Search for "Ana" returned 10002 results

osc2 - The modern osc
20 min

osc2 - The modern osc

Development status and how to contribute

Black Ops 2006 Viz Edition
55 min

Black Ops 2006 Viz Edition

Pixel Fuzzing and the Bioinformatic Bindiff

Hacker Jeopardy
107 min

Hacker Jeopardy

The one and only hacker quizshow

Greenhouse Gas Emission Data
39 min

Greenhouse Gas Emission Data

Public, difficult to access, and not always correct

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

Buffered Daemons
31 min

Buffered Daemons

Sound art performance exploring the concept of translation…

Beyond Olm
37 min

Beyond Olm

About challenges and opportunities in Messaging Layer…

Are machines feminine?
60 min

Are machines feminine?

exploring the relations between design and perception of…

DevOps for GNOME with Flatpak
21 min

DevOps for GNOME with Flatpak

And how we improved our contributors experience and…

Domain computers have accounts, too!
40 min

Domain computers have accounts, too!

Owning machines through relaying and delegation

Æ-DIR -- Authorized Entitites Directory
44 min

Æ-DIR -- Authorized Entitites Directory

Identity and Access Management with OpenLDAP

Fermentation Mobile
64 min

Fermentation Mobile

experimental, educational and commercial fermentation…

Maker Spaces in Favelas - Lecture
46 min

Maker Spaces in Favelas - Lecture

Engaging social innovation and social innovators

From zero to Openstack
51 min

From zero to Openstack

Deploying Openstack for fun and profit

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

Avionics
57 min

Avionics

Design and implementation of flight electronics

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

We do Privacy by Design
42 min

We do Privacy by Design

Best practices and real-life examples

Hacking Reality
60 min

Hacking Reality

Mixed Reality and multi-sensory communication

Faster PwninG Assured
60 min

Faster PwninG Assured

Hardware Hacks and Cracks with FPGAs

Privacy Invasion or Innovative Science?
40 min

Privacy Invasion or Innovative Science?

Academia, social media data, and privacy

Transition Telecom
74 min

Transition Telecom

Telecommunications and networking during energy descent