| 1. | | Lenticular Photo Used To Secretly Convey Hot Line Number To Abused Kids (diyphotography.net) |
| 424 points by scholia on May 5, 2013 | 140 comments |
|
| 2. | | Why I Develop For The Mac (evanmiller.org) |
| 263 points by plinkplonk on May 5, 2013 | 180 comments |
|
| 3. | | Pdf2htmlEX – Convert PDF to HTML without losing text or format (github.com/coolwanglu) |
| 161 points by coolwanglu on May 5, 2013 | 48 comments |
|
| 4. | | Jekyll 1.0 Released (parkermoore.de) |
| 160 points by parkr on May 5, 2013 | 74 comments |
|
| 5. | | Enable tab-completion in the interactive interpreter by default (python.org) |
| 155 points by tshepang on May 5, 2013 | 53 comments |
|
| 6. | | Setting up Sublime Text 2 (drewbarontini.com) |
| 153 points by superchink on May 5, 2013 | 51 comments |
|
| 7. | | Design (paulgraham.com) |
| 140 points by peterkchen on May 5, 2013 | 113 comments |
|
| 8. | | The Feynman File (2005) (discovermagazine.com) |
| 131 points by kitcar on May 5, 2013 | 9 comments |
|
| 9. | | The N=1 Guide to Grad School: Advice for Aspiring PhDs (marcua.net) |
| 124 points by eob on May 5, 2013 | 39 comments |
|
| 10. | | Gwern answers 'Ask gwern: Who are you?' (pastee.org) |
| 121 points by clicks on May 5, 2013 | 49 comments |
|
| 11. | | Microsoft is killing Linux shops with Secure Boot |
| 113 points by gabordemooij on May 5, 2013 | 95 comments |
|
| 12. | | Some harmless, old-fashioned fun with CSS (lcamtuf.blogspot.com) |
| 105 points by spindritf on May 5, 2013 | 32 comments |
|
| 13. | | Bitcoin will soon block small transaction outputs (github.com/bitcoin) |
| 97 points by fdm on May 5, 2013 | 84 comments |
|
| 14. | | Genetic algorithms, Mona Lisa and JavaScript + Canvas (nihilogic.dk) |
| 93 points by achudars on May 5, 2013 | 21 comments |
|
| 15. | | GitHub Repository Collaboration Network (coyotebush.github.io) |
| 84 points by coyotebush on May 5, 2013 | 16 comments |
|
| 16. | | I don’t understand American healthcare – doesn’t mean I shouldn’t provide it (pandodaily.com) |
| 77 points by pavel_lishin on May 5, 2013 | 137 comments |
|
| 17. | | My Dad The Engineer (iampaulbrown.com) |
| 76 points by paulbrowneng on May 5, 2013 | 22 comments |
|
| 18. | | The most incredible time-lapse video I’ve ever seen (danoah.com) |
| 76 points by deusclovis on May 5, 2013 | 38 comments |
|
| 19. | | Manage.py, a human friendly CLI builder for python apps (github.com/birdback) |
| 77 points by jeanphix on May 5, 2013 | 21 comments |
|
| |
|
|
| 21. | | Working Alone, Together (nytimes.com) |
| 69 points by digisth on May 5, 2013 | 19 comments |
|
| 22. | | Rules of a Zen Programmer (grobmeier.de) |
| 67 points by atrniv on May 5, 2013 | 20 comments |
|
| 23. | | Bitcoin vs. Ben Bernanke (wsj.com) |
| 65 points by dpanah on May 5, 2013 | 88 comments |
|
| 24. | | These people applied to go to Mars (mars-one.com) |
| 68 points by shrikant on May 5, 2013 | 55 comments |
|
| 25. | | Indian Coders Found Cheating in Google Code Jam? (nextbigwhat.com) |
| 62 points by jayadevan on May 5, 2013 | 95 comments |
|
| 26. | | National Institutes of Mental Health Director Rejects DSM V (scientificamerican.com) |
| 61 points by sehugg on May 5, 2013 | 25 comments |
|
| |
|
|
| 28. | | JS1K 2013 winning entry explained (ehouais.net) |
| 58 points by bpierre on May 5, 2013 | 2 comments |
|
| |
|
|
| 30. | | The Story Behind the QWERTY Keyboard (smithsonianmag.com) |
| 57 points by epo on May 5, 2013 | 62 comments |
|
|
| More |
"Many developers assume that everyone wants their data to be “in the cloud”, but that's actually not true for a lot of my customers. Professional researchers often sign agreements in their children's blood stating that their data will be stored on an encrypted disk, won't leave their laptop, and will be destroyed when the research project is completed. “The cloud” is the last place they want their data to go."
There are so many great note taking and productivity application that I just can't use because the majority of my notes are of a confidential nature. If my company provided macbook where to be compromised I would not be held liable, however if my personal dropbox or evernote account where compromised I would be held accountable.