Search for "Andy" returned 7488 results

The Realm of Too Many Options
47 min

The Realm of Too Many Options

Write, record, mix and actually finish your music

From Physical to Cloud to Container
24 min

From Physical to Cloud to Container

One system to deploy and manage them all

HTCPCP - Networking your Coffeepot
20 min

HTCPCP - Networking your Coffeepot

IoT done right for fun and no profit

8 Years of Config Management
59 min

8 Years of Config Management

a journey through one company's challenges and learnings

Weaponized Social
35 min

Weaponized Social

Understanding and tools to mitigate network-scale violences

Towards automatic end to end mail encryption
98 min

Towards automatic end to end mail encryption

mail encryption overview and hands-on Autocrypt sessions

Pirate Radio
43 min

Pirate Radio

Running a Station and Staying on the Air

Closing Event
30 min

Closing Event

So long and thanks for all the fish

What you thought you knew about C
47 min

What you thought you knew about C

Impacts of undefined behaviour and other C oddities

All Tomorrow's Condensation
48 min

All Tomorrow's Condensation

A steampunk puppet extravaganza by monochrom and friends

JSON RPC
62 min

JSON RPC

Cross Site Scripting and Client Side Web Services

for women in "${tech[@]}"; do
26 min

for women in "${tech[@]}"; do

Let's talk, share and learn from each other.

Closing Event
21 min

Closing Event

Good Bye and have a safe trip home!

Advanced memory forensics: The Cold Boot Attacks
58 min

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

Resisting Surveillance: it's is not just about the metadata
60 min

Resisting Surveillance: it's is not just about the metadata

The infiltration and physical surveillance of social…

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

God does not play dice!
56 min

God does not play dice!

an introduction to quantum cryptography for sysadmins and…

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

Privacy by design
74 min

Privacy by design

how to code GDPR and e-privacy regulation safe

30 seconds to Code
25 min

30 seconds to Code

Streamlining development setups with Docker and Open Build…

Podjournalism
66 min

Podjournalism

The Role of Podcasting in Critical and Investigative…

Sovereign Keys
64 min

Sovereign Keys

A proposal for fixing attacks on CAs and DNSSEC

The Youth Hostel
52 min

The Youth Hostel

An odyssey in the margins of software and paper

Digital Musical Instruments
34 min

Digital Musical Instruments

Evolution and design of new interfaces for musical…