Search for "Jon" returned 9532 results

Overtaking Proprietary Software Without Writing Code
65 min

Overtaking Proprietary Software Without Writing Code

"a few rough insights on sharpening free software"

Breaking Baryons
60 min

Breaking Baryons

On the Awesomeness of Particle Accelerators and Colliders

kubernetes for toasters?
30 min

kubernetes for toasters?

potential solutions to achieving containerization on…

Why Net Neutrality Matters?
57 min

Why Net Neutrality Matters?

Status update on current legislation, campaigns and actions

Moonbounce Radio Communication
48 min

Moonbounce Radio Communication

To the Moon and back in two seconds. The joy of light speed…

Building a high throughput low-latency PCIe based SDR
60 min

Building a high throughput low-latency PCIe based SDR

Lessons learnt implementing PCIe on FPGA for XTRX Software…

GET LAMP
115 min

GET LAMP

European premiere of the documentary film on Interactive…

Analog Computing
39 min

Analog Computing

High performance/low power computing based on the analog…

Freedom of expression in new Arab landscape
52 min

Freedom of expression in new Arab landscape

Spreading of new Arab satellite TV stations: consequences…

Reverse Engineering a pocket synthesizer
41 min

Reverse Engineering a pocket synthesizer

from nothing to custom firmware on the OP-1

Let's stop EU copyright expansion
74 min

Let's stop EU copyright expansion

If you like untaxed links and unsurveilled uploads, you…

DNGerousLINK
52 min

DNGerousLINK

A Deep Dive into WhatsApp 0-Click Exploits on iOS and…

Talking Behind Your Back
59 min

Talking Behind Your Back

On the Privacy & Security of the Ultrasound Tracking…

Creating printable maps
50 min

Creating printable maps

From OpenStreetMap data to large scale maps on paper

Sovereign Keys
64 min

Sovereign Keys

A proposal for fixing attacks on CAs and DNSSEC

All your secrets belong to me
47 min

All your secrets belong to me

Why you shouldn't store secrets on a mobile device

Strong encryption of credit card information
51 min

Strong encryption of credit card information

Attacks on common failures when encrypting credit card…