Search for "Isa" returned 9095 results

41 min
Demoscene now and then
The demoscene is an underground computer art culture.

51 min
Remote Exploits für die Briefwahl in Deutschland
Seit der Abschaffung der Sicherungsmechanismen ist die…

61 min
Correcting copywrongs
European copyright reform is finally on the horizon

62 min
Cybernetic Cannibalism
Why is Brazil the country of the future?

64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy

64 min
Arguments Against Surveillance
'Cos "I Don't Like It" Is Not Enough!

52 min
Turris: secure open source router
Who is the root on your router?

31 min
openPower - the current state of commercial openness in CPU development
is there no such thing as open hardware?

43 min
Contain yourselves
The Way We Build Systems is (Still) Wrong

42 min
Union Busting
What is it and why you should care

34 min
Social Cooling - big data’s unintended side effect
How the reputation economy is creating data-driven…

57 min
Secure Code
Why developing Secure Software is like playing Marble…

60 min
Data Retention in the EU five years after the Directive
Why the time is now to get active

36 min
PolyCoin - A game played across MCH
How it works and what is inside it

31 min
Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
Why is my vacuum as powerful as my smartphone?

42 min
Hacking the Nintendo Game & Watch
Your princess is AES encrypted in another castle

40 min
A modern manifest of cyberspace
The internet is dead, long live the internet

32 min
Craft, leisure, and end-user innovation
How hacking is conceived in social science research

53 min
CCC Office, die neue Software
Was ist der Stand, was kann die neue Software und was wird…

17 min
Continuous Integration using Travis and Docker
There is no excuse for NOT using continuous integration

44 min
Why technology sucks
If technology is the solution, politicians are the problem

86 min
Certified programming with dependent types
Because the future of defense is liberal application of math

39 min