Search for "Sven" returned 1989 results

57 min
"Fluxus cannot save the world."
What hacking has to do with avantgarde art of the 1960ies…

31 min
Trackography
You never read alone

53 min
Deep Learning Blindspots
Tools for Fooling the "Black Box"

60 min
Concepts for global TSCM
getting out of surveillance state mode

50 min
How does the Internet work?
An explanation of Inter-Net and everyday protocols

58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting

53 min
From Maxwell to antenna arrays
How 150 year old equations still help to communicate

36 min
Modchips of the State
Hardware implants in the supply-chain

62 min
Space Hacker
Uploading rover...

30 min
The Machine To Be Another
Exploring identity and empathy through neuroscience,…

60 min
Building a high throughput low-latency PCIe based SDR
Lessons learnt implementing PCIe on FPGA for XTRX Software…

39 min
Hacking the Czech Parliament via SMS
A parliamentary drama of 223 actors

46 min
Practical Mix Network Design
Strong metadata protection for asynchronous messaging

32 min
History and implications of DRM
From tractors to Web standards

31 min