Search for "Isa" returned 9381 results

36 min
Live: Firebird: the high performance database that you didnt know was already on your…
Installed with Libre Office, Firebird is a vastly capable…

47 min
Test-Driven Web Development
Treating your web application like the grown-up it is

55 min
Inside Field Station Berlin Teufelsberg
The story of the NSA listening post – told by an ex-SIGINT…

43 min
Tractors, Rockets and the Internet in Belarus
How belarusian authoritarian regime is using technologies…

54 min
Fileserver online
Fileserver ausschließlich online? Oder in Kombination mit…

58 min
Let's roll out mass encryption!
'Cause mass surveillance is there for too long already

57 min
Cryptowars 2.0: Lessons from the past, for the present
It's not only Hollywood who is out of ideas

33 min
Social cooling
How the reputation economy is turning us into conformists

44 min
The Realtime thing
What the heck is realtime - and what to do with it

25 min
Uyuni: introduction, last year's updates and future
What is Uyuni? - What's been going on the last year? -…

38 min
Rowhammer exploit
Viability of the Rowhammer Attack when ECC memory is used

57 min
Rapid Prototype Your Life
The time is now to make anything you can imagine

59 min
Embracing Post-Privacy
Optimism towards a future where there is "Nothing to hide"

48 min
GPS-Trackers
How they track you when your mobile is switched off

53 min
The year of Linux On Desktop^WMobile
How the quest for mainline Linux on mobile phones is faring

30 min
In Search of Evidence-Based IT-Security
IT security is largely a science-free field. This needs to…

58 min
Linguistic Hacking
How to know what a text in an unknown language is about?

59 min
Vulnerability markets
What is the economic value of a zero-day exploit?

41 min
DMX Workshop
Was ist DMX, wozu braucht man das, was macht es, ist es…

39 min
Testing software on multiple Linux distributions
How Cockpit is tested on multiple distributions and…

37 min
Self-documenting computation
What is the best way to present programs to non-programmers?

26 min
Technomonopolies
How technology is used to subvert and circumvent…

40 min