Building software for yourself with Linus Lee (Changelog Interviews #455)https://changelog.com/podcast/455
things, how you do authentication, things like that. You can kind of duct-tape things together nicely… But duct-tape things together, as opposed to having a perfect solution, and
Today we're talking to Linus Lee about the practice of building software for yourself. Linus has several side projects we could talk about, but today's show is focused on L
Networking in the Mind Age - future of distributed intelligencehttp://www.ethologic.com/sasha/mindage.html
schemes, message authentication algorithms, computational economies, computerized banking and other network constructs will evolve into essential parts of future global intelligen
Essay on long-term future of intelligent distributed systems. Discussed topics include post-identity intelligent architectures, transhumanist philosophy
alt.2600 FAQ, Beta .013 - Part 1/1http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt
messages with privacy, authentication, and convenience. Privacy means that only those intended to receive a message can read it. Authentication means that messages that appear to
Dan Connolly's Index of Eventshttps://www.w3.org/People/Connolly/events/
and Usability of Web Authentication . My thoughts on the event, in progress: A look at emerging Web security architectures from a Semantic Web perspective ( GRDDL and OpenId ) Mar
Markua Spechttps://markua.com/
resources which require authentication. youtube : If present, the part of a YouTube URL, such as ozO0kOnqmyA , which uniquely identifies a YouTube video. The video may be public o
Linuxhttps://www.billdietrich.me/Linux.html
standard facilities : Authentication (PAM, certificates, more), access control, IPC ( D-Bus , sockets, Varlink , more). Some other variations or modifications, some of them user c
Linux operating system basics, parts, myths, and truths
https://www.ietf.org/rfc/rfc2277.txthttps://www.ietf.org/rfc/rfc2277.txt
together with authentication and other preferences negotiation. 4.5. Default Language When human-readable text must be presented in a context where the sender has no knowledge of
Amicus Briefhttps://archive.epic.org/crypto/export_controls/bernstein_brief.html
on cryptography forauthentication and privacy, and IMC's members desire a wideunfettered market for secure Internet mail products. The Internet Society ("ISOC") is a non-governmen
Introducing the REBOL Internet Operating System: IOShttp://www.rebol.com/ios/ios-intro.html
certificates, and authentication. Integrates quickly with legacy systems and existing databases. Administrative functions can be script operated. WIP Wiki 3.3.0 ▣ ▤ &n
Blog - Suffixhttps://www.suffix.be/blog/
Second Factor Authentication for SSH Using ecdsa-sk or ed25519-sk combined with a hardware security key for multifactor SSH authentication. Building a Website with my Kids Introdu
Personal blog for posting my ramblings, mostly about programming.
DVD FAQhttps://demystified.info/dvdfaq.html
a data encryption and authentication scheme intended to prevent copying video files directly from DVD-Video discs. CSS was developed primarily by Matsushita and Toshiba. Each CSS
The official DVD FAQ (Frequently Asked Questions about DVD). The most comprehensive source of DVD technical information in the galaxy. By Jim Taylor.
Liveness.com - Biometric Liveness Detection Explainedhttps://www.liveness.com/
verification or face authentication. FaceTec's AI now performs over 3,700,000,000 3D Liveness Checks annually! FaceTec Certified 3D Liveness Vendors With security powered &
Liveness Detection is an AI computer system’s ability to determine that it is interfacing with a physically present human being and not an inanimate spoof
Find more...