Search for "Jim" returned 5093 results

Community
62 min

Community

Social Life & Life in the early 21st century

My Robot Will Crush You With Its Soft Delicate Hands!
60 min

My Robot Will Crush You With Its Soft Delicate Hands!

How to design and fabricate soft robots using everyday…

Bits for SDG
29 min

Bits for SDG

Eine Digitale Agenda 2030 für die SDG!

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Visceral Systems
32 min

Visceral Systems

Approaches to working with sound and network data…

All Our Shared Spectrum Are Belong to Us
30 min

All Our Shared Spectrum Are Belong to Us

Visualizing WLAN Channel Usage on OpenWRT

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

Privacy and Consumer Markets
30 min

Privacy and Consumer Markets

Reversing the Surveillance Business Model

The good, the strange and the ugly in 2018 art &tech
55 min

The good, the strange and the ugly in 2018 art &tech

On art, AI, hormones hacking and other prospects of a…

Modern key distribution with ClaimChain
32 min

Modern key distribution with ClaimChain

A decentralized Public Key Infrastructure that supports…

Verified Firewall Ruleset Verification
32 min

Verified Firewall Ruleset Verification

Math, Functional Programming, Theorem Proving, and an…

Open Source in the WSN Research
51 min

Open Source in the WSN Research

Experiences made with free and open source software in…

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches