#rss-bot | Logs for 2016-06-18
« return
[00:00:31] <Bender> [ForbesTech] - In A Down Week For Tech, Larry Ellison Is $1.3 Billion Richer Following Strong Oracle Earnings Report - http://www.forbes.com
[00:09:29] <Bender> [SoylentNews] - Justice Department to Abandon Case Against Countrywide Co-Founder - http://sylnt.us
[00:20:47] <Bender> [ForbesTech] - Thunder And Lightning In The Bitcoin World - http://www.forbes.com
[00:31:08] <Bender> [HackerNews] - IEX Group Gains Approval for Stock Exchange - http://www.nytimes.com
[00:36:59] <Bender> [TheRegister] - Get-rich quick trick Twitch snitch: Bots sued for fake video views - http://go.theregister.com
[00:46:20] <Bender> [HackerNews] - Really secure your SSHD and piss off the NSA - http://sylnt.us
[00:46:25] <Bender> [HackerNews] - IEX Gains SEC Approval to Launch New Stock Exchange - http://www.wsj.com
[00:46:29] <Bender> [HackerNews] - The DAO Vulnerability - http://vessenes.com
[00:51:24] <Bender> [HackerNews] - Why Young Americans Are Giving Up on Capitalism - http://foreignpolicy.com
[00:51:28] <Bender> [HackerNews] - Christo’s Newest Project: Walking on Water - http://www.nytimes.com
[01:06:35] <Bender> [HackerNews] - Best JavaScript tutorials for beginners - https://nodecasts.io
[01:16:55] <Bender> [NISTBio] - A Call for Developingâand UsingâConsensus Standards to Ensure the Quality of Cell Lines - http://www.nist.gov
[01:17:08] <Bender> [NISTIT] - New NIST Guidelines Aim to Help IT System Developers Build Security In From the Ground Up â Public Comments Welcomed - http://www.nist.gov
[01:17:12] <Bender> [NISTIT] - Influence the Future of Cybersecurity EducationâJoin the NICE Working Group - http://www.nist.gov
[01:17:16] <Bender> [NISTPhys] - NIST/JILA aposDark Pulse Laserapos Produces Bursts of ⦠Almost Nothing - http://www.nist.gov
[01:17:16] <Bender> [NISTIT] - NIST Requests Comments on Computer Security Publication on Randomness - http://www.nist.gov
[01:17:20] <Bender> [NISTPhys] - NIST Puts the Twist on Neutrons â Because It Takes One to Know One - http://www.nist.gov
[01:17:24] <Bender> [NISTPhys] - New Nanodevice Shifts Lightaposs Color at Single-Photon Level - http://www.nist.gov
[01:17:28] <Bender> [NISTPhys] - NISTs Million-Pound Weight Stack Restoration is Complete - http://www.nist.gov
[01:17:32] <Bender> [NISTPhys] - New Chip-Based Sensor Finds Power in Versatility - http://www.nist.gov
[01:21:59] <Bender> [NISTBio] - Public-Private Sector Partners Launch $2 Million Open Innovation Challenge to Find Advanced Energy Absorbing Materials - http://www.nist.gov
[01:22:12] <Bender> [NISTIT] - NIST Helps Accelerate the Federal Governmentaposs Move to the Cloud - http://www.nist.gov
[01:22:16] <Bender> [NISTIT] - NIST Forensic Science Standards Committees to Hold First Public Meetings in February 2015 - http://www.nist.gov
[01:22:20] <Bender> [NISTIT] - Promising Quantum Transducer - http://www.nist.gov
[01:22:24] <Bender> [NISTIT] - NCCoE Seeks Vendors to Help Secure Wireless Medical Devices - http://www.nist.gov
[01:22:28] <Bender> [NISTIT] - Optical Clocks Synched to Femtoseconds Over Air - http://www.nist.gov
[01:22:32] <Bender> [NISTIT] - Building Security into Cyber-Physical Systems: NIST Researchers Suggest Approach for Trustworthy Modern Infrastructure - http://www.nist.gov
[01:22:36] <Bender> [NISTIT] - The Stakeholders Have Spoken: NIST to Refine Cybersecurity Framework - http://www.nist.gov
[01:27:03] <Bender> [NISTBio] - International Symposium on Forensic Science Error Management - http://www.nist.gov
[01:27:07] <Bender> [NISTBio] - Welcome - International Forensics Symposium - http://www.nist.gov
[01:27:11] <Bender> [NISTBio] - Home - International Forensics Symposium - http://www.nist.gov
[01:27:16] <Bender> [NISTBio] - MedImmune and NIST Partner to Advance Development of Biological Therapies - http://www.nist.gov
[01:27:16] <Bender> [NISTIT] - Pioneer NIST Computer Remembered on 60th Anniversary - http://www.nist.gov
[01:27:20] <Bender> [NISTIT] - National Initiative For Cybersecurity Education (NICE)ly Comes to You - http://www.nist.gov
[01:27:24] <Bender> [NISTIT] - July 27 Stakeholder Meeting Addresses Cybersecurity and Innovation - http://www.nist.gov
[01:27:28] <Bender> [NISTIT] - Updated Computer Security Publication Focuses on Security Assessment Plans - http://www.nist.gov
[01:27:32] <Bender> [NISTIT] - NIST Software Security Patent to Help Improve Health IT Privacy - http://www.nist.gov
[01:27:36] <Bender> [NISTIT] - NIST Aids Enhancement of the Security and Stability of the Internets Domain Name System - http://www.nist.gov
[01:27:40] <Bender> [NISTIT] - New Draft Computer Security Document Focuses on Cloud Computing and Virtualization Technology - http://www.nist.gov
[01:27:44] <Bender> [NISTIT] - Cybersecurity, Innovation and the Internet Economy - http://www.nist.gov
[01:27:48] <Bender> [NISTIT] - Commerce Department Seeks Comments on Cybersecurity and Its Impact on Innovation - http://www.nist.gov
[01:27:52] <Bender> [NISTIT] - New NIST Report Advises: Securing Critical Computer Systems Begins at the Beginning - http://www.nist.gov
[01:27:56] <Bender> [NISTIT] - NIST Publishes Approved Testing Procedures for Electronic Health Records - http://www.nist.gov
[01:28:00] <Bender> [NISTIT] - Annual IT Security Automation Conference Runs Sept. 27-29 - http://www.nist.gov
[01:28:04] <Bender> [NISTIT] - Visualization of Body Area Networks: Multimedia Page - http://www.nist.gov
[01:28:08] <Bender> [NISTIT] - NIST Sponsors Second Cloud Computing Forum and Workshop Nov. 4-5 - http://www.nist.gov
[01:28:12] <Bender> [NISTIT] - NIST, NTIA Seek Collaborators for Emergency Communications Demo Network - http://www.nist.gov
[01:28:16] <Bender> [NISTIT] - New NIST Publication Provides Security Guidance for WiMAX Technologies - http://www.nist.gov
[01:28:20] <Bender> [NISTIT] - Updated NIST Software Uses Combination Testing to Catch Bugs Fast and Easy - http://www.nist.gov
[01:28:24] <Bender> [NISTIT] - NIST Team Awarded Millions of Supercomputing Hours, Aims for aposConcrete Resultsapos - http://www.nist.gov
[01:28:28] <Bender> [NISTIT] - Financial Services Sector Signs Cybersecurity Research Agreement with NIST, DHS - http://www.nist.gov
[01:28:32] <Bender> [NISTIT] - NIST Partners with ONC and AHRQ to Deliver Guidance on Electronic Health Record Usability - http://www.nist.gov
[01:28:36] <Bender> [NISTIT] - Two Publications Recommend Organization-Wide IT Security Risk Management - http://www.nist.gov
[01:28:40] <Bender> [NISTIT] - IPv6 Guide Provides Path to Secure Deployment of Next-Generation Internet Protocol - http://www.nist.gov
[01:28:44] <Bender> [NISTIT] - And Then There Were Five: Finalists Advance in NISTaposs SHA-3 Cryptography Competition - http://www.nist.gov
[01:28:48] <Bender> [NISTIT] - Watch Webcast Today: U.S. Commerce Secretary, White House Cybersecurity Coordinator to Visit Silicon Valley to Discuss Next Steps in Cybersecurity - http://www.nist.gov
[01:28:52] <Bender> [NISTIT] - U.S. Commerce Secretary Gary Locke, White House Cybersecurity Coordinator Howard A. Schmidt Announce Next Steps to Enhance Online Security, Planned National Office for Identity Trust Strategy - http://www.nist.gov
[01:28:56] <Bender> [NISTIT] - National Program Office Planned for Online Trusted Identity Strategy - http://www.nist.gov
[01:29:00] <Bender> [NISTIT] - Jeremy Grant Selected to Manage Establishment of National Program Office for NSTIC - http://www.nist.gov
[01:29:04] <Bender> [NISTIT] - NIST Issues Final Version of Full Virtualization Security Guidelines - http://www.nist.gov
[01:29:08] <Bender> [NISTIT] - Cloud Computing at NIST: Two New Draft Documents and a Wiki - http://www.nist.gov
[01:29:12] <Bender> [NISTIT] - Emerging Trends in Cybersecurity is Topic of March IT Security Trainersapos Conference - http://www.nist.gov
[01:29:16] <Bender> [NISTIT] - April Workshop To Focus on Preserving Digital Health Records - http://www.nist.gov
[01:29:20] <Bender> [NISTIT] - Information Retrieval Research Conference Adds Tracks on Medical Records, Crowd-sourcing and Micro-blogging - http://www.nist.gov
[01:29:25] <Bender> [NISTIT] - The NIST Role in Role-Based Control: A 20th Anniversary Appraisal - http://www.nist.gov
[01:29:29] <Bender> [NISTIT] - New Publication Fundamentally Changes Federal Information Security Risk Management - http://www.nist.gov
[01:29:33] <Bender> [NISTIT] - NIST Seeks Comments on Security Control Catalog for Federal Information Systems and Organizations - http://www.nist.gov
[01:29:37] <Bender> [NISTIT] - NIST Expert Software aposLowers the Stressapos on Materials Problems - http://www.nist.gov
[01:29:41] <Bender> [NISTIT] - Dodson Receives Federal 100 Award for Cybersecurity Work - http://www.nist.gov
[01:29:45] <Bender> [NISTIT] - NIST Holds Third Cloud Computing Forum and Workshop, April 7-8 - http://www.nist.gov
[01:29:49] <Bender> [NISTIT] - Conference on Safeguarding Health Information Security, May 10-11 - http://www.nist.gov
[01:29:53] <Bender> [NISTIT] - Two New SCAP Documents Help Improve Automating Computer Security Management - http://www.nist.gov
[01:29:57] <Bender> [NISTIT] - NISTaposs Ron Ross is Named to InformationWeek Government Top 50 List - http://www.nist.gov
[01:30:01] <Bender> [NISTIT] - Smart Grid Panel Agrees on Standards for Wireless Communication, Meter Upgrades - http://www.nist.gov
[01:30:05] <Bender> [NISTIT] - White House Launches Plan to Create a Trusted aposIdentity Ecosystemapos for On-Line Commerce - http://www.nist.gov
[01:30:09] <Bender> [NISTIT] - Build Safety into the Very Beginning of the Computer System - http://www.nist.gov
[01:30:13] <Bender> [NISTIT] - NIST Seeks Comments on Draft Guide to Cloud Computing - http://www.nist.gov
[01:30:17] <Bender> [NISTIT] - NIST Workshop to Advance Usability in Electronic Health Records - http://www.nist.gov
[01:30:21] <Bender> [NISTIT] - NIST Contests in China Put Next-Gen Robot Technologies to the Test - http://www.nist.gov
[01:30:25] <Bender> [NISTIT] - NIST Contributions to Smart Grid Highlighted in White House Report, Event - http://www.nist.gov
[01:30:29] <Bender> [NISTIT] - Calling for Comments on Cybersecurity, Innovations and the Internet Economy - http://www.nist.gov
[01:30:33] <Bender> [NISTIT] - Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - http://www.nist.gov
[01:30:37] <Bender> [NISTIT] - Final Version of Industrial Control Systems Security Guide Published - http://www.nist.gov
[01:30:41] <Bender> [NISTIT] - New Version of Security Automation Protocol Includes Digital Trust Model - http://www.nist.gov
[01:30:45] <Bender> [NISTIT] - NIST Proposes New Privacy Controls for Federal Information Systems and Organizations - http://www.nist.gov
[01:30:49] <Bender> [NISTIT] - NIST Seeks Comments on National Initiative for Cybersecurity Education Draft Strategic Plan - http://www.nist.gov
[01:30:53] <Bender> [NISTIT] - NIST to Host Workshop on Cryptography for New Technologies - http://www.nist.gov
[01:30:57] <Bender> [NISTIT] - Seventh Annual IT Security Automation Conference Runs Oct. 31- Nov. 2 - http://www.nist.gov
[01:31:01] <Bender> [NISTIT] - Four New Reports Update Security Content Automation Protocol - http://www.nist.gov
[01:31:05] <Bender> [NISTIT] - Two New Publications Provide a Cloud Computing Standards Roadmap and Reference Architecture - http://www.nist.gov
[01:31:09] <Bender> [NISTIT] - Comprehensive Risk Assessment Guidance for Federal Information Systems Published - http://www.nist.gov
[01:31:13] <Bender> [NISTIT] - Maryland Governor OaposMalley Urges Investment in Cybersecurity Education - http://www.nist.gov
[01:31:17] <Bender> [NISTIT] - Public/Private Leaders Collaborate on Ways to Fight Botnets - http://www.nist.gov
[01:31:21] <Bender> [NISTIT] - NIST Cooperative Agreement with University of Maryland Supports Research on 21st Century Smart Systems - http://www.nist.gov
[01:31:25] <Bender> [NISTIT] - Federal Cloud Technology Roadmap to be Introduced at Forum Workshop, Nov. 2-4 - http://www.nist.gov
[01:31:29] <Bender> [NISTIT] - NIST Publishes Guide for Monitoring Security in Information Systems - http://www.nist.gov
[01:31:33] <Bender> [NISTIT] - NIST Digital Library of Mathematical Functions Receives IT Award - http://www.nist.gov
[01:31:37] <Bender> [NISTIT] - Final Version of NIST Cloud Computing Definition Published - http://www.nist.gov
[01:31:41] <Bender> [NISTIT] - NIST Releases Two Wireless Security Guides, Requests Comment - http://www.nist.gov
[01:31:45] <Bender> [NISTIT] - Quantum Computer Components aposCoalesceapos to aposConverseapos - http://www.nist.gov
[01:31:49] <Bender> [NISTIT] - NIST Releases Draft Cloud Computing Technology Roadmap for Comments - http://www.nist.gov
[01:31:53] <Bender> [NISTIT] - NIST Signs Agreement to Enhance Cybersecurity Education Programs - http://www.nist.gov
[01:31:57] <Bender> [NISTIT] - Draft Roadmap for Cloud Computing Technology - http://www.nist.gov
[01:32:01] <Bender> [NISTIT] - NICE Issues Cybersecurity Workforce Framework for Public Comment - http://www.nist.gov
[01:32:05] <Bender> [NISTIT] - Romine Named Director of NISTaposs Information Technology Laboratory - http://www.nist.gov
[01:32:09] <Bender> [NISTIT] - New HIPAA Tool Helps Organizations Meet Security Requirements - http://www.nist.gov
[01:32:13] <Bender> [NISTIT] - NIST Improves Tool for Hardening Software Against Cyber Attack - http://www.nist.gov
[01:32:17] <Bender> [NISTIT] - New NIST Biometric Data Standard Adds DNA, Footmarks and Enhanced Fingerprint Descriptions - http://www.nist.gov
[01:32:21] <Bender> [NISTIT] - NIST Special Publication Expands Government Authentication Options - http://www.nist.gov
[01:32:25] <Bender> [NISTIT] - Protecting Computers at Start-Up: New NIST Guidelines - http://www.nist.gov
[01:32:29] <Bender> [NISTIT] - Text Retrieval Conference 2012 Seeks Information Retrieval Experts for Data Digging - http://www.nist.gov
[01:32:33] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Manufacturing and IT Challenges - http://www.nist.gov
[01:32:37] <Bender> [NISTIT] - March Workshop to Support Trusted IDs in Cyberspace - http://www.nist.gov
[01:32:41] <Bender> [NISTIT] - International Community Gathers at NIST in March to Discuss Biometric Performance and Testing - http://www.nist.gov
[01:32:45] <Bender> [NISTIT] - NIST Issues Cloud Computing Guidelines for Managing Security and Privacy - http://www.nist.gov
[01:32:49] <Bender> [NISTIT] - NIST Publishes Draft Implementation Guidance for Continuously Monitoring an Organizationaposs IT System Security - http://www.nist.gov
[01:32:53] <Bender> [NISTIT] - NIST to Fund Pilot Projects that Advance Trusted Identities in Cyberspace Proposers Conference Set for Feb. 15 - http://www.nist.gov
[01:32:57] <Bender> [NISTIT] - NIST Cloud Computing Videos Available Online - http://www.nist.gov
[01:33:01] <Bender> [NISTIT] - Federal Information Systems Security Educatorsapos Association Conference Meets March 27-29 - http://www.nist.gov
[01:33:05] <Bender> [NISTIT] - NIST Report Recommends New Privately Led Steering Group to Drive Trusted Identities in Cyberspace - http://www.nist.gov
[01:33:09] <Bender> [NISTIT] - NIST Establishes National Cybersecurity Center of Excellence - http://www.nist.gov
[01:33:13] <Bender> [NISTIT] - NIST Requests Comments on Updated Guide to Handling Computer Security Incidents - http://www.nist.gov
[01:33:18] <Bender> [NISTIT] - Revision of SP 800-53 Addresses Current Cybersecurity Threats, Adds Privacy Controls - http://www.nist.gov
[01:33:22] <Bender> [NISTIT] - NIST Releases Final Smart Grid aposFramework 2.0apos Document - http://www.nist.gov
[01:33:26] <Bender> [NISTIT] - NSTIC Identity Ecosystem Governance Workshop - http://www.nist.gov
[01:33:30] <Bender> [NISTIT] - Guidance on Wireless Local Area Network Security is Close at Hand - http://www.nist.gov
[01:33:34] <Bender> [NISTIT] - NSTIC Steering Group FFO Proposers Webinar - http://www.nist.gov
[01:33:38] <Bender> [NISTIT] - NIST Announces Funding to Form Steering Group to Support Trusted Identities in Cyberspace - http://www.nist.gov
[01:33:42] <Bender> [NISTIT] - NIST Releases Technical Guidance for Evaluating Electronic Health Records - http://www.nist.gov
[01:33:46] <Bender> [NISTIT] - New Industry Commitments to Give 15 Million Households Tools to Shrink Their Energy Bills - http://www.nist.gov
[01:33:50] <Bender> [NISTIT] - April Workshop Focuses on Cybersecurity for Cyber-Physical Systems and Industrial Controls - http://www.nist.gov
[01:33:54] <Bender> [NISTIT] - NIST Proposes Update to Digital Signature Standard - http://www.nist.gov
[01:33:58] <Bender> [NISTIT] - Fifth Annual Health Information Security Conference Runs June 6-7 - http://www.nist.gov
[01:34:02] <Bender> [NISTIT] - Iris Recognition Report Evaluates aposNeedle in Haystackapos Search Capability - http://www.nist.gov
[01:34:06] <Bender> [NISTIT] - Creating Usable Electronic Health Records (EHRs): A User-Centered Design Best Practices Workshop - http://www.nist.gov
[01:34:10] <Bender> [NISTIT] - Cloud Computing Forum Workshop V Meets June 5-7 at the Department of Commerce - http://www.nist.gov
[01:34:14] <Bender> [NISTIT] - No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere - http://www.nist.gov
[01:34:18] <Bender> [NISTIT] - Comments Requested on Strategies to Mitigate Risk in the Federal ICT Supply Chain - http://www.nist.gov
[01:34:22] <Bender> [NISTIT] - A User-Centered Approach to Designing Electronic Health Records - http://www.nist.gov
[01:34:26] <Bender> [NISTIT] - Experts to Discuss Botnet Challenges, Steps for Prevention at May 30 Workshop - http://www.nist.gov
[01:34:30] <Bender> [NISTIT] - New Cybersecurity Center Kicks Off with Workshop - http://www.nist.gov
[01:34:34] <Bender> [NISTIT] - NIST Special Publication Helps to Demystify Cloud Computing - http://www.nist.gov
[01:34:38] <Bender> [NISTIT] - NIST Will Hold Big Data Workshop June 13-14, 2012 - http://www.nist.gov
[01:34:42] <Bender> [NISTIT] - NIST Releases Final Version of Revised Bluetooth Security Guide - http://www.nist.gov
[01:34:46] <Bender> [NISTIT] - NIST Effort Could Improve High-Tech Medical Scanners - http://www.nist.gov
[01:34:50] <Bender> [NISTIT] - NIST Updates Guidelines for Mobile Device Security - http://www.nist.gov
[01:34:54] <Bender> [NISTIT] - NIST Issues Guidance for Pediatric Electronic Health Records - http://www.nist.gov
[01:34:58] <Bender> [NISTIT] - NIST Releases Second Draft of Federal ID Credential Security Standard for Comment - http://www.nist.gov
[01:35:02] <Bender> [NISTIT] - NIST Releases Test Framework for Upgrading Smart Electrical Meters - http://www.nist.gov
[01:35:06] <Bender> [NISTIT] - Software Features and Inherent Risks: NISTaposs Guide to Rating Software Vulnerabilities from Misuse - http://www.nist.gov
[01:35:10] <Bender> [NISTIT] - NIST Updates Guidance on Network Attacks and Malware - http://www.nist.gov
[01:35:14] <Bender> [NISTIT] - Steering Group for Identity Ecosystem Hosts First Meeting - http://www.nist.gov
[01:35:18] <Bender> [NISTIT] - Updated NIST Guide is a How-To for Dealing With Computer Security Incidents - http://www.nist.gov
[01:35:22] <Bender> [NISTIT] - NIST Shows New Device Could Improve Fiber-Optic Quantum Data Transmission - http://www.nist.gov
[01:35:26] <Bender> [NISTIT] - NIST Co-Sponsors the 2012 Biometrics Consortium Conference - http://www.nist.gov
[01:35:30] <Bender> [NISTIT] - Security First: New NIST Guidelines on Securing BIOS for Servers - http://www.nist.gov
[01:35:34] <Bender> [NISTIT] - October Workshop to Consider Future of Information and Communication Technology Supply Chain Risk Management - http://www.nist.gov
[01:35:38] <Bender> [NISTIT] - New NIST Publication Provides Guidance for Computer Security Risk Assessments - http://www.nist.gov
[01:35:42] <Bender> [NISTIT] - Register For Forensics@NIST - http://www.nist.gov
[01:35:46] <Bender> [NISTIT] - Five Pilot Projects Receive Grants to Promote Online Security and Privacy - http://www.nist.gov
[01:35:50] <Bender> [NISTIT] - Third Annual NICE Workshop Adds a Virtual Cyber Threat Training and Competition Track - http://www.nist.gov
[01:35:54] <Bender> [NISTIT] - NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition - http://www.nist.gov
[01:35:58] <Bender> [NISTIT] - NIST Revises Software Patch Management Guide for Automated Processes - http://www.nist.gov
[01:36:02] <Bender> [NISTIT] - New NIST Software Checks Performance of Biometrics Applications Against 2011 Standard - http://www.nist.gov
[01:36:06] <Bender> [NISTIT] - NIST Provides Draft Guidelines to Secure Mobile Devices - http://www.nist.gov
[01:36:10] <Bender> [NISTIT] - NIST Publishes Methods to Manage Risk in the Federal ICT Supply Chain - http://www.nist.gov
[01:36:14] <Bender> [NISTIT] - Cloud Computing and Big Data Intersect at NIST, January 15-17 - http://www.nist.gov
[01:36:18] <Bender> [NISTIT] - New NIST Document Offers Guidance in Cryptographic Key Generation - http://www.nist.gov
[01:36:22] <Bender> [NISTIT] - Forensics@NIST 2012 Webcast Now Available - http://www.nist.gov
[01:36:26] <Bender> [NISTIT] - aposStandard Quantum Limitapos Smashed, Could Mean Better Fiber-Optic Comms - http://www.nist.gov
[01:36:30] <Bender> [NISTIT] - NIST Biometric Workshop Studies Voice, Dental, Oral Standards - http://www.nist.gov
[01:36:34] <Bender> [NISTIT] - NIST SBIR Program Soliciting Proposals to Solve Cybersecurity and Manufacturing Challenges - http://www.nist.gov
[01:36:38] <Bender> [NISTIT] - NIST to Host February 2013 Symposium on the Future of Voting Systems - http://www.nist.gov
[01:36:42] <Bender> [NISTIT] - NIST Solicits Proposals for 2013 Grants to Advance Trusted Identities in Cyberspace - http://www.nist.gov
[01:36:46] <Bender> [NISTIT] - Cybersecurity Center Project to Secure Health Information - http://www.nist.gov
[01:36:50] <Bender> [NISTIT] - NIST Seeks Comments to Final Public Draft of Major Federal Cybersecurity Document - http://www.nist.gov
[01:36:54] <Bender> [NISTIT] - NIST Issues Call for Measurement Science and Engineering Research Grant Proposals - http://www.nist.gov
[01:36:58] <Bender> [NISTIT] - New Guide Will Allow Electric Utilities to Develop Green Button Web Tools - http://www.nist.gov
[01:37:02] <Bender> [NISTIT] - New Reports Define Strategic Vision, Propose RD Priorities for Future Cyber-Physical Systems - http://www.nist.gov
[01:37:06] <Bender> [NISTIT] - National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework - http://www.nist.gov
[01:37:10] <Bender> [NISTIT] - January 15-16 Cloud and Big Data Conference Video Available On Demand - http://www.nist.gov
[01:37:14] <Bender> [NISTIT] - NIST Solicits Views, Ideas from Stakeholders for Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[01:37:18] <Bender> [NISTIT] - Three NIST IT Leadersapos Are Honored with 2013 Federal 100 Awards - http://www.nist.gov
[01:37:22] <Bender> [NISTIT] - March Conference Focuses on New Trends in Cybersecurity and Information Security Education - http://www.nist.gov
[01:37:26] <Bender> [NISTIT] - NIST, Stanford Collaborate to Catalog Early Microcomputing Software Data - http://www.nist.gov
[01:37:31] <Bender> [NISTIT] - NIST Panel Expands Recommendations for Use of Electronic Health Records in Pediatrics - http://www.nist.gov
[01:37:35] <Bender> [NISTIT] - National Cybersecurity Center of Excellence - http://www.nist.gov
[01:37:39] <Bender> [NISTIT] - NIST Guides Seek Interoperability for Automated Fingerprint ID Systems - http://www.nist.gov
[01:37:43] <Bender> [NISTIT] - NFI Publishes White Paper on Trends, Challenges and Strategy in Forensic Science - http://www.nist.gov
[01:37:47] <Bender> [NISTIT] - NCCOE NCEP Signing Ceremony - http://www.nist.gov
[01:37:51] <Bender> [NISTIT] - Health IT Mobile Device Use Case Meeting - http://www.nist.gov
[01:37:55] <Bender> [NISTIT] - Industry Partners Join the National Cybersecurity Center of Excellence - http://www.nist.gov
[01:37:59] <Bender> [NISTIT] - NIST to Host Symposium on aposOntology Evaluationapos May 2-3, 2013 - http://www.nist.gov
[01:38:03] <Bender> [NISTIT] - May Conference to Discuss Safeguarding Health Information Through HIPAA Security - http://www.nist.gov
[01:38:07] <Bender> [NISTIT] - Improving Critical Infrastructure Cybersecurity Workshop Video Available On Demand - http://www.nist.gov
[01:38:11] <Bender> [NISTIT] - Eleven Companies Join as Partners in National Cybersecurity Center of Excellence - http://www.nist.gov
[01:38:15] <Bender> [NISTIT] - NIST Announces Plan to Sponsor First Cybersecurity FFRDC - http://www.nist.gov
[01:38:19] <Bender> [NISTIT] - Second Cybersecurity Infrastructure Framework Workshop Gathers May 29-31, 2013 - http://www.nist.gov
[01:38:23] <Bender> [NISTIT] - NIST Issues Major Revision of Core Computer Security Guide: SP 800-53 - http://www.nist.gov
[01:38:27] <Bender> [NISTIT] - NIST Posts Initial Analysis of RFI Comments on Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[01:38:31] <Bender> [NISTIT] - Forensic Database Environmental Table - http://www.nist.gov
[01:38:35] <Bender> [NISTIT] - Forensic Database Trace Evidence Table - http://www.nist.gov
[01:38:39] <Bender> [NISTIT] - First Observation of Spin Hall Effect in a Quantum Gas Is Step Toward aposAtomtronicsapos - http://www.nist.gov
[01:38:43] <Bender> [NISTIT] - NIST Publishes Draft Cloud Computing Security Document for Comment - http://www.nist.gov
[01:38:47] <Bender> [NISTIT] - Protecting the Nations Critical Infrastructure - http://www.nist.gov
[01:38:51] <Bender> [NISTIT] - NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop - http://www.nist.gov
[01:38:55] <Bender> [NISTIT] - Revised Security Guidelines Provide Strategy for Government Mobile Device Management - http://www.nist.gov
[01:38:59] <Bender> [NISTIT] - NIST Calls for Suggestions to Speed Computer Incident Teams Responses - http://www.nist.gov
[01:39:03] <Bender> [NISTIT] - NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure - http://www.nist.gov
[01:39:07] <Bender> [NISTIT] - Who Are You? NIST Biometric Publication Provides Two New Ways to Tell Quickly - http://www.nist.gov
[01:39:11] <Bender> [NISTIT] - NIST Releases Updates to Digital Signature Standard - http://www.nist.gov
[01:39:15] <Bender> [NISTIT] - The National Cybersecurity Center Seeks Comments on Energy Industry Security Scenarios - http://www.nist.gov
[01:39:19] <Bender> [NISTIT] - Next Workshop on Critical Infrastructure Cybersecurity Framework is in Dallas, Sept. 11, 2013 - http://www.nist.gov
[01:39:23] <Bender> [NISTIT] - 13 Companies Receive 2013 NIST Small Business Innovation Research Awards - http://www.nist.gov
[01:39:27] <Bender> [NISTIT] - Two NIST Standards Experts Are Honored With 2013 ANSI Leadership and Service Awards - http://www.nist.gov
[01:39:31] <Bender> [NISTIT] - Two Updated Guides Provide Latest NIST Recommendations for System Patches, Malware Avoidance - http://www.nist.gov
[01:39:35] <Bender> [NISTIT] - NIST Study Advances Use of Iris Images as a Long-Term Form of Identification - http://www.nist.gov
[01:39:39] <Bender> [NISTIT] - NIST October Workshop to Explore Intersection of Cloud Computing and Mobility - http://www.nist.gov
[01:39:43] <Bender> [NISTIT] - Learn About Navigating the National Cybersecurity Education Interstate Highway at NIST, Sept. 17-19 - http://www.nist.gov
[01:39:47] <Bender> [NISTIT] - Federal ID Credential Security Standard Strengthens Authentication, Extends To Mobile Devices - http://www.nist.gov
[01:39:51] <Bender> [NISTIT] - Software Asset Management Workshop - http://www.nist.gov
[01:39:55] <Bender> [NISTIT] - NIST Awards Grants to Improve Online Security and Privacy - http://www.nist.gov
[01:39:59] <Bender> [NISTIT] - NIST Announces Five Grants to Pilot Trusted Identity Technologies - http://www.nist.gov
[01:40:03] <Bender> [NISTIT] - Grants to Two States Will Support Improved Access to Services and Reduce Fraud - http://www.nist.gov
[01:40:07] <Bender> [NISTIT] - NCCoE Launches New Building Block - http://www.nist.gov
[01:40:11] <Bender> [NISTIT] - NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments - http://www.nist.gov
[01:40:15] <Bender> [NISTIT] - NIST/JQI Team aposGets the Edgeapos on Photon Transport in Silicon - http://www.nist.gov
[01:40:19] <Bender> [NISTIT] - NIST Seeks Public Input on Updated Smart Grid Cybersecurity Guidelines - http://www.nist.gov
[01:40:23] <Bender> [NISTIT] - White House Blog: Seeking Cybersecurity Framework Comments - http://www.nist.gov
[01:40:27] <Bender> [NISTIT] - NIST Fellow Ron Ross Honored With Inaugural McNulty Information Security Leadership Award - http://www.nist.gov
[01:40:31] <Bender> [NISTIT] - Not Just a Pretty Face: Bodies Provide Important Cues for Recognizing People - http://www.nist.gov
[01:40:35] <Bender> [NISTIT] - Comments on Updated Guidance for Role-Based IT Security Training for Federal Employees Requested by Nov. 30 - http://www.nist.gov
[01:40:38] <Bender> [SoylentNews] - Belgian Hospitals Turn to Robots to Receive Patients - http://sylnt.us
[01:40:39] <Bender> [NISTIT] - Three NIST IT Staff Named To Top 15 'Forward-Thinking People in Government IT' List - http://www.nist.gov
[01:40:43] <Bender> [NISTIT] - Trusted Identities to Secure Critical Infrastructure - http://www.nist.gov
[01:40:47] <Bender> [NISTIT] - NIST/NCCoE FFRDC Industry Day - http://www.nist.gov
[01:40:51] <Bender> [NISTIT] - 2014 Cybersecurity Forum to Focus on Trusted Computing, Security Automation and Information Sharing - http://www.nist.gov
[01:40:55] <Bender> [NISTIT] - NIST Seeks Input in Advance of Request for Proposals to Support National Cybersecurity Center of Excellence - http://www.nist.gov
[01:40:59] <Bender> [NISTIT] - Quantum Physics Could Make Secure, Single-Use Computer Memories Possible - http://www.nist.gov
[01:41:03] <Bender> [NISTIT] - Data Science Symposium 2014 - http://www.nist.gov
[01:41:07] <Bender> [NISTIT] - NIST March Meeting Showcases Advanced Technologies to Help Manage the Nationaposs Infrastructure - http://www.nist.gov
[01:41:11] <Bender> [NISTIT] - NIST to Hold Cryptographic Key Management Workshop March 4-5 - http://www.nist.gov
[01:41:15] <Bender> [NISTIT] - NIST Releases Cybersecurity Framework Version 1.0 - http://www.nist.gov
[01:41:19] <Bender> [NISTIT] - Stirred, Then Shaken: NIST Atomtronic Study May Pave the Way for New Devices - http://www.nist.gov
[01:41:23] <Bender> [NISTIT] - NIST Requests Comments on its Cryptographic Standards Process - http://www.nist.gov
[01:41:27] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Access Control and Mobile Devices - http://www.nist.gov
[01:41:31] <Bender> [NISTIT] - State-Local Govt Cyber Framework Kickoff - http://www.nist.gov
[01:41:36] <Bender> [NISTIT] - NIST Issues Guidance for Federal Use of Secure Mobile Technology - http://www.nist.gov
[01:41:40] <Bender> [NISTIT] - March Cloud Computing Meetings at NIST Discuss Impact on Mobile Devices, Forensic Science - http://www.nist.gov
[01:41:44] <Bender> [NISTIT] - NIST Information Technology Professionals Recognized for Excellence - http://www.nist.gov
[01:41:48] <Bender> [NISTIT] - Engineering for Privacy: NIST Workshop Meets April 9-10, 2014 - http://www.nist.gov
[01:41:52] <Bender> [NISTIT] - NCCoE Invites Collaboration on Energy Sector Cybersecurity Challenge - http://www.nist.gov
[01:41:56] <Bender> [NISTIT] - NIST Removes Cryptography Algorithm from Random Number Generator Recommendations - http://www.nist.gov
[01:42:00] <Bender> [NISTIT] - NIST Conference Will Explore the Role of New Information Systems in Organizations, May 22, 2014 - http://www.nist.gov
[01:42:03] <Bender> [HackerNews] - Deep Reinforcement Learning - https://deepmind.com
[01:42:04] <Bender> [NISTIT] - Free NIST Web-Based Program Manages the App Vetting Workflow - http://www.nist.gov
[01:42:08] <Bender> [NISTIT] - NIST Revises Guide to Use of Transport Layer Security (TLS) in Networks - http://www.nist.gov
[01:42:12] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model IT Asset Management System for Financial Services Companies - http://www.nist.gov
[01:42:16] <Bender> [NISTIT] - NIST Meeting: Cybersecurity Is a Key Ingredient In the Manufacturing Mix - http://www.nist.gov
[01:42:20] <Bender> [NISTIT] - Symposium to Focus on Future of Voting Systems - http://www.nist.gov
[01:42:24] <Bender> [NISTIT] - NIST Requests Round Two Comments on its Cryptographic Standards Process - http://www.nist.gov
[01:42:28] <Bender> [NISTIT] - Open-Source Software for Quantum Information - http://www.nist.gov
[01:42:32] <Bender> [NISTIT] - NIST Security Guide Walks Organizations Through the Mobile App Security Vetting Process - http://www.nist.gov
[01:42:36] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide for Final Public Review - http://www.nist.gov
[01:42:40] <Bender> [NISTIT] - Vendors Sought to Develop Model System to Monitor Security of Energy Industry Networked Control Systems - http://www.nist.gov
[01:42:44] <Bender> [NISTIT] - NIST Announces Pilot Grants Competition to Improve Security and Privacy of Online Identity Verification Systems - http://www.nist.gov
[01:42:48] <Bender> [NISTIT] - New NIST Tools to Help Boost Wireless Channel Frequencies and Capacity - http://www.nist.gov
[01:42:52] <Bender> [NISTIT] - NCCoE Speaker Series March 2015 - http://www.nist.gov
[01:42:56] <Bender> [NISTIT] - Spotlight on Commerce: Donna F. Dodson - http://www.nist.gov
[01:43:00] <Bender> [NISTIT] - Federal Funding Opportunity Solicits Projects That Support Online Privacy - http://www.nist.gov
[01:43:04] <Bender> [NISTIT] - New NIST Center of Excellence to Improve Statistical Analysis of Forensic Evidence - http://www.nist.gov
[01:43:08] <Bender> [NISTIT] - NIST Requests Comments on a Draft Privacy Risk Management Framework - http://www.nist.gov
[01:43:12] <Bender> [NISTIT] - NIST Director Willie May Comments on the Global City Teams Challenge Expo - http://www.nist.gov
[01:43:16] <Bender> [NISTIT] - Draft Guide Can Help Energy Companies Reduce Cyber Risk - http://www.nist.gov
[01:43:20] <Bender> [NISTIT] - Study Reveals Forensic Facial Examiners Can Be Near Perfect - http://www.nist.gov
[01:43:24] <Bender> [NISTIT] - NIST Seeks Comments on Guidance for Protecting Access to Information Systems - http://www.nist.gov
[01:43:28] <Bender> [NISTIT] - NIST Tackles Email Security with a Two-Faceted Approach - http://www.nist.gov
[01:43:32] <Bender> [NISTIT] - NISTs Ron Ross Wins Three Top Awards for Advancing Cybersecurity - http://www.nist.gov
[01:43:36] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Protecting Privacy Online - http://www.nist.gov
[01:43:40] <Bender> [NISTIT] - NIST Simulates Fast, Accurate DNA Sequencing Through Graphene Nanopore - http://www.nist.gov
[01:52:10] <Bender> [HackerNews] - The Nazi-Era Papers My ‘Mexican’ Mother Kept - http://www.wsj.com
[01:52:23] <Bender> [NISTBio] - Computing for Better Radiation Therapy - http://www.nist.gov
[01:52:35] <Bender> [NISTIT] - Independent Committee Begins Review of NISTs Cryptographic Material and Development Process - http://www.nist.gov
[01:52:39] <Bender> [NISTIT] - NIST Digital Forensic Resource Honored with a National Innovation Award - http://www.nist.gov
[01:52:43] <Bender> [NISTIT] - NIST Seeks Comments on Major Revision to Industrial Control Systems Security Guide - http://www.nist.gov
[01:52:47] <Bender> [NISTIT] - NCCoE Summer Open House - http://www.nist.gov
[01:52:51] <Bender> [NISTIT] - NIST Requests Public Comment on Proposed SHA-3 Cryptographic - http://www.nist.gov
[01:52:55] <Bender> [NISTIT] - Rush a Light Wave and Youaposll Break Its Data, say Scientists - http://www.nist.gov
[01:52:59] <Bender> [NISTIT] - Proposed Risk Management Guidelines Aim to Bolster Security of Federal ICT Supply Chains - http://www.nist.gov
[01:53:03] <Bender> [NISTIT] - NIST: Performance of Facial Recognition Software Continues to Improve - http://www.nist.gov
[01:53:07] <Bender> [NISTIT] - The Internetaposs Next Big Idea: Connecting People, Information, and Things - http://www.nist.gov
[01:53:11] <Bender> [NISTIT] - NIST to Establish New Centers of Excellence for Work in Forensics, Disaster Resilience - http://www.nist.gov
[01:53:15] <Bender> [NISTIT] - NIST Seeks Members for Three New Cloud Computing Working Groups - http://www.nist.gov
[01:53:19] <Bender> [NISTIT] - Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches - http://www.nist.gov
[01:53:23] <Bender> [NISTIT] - NIST Advisory Group Releases Report on Cryptography Expertise and Standards Process - http://www.nist.gov
[01:53:27] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2014 - http://www.nist.gov
[01:53:31] <Bender> [NISTIT] - Digital Crime-Fighters Face Technical Challenges with Cloud Computing - http://www.nist.gov
[01:53:35] <Bender> [NISTIT] - NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - http://www.nist.gov
[01:53:39] <Bender> [NISTIT] - Registration Opens for the Next Cybersecurity Framework Workshop - http://www.nist.gov
[01:53:43] <Bender> [NISTIT] - Updated NIST Guide Provides Computer Security Assessment Procedures for Core Security Controls - http://www.nist.gov
[01:53:47] <Bender> [NISTIT] - Global City Teams Challenge Workshop - http://www.nist.gov
[01:53:51] <Bender> [NISTIT] - NIST aposGlobal City Teams Challengeapos to Create Smart Cities - http://www.nist.gov
[01:53:55] <Bender> [NISTIT] - NIST Therapy for Ultraviolet Laser Beams: Hydrogen-treated Fibers - http://www.nist.gov
[01:53:59] <Bender> [NISTIT] - NIST, IAPP Host Privacy Engineering Workshop in September 2014 - http://www.nist.gov
[01:54:03] <Bender> [NISTIT] - NIST Vetting Guide Helps in Testing Mobile Apps to Learn What They Really Do - http://www.nist.gov
[01:54:07] <Bender> [NISTIT] - NIST Team Honored for Work on Military Smartphone Apps, Security - http://www.nist.gov
[01:54:11] <Bender> [NISTIT] - New Forensic Subcommittee on Digital Evidence Added to Organization of Scientific Area Committees - http://www.nist.gov
[01:54:15] <Bender> [NISTIT] - NIST Helps Develop New Standard for Microsensor Technology - http://www.nist.gov
[01:54:19] <Bender> [NISTIT] - NIST Announces FY 2014 Small Business Innovation Research Awards - http://www.nist.gov
[01:54:23] <Bender> [NISTIT] - NIST Megacities Carbon Project Named aposProject to Watchapos by United Nations - http://www.nist.gov
[01:54:27] <Bender> [NISTIT] - Three Pilot Projects Receive Grants to Improve Online Security and Privacy - http://www.nist.gov
[01:54:31] <Bender> [NISTIT] - NCCoE Seeks Comments on Mobile Device Security Building Block - http://www.nist.gov
[01:54:35] <Bender> [NISTIT] - NCCoE Fall Open House - http://www.nist.gov
[01:54:39] <Bender> [NISTIT] - NIST Awards Contract to MITRE to Support Cybersecurity Center of Excellence - http://www.nist.gov
[01:54:43] <Bender> [NISTIT] - NISTaposs Cloud Computing Roadmap Details Research Requirements and Action Plans - http://www.nist.gov
[01:54:47] <Bender> [NISTIT] - UMD and NIST Announce the Creation of the Joint Center for Quantum Information and Computer Science - http://www.nist.gov
[01:54:51] <Bender> [NISTIT] - 2014 Cybersecurity Education Meeting Emphasizes Presidential Ready to Work Initiative - http://www.nist.gov
[01:54:55] <Bender> [NISTIT] - Cyber Security: Your Mother Was Right, Sharing is Good, And NIST Has Some Help on How - http://www.nist.gov
[01:54:59] <Bender> [NISTIT] - Filling the Gap: NIST Document to Protect Federal Information in Nonfederal Information Systems - http://www.nist.gov
[01:55:03] <Bender> [NISTIT] - Cloud Metrics Could Provide the Goldilocks Solution to Which Cloud Vendor Is aposJust Rightapos - http://www.nist.gov
[01:55:07] <Bender> [NISTIT] - NIST Issues New Revision of Guide to Assessing Information Security Safeguards - http://www.nist.gov
[01:55:11] <Bender> [NISTIT] - Cybersecurity Center Invites Feedback on Securing Medical Devices - http://www.nist.gov
[01:55:15] <Bender> [NISTIT] - NIST Announces Initial Members of Forensic Science Digital Evidence Subcommittee - http://www.nist.gov
[01:55:19] <Bender> [NISTIT] - Global City Teams Challenge Tech Jam - http://www.nist.gov
[01:55:24] <Bender> [NISTIT] - Future of Voting Systems Symposium II - http://www.nist.gov
[01:55:28] <Bender> [NISTIT] - Cybersecurity Summit Technical Workshop - http://www.nist.gov
[01:55:32] <Bender> [NISTIT] - NIST 2015 SBIR Grants to Fund Research in Manufacturing, Clean Energy, Cybersecurity and Bioscience - http://www.nist.gov
[01:55:36] <Bender> [NISTIT] - Lack of Effective Timing Signals Could Hamper Internet of Things Development - http://www.nist.gov
[01:55:40] <Bender> [NISTIT] - Comments Sought on Access Control Building Block - http://www.nist.gov
[01:55:44] <Bender> [NISTIT] - NIST Invites Comments on Challenges in Protecting Consumer Data - http://www.nist.gov
[01:55:48] <Bender> [NISTIT] - NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems - http://www.nist.gov
[01:55:52] <Bender> [NISTIT] - NIST Request Comments on Its Big Data Framework Development - http://www.nist.gov
[01:55:56] <Bender> [NISTIT] - Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies - http://www.nist.gov
[01:56:00] <Bender> [NISTIT] - Securing a Public Safety Broadband Network with Identity Management - http://www.nist.gov
[01:56:04] <Bender> [NISTIT] - NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos - http://www.nist.gov
[01:56:08] <Bender> [NISTIT] - New Report: Online Identity Projects are Creating More Options for Businesses, Individuals - http://www.nist.gov
[01:56:12] <Bender> [NISTIT] - NIST Requests Comments for Revising Its Electronic Authentication Guideline - http://www.nist.gov
[01:56:16] <Bender> [NISTIT] - NCCoE Speaker Series May 2015 - http://www.nist.gov
[01:56:20] <Bender> [NISTIT] - Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security - http://www.nist.gov
[01:56:24] <Bender> [NISTIT] - Seeing 3D Shapes with SEM - http://www.nist.gov
[01:56:28] <Bender> [NISTIT] - Two NIST Experts Named Service to America Medal Finalists - http://www.nist.gov
[01:56:32] <Bender> [NISTIT] - NIST Contributes to IEC White Paper on Wireless Sensor Networks, IOT - http://www.nist.gov
[01:56:36] <Bender> [NISTIT] - NIST Aims for Tool to Help Manufacturers Select Wireless Network Thats Right for Them - http://www.nist.gov
[01:56:40] <Bender> [NISTIT] - Global Cities Expo to Showcase Internet of Things Apps, June 1 - http://www.nist.gov
[01:56:44] <Bender> [NISTIT] - NIST Releases Update of Industrial Control Systems Security Guide - http://www.nist.gov
[01:56:48] <Bender> [NISTIT] - Nothing Says You Like a Tattoo: NIST Workshop Considers Ways to Improve Tattoo Recognition - http://www.nist.gov
[01:56:52] <Bender> [NISTIT] - Lockheed Martin Study: NIST Computational Tool Improves Product Testing and Saves Money - http://www.nist.gov
[01:56:56] <Bender> [NISTIT] - Learn About the State of Federal Cloud Computing at NIST, July 7-10, 2015 - http://www.nist.gov
[01:57:00] <Bender> [NISTIT] - NISTs NextGen PIV Card Strengthens Security and Authentication - http://www.nist.gov
[01:57:04] <Bender> [NISTIT] - Research Roadmap Traces the Path to Smart Fire Fighting - http://www.nist.gov
[01:57:08] <Bender> [NISTIT] - NIST Publishes Final Guidelines for Protecting Sensitive Government Information Held by Contractors - http://www.nist.gov
[01:57:12] <Bender> [NISTIT] - Safeguarding Health Information Building Assurance through HIPAA Security September 2015 - http://www.nist.gov
[01:57:16] <Bender> [NISTIT] - NIST Revises Key Computer Security Publication on Random Number Generation - http://www.nist.gov
[01:57:20] <Bender> [NISTIT] - NCCoE Speaker Series July 2015 - http://www.nist.gov
[01:57:24] <Bender> [NISTIT] - NCCoE Launches Building Blocks for Email Security and PIV Credentials - http://www.nist.gov
[01:57:28] <Bender> [NISTIT] - NIST and NTIA Seek Industry Partners for Public Safety Communications Test Bed - http://www.nist.gov
[01:57:32] <Bender> [NISTIT] - Comments Requested on Draft Guide for Keeping Medical Information Secure on Mobile Devices - http://www.nist.gov
[01:57:36] <Bender> [NISTIT] - NIST Hosts September Meeting on Protecting Health Info Through HIPAA Security - http://www.nist.gov
[01:57:40] <Bender> [NISTIT] - NIST to Host First App Challenge to Improve Data Access - http://www.nist.gov
[01:57:44] <Bender> [NISTIT] - NIST Releases SHA-3 Cryptographic Hash Standard - http://www.nist.gov
[01:57:48] <Bender> [NISTIT] - U.S. Departments of Justice and Commerce Name Six Experts as New Members of National Commission on Forensic Science - http://www.nist.gov
[01:57:52] <Bender> [NISTIT] - Interagency Report Advocates Support for International Cybersecurity Standardization - http://www.nist.gov
[01:57:56] <Bender> [NISTIT] - NCCoE Seeks Vendors to Develop Model Systems for Controlling Access to IT Assets - http://www.nist.gov
[01:58:00] <Bender> [NISTIT] - NIST Hosts 2015 Cybersecurity Innovation Forum, Sept. 9-11 in D.C. - http://www.nist.gov
[01:58:04] <Bender> [NISTIT] - NIST Invites Industry to Cyber Supply Chain Risk Management Workshop, October 1-2, 2015 - http://www.nist.gov
[01:58:08] <Bender> [NISTIT] - Hands Off! NIST Helps Bring Contactless Fingerprint Technology to Market - http://www.nist.gov
[01:58:12] <Bender> [NISTIT] - NIST Physicists Show Molecules Made of Light May Be Possible - http://www.nist.gov
[01:58:16] <Bender> [NISTIT] - NIST Global City Teams Challenge Aims to Create Smart Cities - http://www.nist.gov
[01:58:20] <Bender> [NISTIT] - NCCoE Seeks Comments on Revised Software Asset Management Building Block - http://www.nist.gov
[01:58:24] <Bender> [NISTIT] - NIST Releases Draft Framework to Help Cyber Physical Systems Developers - http://www.nist.gov
[01:58:28] <Bender> [NISTIT] - Pilot Projects to Improve Cybersecurity, Reduce Online Theft - http://www.nist.gov
[01:58:32] <Bender> [NISTIT] - NIST Seeks Comments on Guide to Help Financial Services Sector Manage IT Assets - http://www.nist.gov
[01:58:36] <Bender> [NISTIT] - NIST to Support Cybersecurity Jobs Heat Map to Highlight Employer Needs and Worker Skills - http://www.nist.gov
[01:58:41] <Bender> [NISTIT] - NIST Invites Comments on Practice Guide for Improving Mobile Device Security - http://www.nist.gov
[01:58:45] <Bender> [NISTIT] - NIST Offers Guidance on Using Technology to Prevent Intrusions, Malware - http://www.nist.gov
[01:58:49] <Bender> [NISTIT] - NIST Announces Winners of Its First-Ever App Challenge - http://www.nist.gov
[01:58:53] <Bender> [NISTIT] - NIST Seeks Comments on New Project Aimed at Ensuring Data Integrity - http://www.nist.gov
[01:58:57] <Bender> [NISTIT] - NIST Seeks Comments on Cybersecurity Framework Use, Potential Updates and Future Management - http://www.nist.gov
[01:59:01] <Bender> [NISTIT] - Strengthening Public-Private Cooperation on Cybersecurityaposs Toughest Issues - http://www.nist.gov
[01:59:05] <Bender> [NISTIT] - Cybersecurity Rosetta Stone Celebrates Two Years of Success - http://www.nist.gov
[01:59:09] <Bender> [NISTIT] - Cloud Computing Can Assist Workers with Disabilities, NIST Reports - http://www.nist.gov
[01:59:13] <Bender> [NISTIT] - Attackers Honing In On Teleworkers? How Organizations Can Secure Their Data - http://www.nist.gov
[01:59:17] <Bender> [NISTIT] - NIST Participates in Hannover Messe 2016 as the U.S. Services as the Official Partner Country - http://www.nist.gov
[01:59:21] <Bender> [NISTIT] - Cybersecurity Framework Comments Reveal Views on a Framework Update, Increased Need to Share Best Practices and Expand Awareness - http://www.nist.gov
[01:59:25] <Bender> [NISTIT] - New NIST Security Standard Can Protect Credit Cards, Health Information - http://www.nist.gov
[01:59:29] <Bender> [NISTIT] - NIST Releases 2015 Department of Commerce Technology Transfer Report - http://www.nist.gov
[01:59:33] <Bender> [NISTIT] - NIST Kicks Off Effort to Defend Encrypted Data from Quantum Computer Threat - http://www.nist.gov
[01:59:37] <Bender> [NISTIT] - NISTs Information Security and Privacy Advisory Board Names New Chair - http://www.nist.gov
[01:59:41] <Bender> [NISTIT] - NIST RAMPS Up Cybersecurity Education and Workforce Development With New Grants - http://www.nist.gov
[02:22:33] <Bender> [HackerNews] - A Hacking of More Than $50M Dashes Hopes in the World of Virtual Currency - http://www.nytimes.com
[02:22:37] <Bender> [HackerNews] - Wt, C++ Web Toolkit - https://www.webtoolkit.eu
[03:03:04] <Bender> [HackerNews] - Is there a good place to casually discuss programming-related questions? - https://news.ycombinator.com
[03:13:12] <Bender> [HackerNews] - Streak (YC S11) hiring a Back end Tech Lead to build autopilot for salespeople - https://www.streak.com
[03:13:53] <Bender> [ScienceDaily] - World's first 1,000-processor chip - https://www.sciencedaily.com
[03:13:57] <Bender> [ScienceDaily] - Dynamics of a mixture or suspension: Dewatering natural fiber suspensions via compression - https://www.sciencedaily.com
[03:28:24] <Bender> [HackerNews] - IEX Outduels Citadel, NYSE as ‘Flash Boys’ Exchange Approved - http://www.bloomberg.com
[03:28:28] <Bender> [HackerNews] - Pieter Hintjens GitHub contribution history (pacman art) - http://sylnt.us
[03:38:32] <Bender> [HackerNews] - Show HN: Decentralized Anonymous Court for TheDAO - http://orcarium.com
[03:42:11] <Bender> [SoylentNews] - Non-US Encryption is 'Theoretical' Claims CIA Chief in Backdoor Debate - http://sylnt.us
[03:43:35] <Bender> [HackerNews] - An Expensive Law Degree, and No Place to Use It - http://www.nytimes.com
[03:58:47] <Bender> [HackerNews] - Streak (YC S11) is hiring a back-end tech lead – build autopilot for salespeople - https://www.streak.com
[04:03:51] <Bender> [HackerNews] - Pornucopia - https://aeon.co
[04:08:55] <Bender> [HackerNews] - Formalizing 100 Theorems - http://www.cs.ru.nl
[04:08:59] <Bender> [HackerNews] - Survey of research into the effects of pornography - https://aeon.co
[04:29:10] <Bender> [HackerNews] - Linux plus CP/M plus assembly equals LASM - http://www.insentricity.com
[04:29:14] <Bender> [HackerNews] - Startups and immigration - https://techcrunch.com
[04:34:14] <Bender> [HackerNews] - Silicon Valley is plucking top AI talent from universities - http://www.economist.com
[04:39:18] <Bender> [HackerNews] - Go: Subtests and Sub-benchmarks - http://elliot.land
[05:13:21] <Bender> [SoylentNews] - Viacom Owners Ousts Board Members in "Shakespearean Drama" - http://sylnt.us
[05:14:45] <Bender> [HackerNews] - Election Betting Odds - https://electionbettingodds.com
[06:20:21] <Bender> [ForbesTech] - Did Dinosaur Dads Take Care Of Their Kids? - http://www.forbes.com
[06:40:51] <Bender> [HackerNews] - Being a Developer After 40 - https://medium.freecodecamp.com
[06:40:55] <Bender> [HackerNews] - JPEG 101 – How does JPEG work? - http://arjunsreedharan.org
[06:44:30] <Bender> [SoylentNews] - When the Term Meritocracy was Coined in 1958, it was in a Dystopian Satire - http://sylnt.us
[06:45:54] <Bender> [HackerNews] - Computer Crash Wipes Out Years of Air Force Investigation Records - http://www.defenseone.com
[06:45:58] <Bender> [HackerNews] - Generations of macaques used stone tools to open oysters - http://www.upi.com
[06:50:58] <Bender> [HackerNews] - This tear down is what $5.5M buys you in Palo Alto - http://blog.sfgate.com
[06:51:02] <Bender> [HackerNews] - Building a Streaming Analytics Stack with Apache Kafka and Druid - http://www.confluent.io
[07:26:26] <Bender> [HackerNews] - China issues demolition order on world’s largest religious town in Tibet - http://www.tchrd.org
[07:31:30] <Bender> [HackerNews] - [Wikidata] Random item: Q14829494 - https://lists.wikimedia.org
[07:31:34] <Bender> [HackerNews] - A brief update - https://www.mattcutts.com
[07:36:33] <Bender> [HackerNews] - Google’s stock slid today because of this report on a search ad decline - http://www.recode.net
[07:41:23] <Bender> [ForbesTech] - Firefox Containers Help You Browse The Web Using Separate Identities - http://www.forbes.com
[07:42:24] <Bender> [TheRegister] - Tor torpedoed! Tesco Bank app won't run with privacy tool installed - http://go.theregister.com
[08:22:08] <Bender> [HackerNews] - No-tipping experiment at Costa Mesa restaurants axed - http://www.ocregister.com
[08:22:12] <Bender> [HackerNews] - Principia mission return from orbit: livestream by European Space Agency - http://www.esa.int
[08:32:02] <Bender> [ForbesTech] - Tech Women Triumph: The Change Is Happening At Facebook, Johnson & Johnson, eBay And GM - http://www.forbes.com
[08:46:03] <Bender> [SoylentNews] - Lone Hacker Claims to Have Accessed Democratic National Committee Servers - http://sylnt.us
[08:53:08] <Bender> [PhysOrg] - American, Briton, Russian depart from space station - http://phys.org
[08:53:12] <Bender> [PhysOrg] - Report finds Grand Canyon bison are native to region - http://phys.org
[08:53:17] <Bender> [PhysOrg] - Apple ordered to suspend iPhone 6 sales in Beijing - http://phys.org
[08:53:21] <Bender> [PhysOrg] - 'Hack the Pentagon' program reveals 138 security flaws: US - http://phys.org
[08:53:25] <Bender> [PhysOrg] - Hackers divert $50mn in blow to virtual currency: NYT - http://phys.org
[09:12:47] <Bender> [HackerNews] - Bitcoin Guarantees Strong, Not Eventual, Consistency - http://hackingdistributed.com
[10:03:12] <Bender> [ForbesTech] - Belgians Arrest 12 Suspected Terrorists - http://www.forbes.com
[10:04:02] <Bender> [PhysOrg] - X-57 'Maxwell': NASA electric research plane gets X number, new name - http://phys.org
[10:08:29] <Bender> [HackerNews] - How to choose a database: NoSQL data stores in research and practice (Tutorial) - http://de.slideshare.net
[10:13:34] <Bender> [HackerNews] - Making a website shouldn't be that difficult - http://blog.smartart.it
[10:13:38] <Bender> [HackerNews] - The Deprecation of iCloud Core Data - http://mjtsai.com
[10:17:13] <Bender> [SoylentNews] - Emissions Detected From Space Reveal Big Polluters - http://sylnt.us
[10:18:37] <Bender> [HackerNews] - Writing a 2D Game in Nim - https://hookrace.net
[10:23:41] <Bender> [HackerNews] - Tim Peake successfully returns to Earth after six-month mission - http://www.bbc.co.uk
[10:59:08] <Bender> [HackerNews] - Doctors Without Borders doesn't take money from EU anymore - http://www.msf.org
[10:59:12] <Bender> [HackerNews] - My Experience Busking in San Francisco: 63 Sessions, $5000 - https://stevetjoa.com
[11:03:58] <Bender> [ForbesTech] - Special Ranked Mode Rewards In 'Overwatch' Is A Bad Idea - http://www.forbes.com
[11:04:12] <Bender> [HackerNews] - An Open Letter (The DAO Attacker) - http://pastebin.com
[11:34:35] <Bender> [HackerNews] - The managerial destruction of academic freedom - https://overland.org.au
[11:44:51] <Bender> [MITTech] - The Best of the Physics arXiv (week ending June 18, 2016) - https://www.technologyreview.com
[11:48:23] <Bender> [SoylentNews] - NASA Spacecraft Barreling Toward Jupiter for July 4 Meetup - http://sylnt.us
[12:04:58] <Bender> [HackerNews] - Deconstructing TheDAO Attack: A Brief Code Tour - http://vessenes.com
[12:09:34] <Bender> [ArsTechnica] - Scientific publishers are killing research papers - http://arstechnica.com
[12:40:05] <Bender> [CNET] - How Apple plans on making features smarter while balancing privacy - CNET - http://feedproxy.google.com
[12:50:33] <Bender> [HackerNews] - Free Ebook – ECMAScript 6 and TypeScript - http://free.codingthesmartway.com
[12:50:37] <Bender> [HackerNews] - Amazon is preparing to launch streaming music service – sources - http://www.businesshabit.com
[13:05:17] <Bender> [ArsTechnica] - Reasoning poetically to tackle The Big Picture - http://arstechnica.com
[13:10:49] <Bender> [HackerNews] - The Truth About Common Beauty Myths - http://www.wsj.com
[13:10:53] <Bender> [HackerNews] - Yahoo’s Marissa Mayer Stumbled After Secret Truce with Investor - http://www.wsj.com
[13:31:04] <Bender> [HackerNews] - NASA Uses Node.js in Space Suits – Director of Software Engineering Confirms - https://twitter.com
[13:36:08] <Bender> [HackerNews] - If ICANN only charges 18¢ per domain name, why am I paying $10? - https://webmasters.stackexchange.com
[13:49:55] <Bender> [SoylentNews] - Department of Education Recommends Termination of Accreditor - http://sylnt.us
[14:06:03] <Bender> [ArsTechnica] - Review: Greedy, Greedy Goblins delves deep for chaotic board game fun - http://arstechnica.com
[14:06:17] <Bender> [ForbesTech] - Ask Ethan: Why Do Sunbeams Look Like... Sunbeams? - http://www.forbes.com
[14:06:31] <Bender> [HackerNews] - JavaScript in one picture - http://coodict.github.io
[14:16:25] <Bender> [ForbesTech] - 'Bones' Season 11, Episode 19 Review: The Head In The Abutment - http://www.forbes.com
[14:21:15] <Bender> [ArsTechnica] - Dirty cops on Silk Road case don’t negate Ross Ulbricht’s guilt, DOJ says - http://arstechnica.com
[14:31:23] <Bender> [ArsTechnica] - Ross Ulbricht created Silk Road and deserved life sentence, DOJ argues - http://arstechnica.com
[14:31:51] <Bender> [HackerNews] - Google’s stock slid after report on search ad decline - http://www.recode.net
[14:31:55] <Bender> [HackerNews] - JPEG 101: How does JPEG work? - http://arjunsreedharan.org
[14:31:59] <Bender> [HackerNews] - Show HN: Typeflow – Type-ahead as a Service - https://typeflow.io
[14:32:03] <Bender> [HackerNews] - Deconstructing the DAO Attack: A Brief Code Tour - http://vessenes.com
[14:41:59] <Bender> [HackerNews] - NoSQL Data Stores in Research and Practice [slides] - http://de.slideshare.net
[14:47:02] <Bender> [HackerNews] - It's official: May is now Earth's hottest on record - http://www.sciencealert.com
[14:47:07] <Bender> [HackerNews] - A neat and beautiful Reddit - http://sylnt.us
[14:52:06] <Bender> [HackerNews] - Show HN: Git alias commands and shortcuts - https://news.ycombinator.com
[14:52:10] <Bender> [HackerNews] - Dynamic Witnesses for Static Type Errors – ill-typed programs usually go wrong [pdf] - http://eric.seidel.io
[14:57:11] <Bender> [HackerNews] - Lavender: a browser add-on that makes gendered English pronouns gender-neutral - http://sylnt.us
[15:02:14] <Bender> [HackerNews] - Thinking outside of the box with NGINX series – map command - http://syshero.org
[15:02:18] <Bender> [HackerNews] - The Road Ahead for Ethereum: Three Hard Problems - https://blog.blockstack.org
[15:02:22] <Bender> [HackerNews] - Data Structures in JavaScript with Interactive Visualizations and Exercises - https://www.educative.io
[15:02:58] <Bender> [SingularityHub] - This Week’s Awesome Stories From Around the Web (Through June 18th) - http://singularityhub.com
[15:06:50] <Bender> [ArsTechnica] - Lawyers who yanked “Happy Birthday” into public domain now sue over “This Land” - http://arstechnica.com
[15:07:04] <Bender> [ForbesTech] - Beautiful And Scary At Once: The Science Of Mammatus Clouds - http://www.forbes.com
[15:07:08] <Bender> [ForbesTech] - 'The Walking Dead' Is Doing Insane Things To Make Sure Negan's Victim Doesn't Leak - http://www.forbes.com
[15:07:18] <Bender> [HackerNews] - Why most of London’s tech sector believes Brexit will prove a disaster - https://techcrunch.com
[15:12:22] <Bender> [HackerNews] - UV-C LEDs to Purify Water Aboard the International Space Station - http://www.solidstatelighting.net
[15:21:05] <Bender> [SoylentNews] - U.S. Diplomats Urge Bombing of Assad's Forces in Syria - http://sylnt.us
[15:22:30] <Bender> [HackerNews] - Credit Card Data Stolen from Acer Online Shop - http://www.zdnet.com
[15:32:37] <Bender> [HackerNews] - My Dinner with Peter Thiel - http://www.vanityfair.com
[15:47:35] <Bender> [ForbesTech] - What California Has That France Is Missing - http://www.forbes.com
[15:47:39] <Bender> [ForbesTech] - The 10 Cities With The Fastest And Slowest Wage Growth - http://www.forbes.com
[15:47:50] <Bender> [HackerNews] - Project Bletchley: Microsoft Azure-Blockchain - http://sylnt.us
[15:52:53] <Bender> [HackerNews] - Only the Onion Can Save Us Now - http://www.wired.com
[15:52:57] <Bender> [HackerNews] - Santa Clara County job market booms, reaches all-time high - http://www.mercurynews.com
[15:53:01] <Bender> [HackerNews] - Golang Authentication Using JSON Web Tokens - https://dinosaurscode.xyz
[15:57:43] <Bender> [ForbesTech] - New York Delivers Daily Fantasy Sports Much Needed Reprieve - http://www.forbes.com
[16:17:58] <Bender> [ForbesTech] - 6 Reasons To Start Live Video Streaming Your Brand - http://www.forbes.com
[16:23:16] <Bender> [HackerNews] - Simple Contracts are Better Contracts: the Meltdown of the DAO - https://blog.blockstack.org
[16:23:57] <Bender> [ScienceDaily] - New surface makes oil contamination remove itself - https://www.sciencedaily.com
[16:28:20] <Bender> [HackerNews] - A simple mind hack that helps beat procrastination - http://shyal.com
[16:33:10] <Bender> [ForbesTech] - Cybersecurity: We Need New Systems To Save The Banks - And The People Who Rely On Them - http://www.forbes.com
[16:33:24] <Bender> [HackerNews] - An open letter to the DAO Community – attacker explains - https://steemit.com
[16:33:28] <Bender> [HackerNews] - What We Can Learn from the Meltdown of The DAO - https://blog.blockstack.org
[16:33:32] <Bender> [HackerNews] - To the DAO and the Ethereum community: F- you - http://trilema.com
[16:33:36] <Bender> [HackerNews] - JSON Web Tokens (JWT) deep walkthrough – are sessions dying? - https://float-middle.com
[16:48:35] <Bender> [HackerNews] - Use Wit.ai Natural Language Processing in Elixir - http://www.zohaib.me
[16:48:39] <Bender> [HackerNews] - Recognizing Bad Advice - http://themacro.com
[16:58:43] <Bender> [HackerNews] - Y Combinator's Xerox Alto: restoring the legendary 1970s GUI computer - http://www.righto.com
[17:03:33] <Bender> [ForbesTech] - Nintendo Is Right About VR, Wrong About NX Horsepower - http://www.forbes.com
[17:04:31] <Bender> [SingularityHub] - Future Urban Cars Will Be Simple, Self-Driving, and Super Cheap - http://singularityhub.com
[17:08:23] <Bender> [ArsTechnica] - E3 in photos: Blimps, porn, and LEGO towns at the USA’s largest games expo - http://arstechnica.com
[17:08:37] <Bender> [ForbesTech] - Asia Pacific At A Crossroads: Between Conflict And Peaceful Social Rise - http://www.forbes.com
[17:13:55] <Bender> [HackerNews] - Geez, Now Internet Insurance? - https://blog.archive.org
[17:18:39] <Bender> [CNET] - Apple Watch cut to $49 at Best Buy with purchase of new iPhone - CNET - http://feedproxy.google.com
[17:18:59] <Bender> [HackerNews] - JSON Web Tokens (JWT) vs. Sessions - https://float-middle.com
[17:22:38] <Bender> [SoylentNews] - Buggy Australian Election; Researchers Denied Access to Source Code of Voting Software - http://sylnt.us
[17:23:49] <Bender> [ForbesTech] - Microsoft Wins Even If Xbox Scorpio Loses - http://www.forbes.com
[17:24:02] <Bender> [HackerNews] - The Baffling Economics of the Island of Sodor (2013) - http://www.forbes.com
[17:24:06] <Bender> [HackerNews] - May is Earth's hottest on record - http://www.sciencealert.com
[17:24:11] <Bender> [HackerNews] - JSON Web Tokens vs. Sessions - https://float-middle.com
[17:29:06] <Bender> [HackerNews] - Critical Update on DAO Vulnerability - https://blog.ethereum.org
[17:34:10] <Bender> [HackerNews] - The Money Letter That Every Parent Should Write - http://www.nytimes.com
[17:34:14] <Bender> [HackerNews] - Understanding the Factors That Impact the Popularity of GitHub Repositories - https://arxiv.org
[17:44:18] <Bender> [HackerNews] - Ask HN: The DAO hack – Where does the real money go? - https://news.ycombinator.com
[17:44:23] <Bender> [HackerNews] - Spaceship Generator - http://sylnt.us
[17:44:27] <Bender> [HackerNews] - Remix (YC W15) is hiring a designer - http://getremix.com
[17:49:08] <Bender> [ForbesTech] - Fallout 4's 'Contraptions' DLC Should Make Settlements Less Boring - http://www.forbes.com
[17:49:22] <Bender> [HackerNews] - There Are Dot-Com People and There Are Web People (2000) - http://megnut.com
[17:54:26] <Bender> [HackerNews] - How Do I Learn Some Functional Programming? - http://www.fse.guru
[17:54:30] <Bender> [HackerNews] - Building the Gyroscope App with React Native - https://blog.gyrosco.pe
[18:09:37] <Bender> [HackerNews] - How Frankenstein’s Monster Became Human - https://newrepublic.com
[18:09:41] <Bender> [HackerNews] - N Queens on an FPGA (2014) [pdf] - http://doc.utwente.nl
[18:19:31] <Bender> [ForbesTech] - Xbox Scorpio To Be 'The Most Powerful Console Ever Made,' But PCs Are Still A Thing - http://www.forbes.com
[18:24:49] <Bender> [HackerNews] - Systems Programming in C# by Joe Duffy - https://www.infoq.com
[18:29:53] <Bender> [HackerNews] - One Man's Fight for Free Software (1989) - http://www.nytimes.com
[18:40:00] <Bender> [HackerNews] - Julian Assange: Google Is Hillary Clinton’s ‘Secret Weapon’ - http://www.huffingtonpost.com
[18:45:04] <Bender> [HackerNews] - Reddit censorship - http://techrights.org
[18:45:08] <Bender> [HackerNews] - As ‘Slither.io’ Goes Viral, Game’s Creator Scrambles to Keep Up - http://www.wsj.com
[18:50:08] <Bender> [HackerNews] - Blockchain Company's Smart Contracts Were Dumb - http://linkis.com
[18:53:48] <Bender> [SoylentNews] - Feds Drop all Charges in FedEX Drug Delivery Case - http://sylnt.us
[18:54:52] <Bender> [CNET] - These are the coolest games we saw at E3 - CNET - http://feedproxy.google.com
[18:55:12] <Bender> [HackerNews] - No Man's Sky can keep its name after developer settles with Sky TV - http://www.theverge.com
[19:10:23] <Bender> [HackerNews] - New York passes bill making it illegal to advertise entire apartments on Airbnb - http://gothamist.com
[19:10:28] <Bender> [HackerNews] - Exploring Swift Array's Implementation - http://ankit.im
[19:15:27] <Bender> [HackerNews] - Mozilla Tests Firefox Containers for Separate Online Identities - http://www.techtimes.com
[19:20:31] <Bender> [HackerNews] - Why the US never fully adopted the metric system - http://www.businessinsider.com
[19:20:35] <Bender> [HackerNews] - BitTorrent Live - https://btlive.tv
[19:20:39] <Bender> [HackerNews] - Apache Calcite 1.8.0: dynamic data management, cost-based optimizer - http://mail-archives.apache.org
[19:20:44] <Bender> [HackerNews] - Faceted Search in a Single PostgreSQL Query - http://akorotkov.github.io
[19:21:12] <Bender> [ScienceDaily] - Graphene-based thermal modulators - https://www.sciencedaily.com
[19:21:16] <Bender> [ScienceDaily] - A mathematical analysis of urban traffic models clarifies dispute over which approach is best - https://www.sciencedaily.com
[19:25:35] <Bender> [HackerNews] - Instagram hates developers - https://writing.natwelch.com
[19:26:16] <Bender> [ScienceDaily] - Carrots and sticks fail to change behavior in cocaine addiction - https://www.sciencedaily.com
[19:30:39] <Bender> [HackerNews] - Lenovo Unveils ThinkStation P410/P510: Intel Xeon E5 v4 with Up to 8 Cores - http://www.anandtech.com
[19:31:20] <Bender> [ScienceDaily] - Tiny droplets… lead to exotic properties - https://www.sciencedaily.com
[19:40:46] <Bender> [HackerNews] - California surpasses France as world's 6th largest economy - http://www.cnbc.com
[19:40:51] <Bender> [HackerNews] - Think Less, Think Better - http://www.nytimes.com
[19:41:27] <Bender> [ScienceDaily] - Atomic sculpting with a microscope - https://www.sciencedaily.com
[19:45:30] <Bender> [CNET] - All hail the green-screen queen - CNET - http://feedproxy.google.com
[19:46:27] <Bender> [PhysOrg] - 14 long-forgotten slave remains reburied in NY ceremony - http://phys.org
[19:46:31] <Bender> [PhysOrg] - Three International Space Station astronauts land in Kazakhstan - http://phys.org
[19:51:31] <Bender> [PhysOrg] - Restoration done on vessel that sank more than 300 years ago - http://phys.org
[19:51:35] <Bender> [PhysOrg] - At E3, game makers introduce more diverse heroes - http://phys.org
[19:55:30] <Bender> [ArsTechnica] - Smile, you’re in the FBI face-recognition database - http://arstechnica.com
[20:01:02] <Bender> [HackerNews] - Government’s Role in Vulnerability Disclosure [pdf] - http://belfercenter.ksg.harvard.edu
[20:06:06] <Bender> [HackerNews] - My Experience Busking in San Francisco - https://stevetjoa.com
[20:11:10] <Bender> [HackerNews] - If ICANN only charges 18¢ per domain name, why am I paying $10? (2014) - https://webmasters.stackexchange.com
[20:15:46] <Bender> [ArsTechnica] - Watch Live: Blue Origin tries to not crash its spacecraft on Sunday - http://arstechnica.com
[20:20:50] <Bender> [ArsTechnica] - Watch live: Blue Origin tries to not crash its spacecraft on Sunday - http://arstechnica.com
[20:21:17] <Bender> [HackerNews] - Serverless Architecture in short: lower operations costs and vendor lock-in - https://specify.io
[20:25:53] <Bender> [ArsTechnica] - Jeff Bezos finds the perfect Father’s Day gift: A New Shepard launch - http://arstechnica.com
[20:31:05] <Bender> [CNET] - Benedict Cumberbatch gets his own Doctor Strange Funko toy - CNET - http://feedproxy.google.com
[20:41:33] <Bender> [HackerNews] - Python library for accurate and scaleable deduplication and entity-resolution - http://sylnt.us
[20:51:21] <Bender> [CNET] - Trump says 'ask the gays,' gays flip him the bird on Twitter - CNET - http://feedproxy.google.com
[20:55:20] <Bender> [SoylentNews] - Canonical's Snap Packages: Universal Install Packages for Any Linux Distro? - http://sylnt.us
[21:32:12] <Bender> [HackerNews] - Arch Linux Myth - http://www.catchlinux.com
[21:32:49] <Bender> [PhysOrg] - Dead trees, dry earth: Western US a tinderbox - http://phys.org
[21:37:16] <Bender> [HackerNews] - Amazon is preparing to launch streaming music service – sources - http://www.reuters.com
[21:37:20] <Bender> [HackerNews] - ‘Brexit’: Explaining Britain’s Vote on European Union Membership - http://www.nytimes.com
[21:42:20] <Bender> [HackerNews] - Imagine yourself starting, not finishing - http://shyal.com
[21:47:24] <Bender> [HackerNews] - Why I “Need” an AR-15 - https://medium.com
[21:52:28] <Bender> [HackerNews] - Arch Linux: Myth and Reality (2015) - http://www.catchlinux.com
[21:57:32] <Bender> [HackerNews] - Airbnb Key Exchange in London - http://www.keynest.co.uk
[22:02:35] <Bender> [HackerNews] - Earth has captured a second moon, says NASA - http://www.mnn.com
[22:07:39] <Bender> [HackerNews] - Google Chrome stop supporting HTTP/2 and SPDY. - https://www.nginx.com
[22:12:43] <Bender> [HackerNews] - Show HN: Ergohacking, Filter for ergonomic hacking keyboards - http://www.ergohacking.com
[22:12:47] <Bender> [HackerNews] - Congresswoman Proposes Top 1% Act to Drug Test Wealthy People Who Get Tax Breaks - http://bipartisanreport.com
[22:17:27] <Bender> [CNET] - Apple cites Trump as it turns its back on GOP convention, says report - CNET - http://feedproxy.google.com
[22:22:52] <Bender> [HackerNews] - Unambiguous JavaScript Grammar - http://sylnt.us
[22:26:31] <Bender> [SoylentNews] - Canada is Hiring Two New Astronauts! Apply by Aug. 15 - http://sylnt.us
[22:28:36] <Bender> [ScienceDaily] - Confirmed: Heavy barium nuclei prefer a pear shape - https://www.sciencedaily.com
[22:28:40] <Bender> [ScienceDaily] - Finding a needle in a crystalline haystack - https://www.sciencedaily.com
[22:28:44] <Bender> [ScienceDaily] - Laser manipulates electronic properties - https://www.sciencedaily.com
[22:43:07] <Bender> [HackerNews] - Microsoft releases verification-aware PL under MIT license - http://sylnt.us
[22:43:11] <Bender> [HackerNews] - Sitemaps as a Microservice - http://tech.findmypast.com
[22:48:10] <Bender> [HackerNews] - Small Asteroid Is Earth's Constant Companion - http://www.jpl.nasa.gov
[22:53:14] <Bender> [HackerNews] - Justice Dept. case against FedEx collapses mid-trial - http://overlawyered.com
[22:53:18] <Bender> [HackerNews] - Ariane 5 delivers its heaviest commercial payload - http://www.esa.int
[22:53:22] <Bender> [HackerNews] - Esh – Statistical Similarity of Binaries - http://www.binsim.com
[23:03:02] <Bender> [CNET] - Museum of Broken Relationships turns heartache into art - CNET - http://feedproxy.google.com
[23:08:26] <Bender> [HackerNews] - Reductio – all programs can be reduced to the same instruction stream - http://sylnt.us
[23:13:30] <Bender> [HackerNews] - EM Drive doesn't defy Newton's 3rd law after all - http://www.sciencealert.com
[23:13:34] <Bender> [HackerNews] - New look at the latest Amiga 1200 case design process and key cap announcement - http://www.indieretronews.com
[23:18:34] <Bender> [HackerNews] - New paper claims that the EM Drive doesn't defy Newton's third law - http://www.sciencealert.com
[23:23:38] <Bender> [HackerNews] - StyLit: Illumination-Guided Example-Based Stylization of 3D Renderings - http://dcgi.fel.cvut.cz
[23:23:42] <Bender> [HackerNews] - Reweaving the web: A slew of startups is trying to decentralise the online world - http://www.economist.com
[23:28:41] <Bender> [HackerNews] - LimeSDR GSM Base Station Demo - https://www.crowdsupply.com
[23:33:45] <Bender> [HackerNews] - Why the US never fully adopted the metric system - http://www.theatlantic.com
[23:33:49] <Bender> [HackerNews] - FUSE for Windows/Cygwin now available - http://www.secfs.net
[23:33:53] <Bender> [HackerNews] - Why Kotlin is my next programming language (2015) - https://medium.com
[23:38:49] <Bender> [HackerNews] - The RC2014 Retro Computer - http://sustburbia.blogspot.com
[23:48:57] <Bender> [HackerNews] - Kickstarter Just Did Something Tech Startups Never Do: It Paid a Dividend - http://www.bloomberg.com
[23:54:01] <Bender> [HackerNews] - Why the ‘lone-wolf’ terrorist is a myth - https://nypost.com
[23:54:05] <Bender> [HackerNews] - Algerian government blocks Facebook, Instagram, Twitter during exams - http://dia-algerie.com