Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
Shamar
.
2
The problem with ‘5 whys’
data-analysis
general
qualitysafety.bmj.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
A JavaScript-Free Frontend
programming
web
dev.to
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
Academic Torrents
☶
decentralized-internet
learning
academictorrents.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Deprecation Notice: MIT and BSD
FOSS
writing.kemitchell.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
1
CSV to vCard via Bash & Awk
bash
programming
web-tech.ga-usa.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
What’s new for WSL in Windows 10 version 1903?
☶
software-development
blogs.msdn.microsoft.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Cyber-Mercenary Groups Shouldn't be Trusted in Your Browser or Anywhere Else
security
surveillance-capitalism
eff.org
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
What medium should be used for long term, high volume, data storage (archival)?
security
self-hosting
superuser.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
SimCities and SimCrises
equality
gaming
History
learning
programming
molleindustria.org
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Model Metropolis
gaming
programming
software-development
logicmag.io
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Microkernels and Component-based OS
FOSS
programming
software-development
fosdem.org
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Hack This Site
fun
hackerspace
security
hackthissite.org
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Capitalism’s New Clothes
surveillance-capitalism
thebaffler.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Algorithmic Entities
artificial-intelligence
papers.ssrn.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Flowchart Programming Language
programming
flowgorithm.org
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
1
BASIC Engine
programming
software-development
basicengine.org
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
1969 & 70 - Bell Labs
History
larryluckham.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
A Mutt Journey: Download mails with offlineimap
FOSS
baptiste-wicht.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Our Software Dependency Problem
FOSS
programming
security
software-development
research.swtch.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Taming the Chaos: Can we build systems that actually work?
programming
security
software-development
media.ccc.de
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
cfiles: A ncurses file manager written in C with vim like keybindings
FOSS
programming
projects
github.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Es: A shell with higher-order functions
FOSS
programming
shell
software-development
wryun.github.io
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Tools for Computer Scientist
FOSS
web.mst.edu
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Language-theoretic Security
programming
security
software-development
langsec.org
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
28c3: The Science of Insecurity
programming
security
software-development
youtube.com
via
Shamar
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>