl’s Guide to Japanese Moss Viewing - http://ignition.co
[19:44:48] <Bender> [HackerNews] - Nine paradoxes with a statistical theme - http://andrewtmckenzie.com
[19:44:52] <Bender> [HackerNews] - The App-ocalypse: can Web standards make mobile apps obsolete? - http://arstechnica.com
[19:44:56] <Bender> [HackerNews] - PQCHacks: a gentle introduction to post-quantum cryptography [video] - https://media.ccc.de
[19:49:48] <Bender> [ForbesTech] - Galaxy S7 Leak Reveals Samsung's Biggest Change - http://www.forbes.com
[19:49:52] <Bender> [ForbesTech] - Does The US Really Want A North Korean Internet? - http://www.forbes.com
[19:54:43] <Bender> [CNET] - Prime again: Amazon reports record holiday season - CNET - http://feedproxy.google.com
[19:54:51] <Bender> [HackerNews] - Heap (YC W13) is hiring engineers to build the next generation of analytics - https://heapanalytics.com
[19:55:33] <Bender> [PhysOrg] - Satellite animation shows powerful storm in central US - http://phys.org
[19:55:38] <Bender> [PhysOrg] - Swedish courts temporarily ban wolf hunting - http://phys.org
[19:55:42] <Bender> [PhysOrg] - Firefighters battle more than 130 wildfires in northern Spain - http://phys.org
[20:00:37] <Bender> [PhysOrg] - First ancient Irish human genomes sequenced - http://phys.org
[20:00:41] <Bender> [PhysOrg] - Second contagious form of cancer found in Tasmanian devils - http://phys.org
[20:00:45] <Bender> [PhysOrg] - Tens of millions of trees in danger from California drought - http://phys.org
[20:04:49] <Bender> [Bugtraq] - Bugtraq: WebKitGTK+ Security Advisory WSA-2015-0002 - http://www.securityfocus.com
[20:04:59] <Bender> [HackerNews] - Elemental: C++ library for distributed-memory linear algebra and optimization - http://sylnt.us
[20:05:03] <Bender> [HackerNews] - Recurrent Net Dreams Up Fake Chinese Characters in Vector Format with TensorFlow - http://blog.otoro.net
[20:05:41] <Bender> [PhysOrg] - Researchers link climate-induced disasters and food security across time and place - http://phys.org
[20:10:03] <Bender> [HackerNews] - Science Fiction Stories with Good Astronomy and Physics: A Topical Index (2014) - http://www.astrosociety.org
[20:15:07] <Bender> [HackerNews] - NES Programming with cc65 - https://nesdoug.wordpress.com
[20:15:41] <Bender> [NISTStandards] - PML Expertise and Collaborations Lead to Portable Test Solution for Laser Trackers - http://www.nist.gov
[20:19:59] <Bender> [SoylentNews] - How to Track Data Use and Choose the Right Smartphone Plan - http://sylnt.us
[20:20:11] <Bender> [ForbesTech] - Galaxy S7 Leak Confirms Smartphone Size Changes - http://www.forbes.com
[20:20:13] <Bender> [HackerNews] - Workplace drug testing is widespread but ineffective - http://www.slate.com
[20:25:56] <Bender> [PhysOrg] - Record El Nino, climate change drive extreme weather - http://phys.org
[20:30:16] <Bender> [ForbesTech] - Galaxy S7 Leak Confirms Samsung Splitting Range - http://www.forbes.com
[20:35:22] <Bender> [HackerNews] - Can India modernize without relying heavily on coal? - http://www.technologyreview.com
[20:40:10] <Bender> [ArsTechnica] - Game of Thrones is the most-pirated TV show of 2015 - http://arstechnica.com
[20:45:36] <Bender> [Krebs] - Flash Player Patch Fixes 0-Day, 18 Other Flaws - http://krebsonsecurity.com
[20:50:19] <Bender> [ArsTechnica] - With 14.4M downloads, Game of Thrones is the most-pirated TV show of 2015 - http://arstechnica.com
[20:50:35] <Bender> [HackerNews] - MirrorMirror: A Raspberry Pi-Powered Magic Mirror - http://blog.dylanjpierce.com
[20:55:35] <Bender> [ForbesTech] - Galaxy S7 Leak Reveals 5.2-Inch And 5.5-Inch Models - http://www.forbes.com
[20:55:39] <Bender> [ForbesTech] - Baidu Teams Up with Medical Researchers to Fight Cancer - http://www.forbes.com
[21:00:25] <Bender> [ArsTechnica] - New Google Glass model hits the FCC website, images included - http://arstechnica.com
[21:00:33] <Bender> [CNET] - Prime again: Amazon reports another banner holiday season - CNET - http://feedproxy.google.com
[21:00:41] <Bender> [HackerNews] - Glow: Map Reduce for Golang - https://blog.gopheracademy.com
[21:00:45] <Bender> [HackerNews] - 10 Questions to ask yourself if you are unsatisfied with your career or life - https://sosv.com
[21:00:49] <Bender> [HackerNews] - How do I make games? A path to game development - http://web.archive.org
[21:10:49] <Bender> [HackerNews] - Google, HP, Oracle Join RISC-V ­- Open source processor core gains traction - http://www.eetimes.com
[21:10:53] <Bender> [HackerNews] - A Non-Scientist's Guide to Checking the Science Behind a Claim (2012) - http://scienceornot.net
[21:11:39] <Bender> [TheRegister] - Chinese govt demands encryption keys because ... er, terrorism - http://go.theregister.com
[21:20:59] <Bender> [HackerNews] - Becoming fully reactive: an explanation of Mobservable - https://medium.com
[21:25:45] <Bender> [ArsTechnica] - Reminder: Donate to win swag in our annual Charity Drive sweepstakes - http://arstechnica.com
[21:36:08] <Bender> [HackerNews] - AVG: “Web TuneUP” extension multiple critical vulnerabilities - https://code.google.com
[21:41:12] <Bender> [HackerNews] - U.S. predicts zero job growth for electrical engineers - http://www.computerworld.com
[21:46:00] <Bender> [ArsTechnica] - British health experts warn of unstoppable gonorrhea - http://arstechnica.com
[21:47:06] <Bender> [TheRegister] - Password-less database 'open-sources' 191m US voter records on the web - http://go.theregister.com
[21:56:23] <Bender> [HackerNews] - Why poor kids don’t stay in college - https://www.washingtonpost.com
[22:06:31] <Bender> [HackerNews] - Instapush Proof of Concept - http://jowanza.com
[22:11:33] <Bender> [ForbesTech] - When Rudolph Was a Robotic Reindeer: Why The Appearance Of Robots Makes Us Fear Them - http://www.forbes.com
[22:11:35] <Bender> [HackerNews] - Judge: Drinking tea, shopping at garden store probable cause for SWAT raid - https://www.washingtonpost.com
[22:11:39] <Bender> [HackerNews] - Potential New Particle Sparks Flood of Theories - http://www.scientificamerican.com
[22:21:31] <Bender> [SoylentNews] - Microsoft 'Orange Badge' Shadow Workforce Faces Layoff - http://sylnt.us
[22:21:45] <Bender> [HackerNews] - AWS Shell – An integrated shell for working with the AWS CLI - http://sylnt.us
[22:21:49] <Bender> [HackerNews] - CRT (Cathode Ray Tube) Safety FAQ - http://arcadecontrols.com
[22:26:31] <Bender> [ArsTechnica] - New videos prove crows can make complex tools that only humans have made before - http://arstechnica.com
[22:26:47] <Bender> [HackerNews] - Safe and Secure Software – An Invitation to Ada 2012 - http://www.adacore.com
[22:36:54] <Bender> [HackerNews] - Mysterious Android codebase commit - https://android.googlesource.com
[22:37:45] <Bender> [TheRegister] - Chinese govt wants encryption cracked on demand because ... er, terrorism - http://go.theregister.com
[22:41:58] <Bender> [HackerNews] - CoeLux: Artificial Sunlight That's Real Enough to Trick Your Camera and Brain - http://petapixel.com
[22:42:49] <Bender> [TheRegister] - China wants encryption cracked on demand because ... er, terrorism - http://go.theregister.com
[22:47:44] <Bender> [PhysOrg] - Adobe updates Flash amid renewed exploit fears - http://phys.org
[23:02:06] <Bender> [CNET] - Zuckerberg stands firm on connecting India to the Internet - CNET - http://feedproxy.google.com
[23:02:14] <Bender> [HackerNews] - Eye Contact: How Long Is Too Long? - http://www.scientificamerican.com
[23:12:21] <Bender> [HackerNews] - Instructions for Installing Swift on a Raspberry Pi 2 - http://blog.andrewmadsen.com
[23:17:25] <Bender> [HackerNews] - Upwork's Downfall - https://news.ycombinator.com
[23:17:29] <Bender> [HackerNews] - Ask HN: Are you programming on your holidays? - https://news.ycombinator.com
[23:17:33] <Bender> [HackerNews] - Mattermark Hiring Lead Engineer in Seattle - https://jobs.lever.co
[23:27:25] <Bender> [CNET] - Massive trove of voters' election data discovered on Web - CNET - http://feedproxy.google.com
[23:27:33] <Bender> [HackerNews] - Show HN: Mailer – our in-house tool for sending email from the command line - https://www.dirwiz.com
[23:32:35] <Bender> [ForbesTech] - Samsung Leak Reveals 5.2-Inch And 5.5-Inch Galaxy S7 - http://www.forbes.com
[23:32:39] <Bender> [ForbesTech] - Zappos And Holacracy: Why They Did It, What They Learned, And What's Next - http://www.forbes.com
[23:37:41] <Bender> [HackerNews] - Why you should always buy the men’s version of almost anything - https://www.washingtonpost.com
[23:40:19] juggs is now known as Deucalion
[23:42:45] <Bender> [HackerNews] - Tech-Hub Housing Costs - http://www.trulia.com
[23:52:53] <Bender> [ForbesTech] - Latest Galaxy S7 Leak Reveals 5.2-inch And 5.5-inch Models - http://www.forbes.com
[23:52:57] <Bender> [ForbesTech] - Will Your Technology Choices Make 2016 Your Most Productive Year Ever? - http://www.forbes.com
[23:57:40] <Bender> [ArsTechnica] - Common payment processing protocols found to be full of flaws - http://arstechnica.com
[23:57:56] <Bender> [HackerNews] - Validation and Conversion of Physical Units at Compile Time [pdf] - http://www.home.hs-karlsruhe.de