security-snake-oilhttp://linuxmafia.com/faq/Essays/security-snake-oil.html
devoid of security infrastructure (e.g., no privilege levels), I had a theory: "Hey, suppose I tried the strategy of keeping my system upgraded, not running sucky software, dealin
Hygiene for a computing pandemic: separation of VCs and ocaps/zcaps from Christopher Lemmer Webber on 2020-12-05 (public-credentials@w3.org frhttps://lists.w3.org/Archives/Public/public-credentials/2020Dec/0028.html
only >>> one infrastructure. The VC spec with VC schema is sufficiently expressive >>> syntactically to encompass all these semantics we just have to standardize
Tech - Anil Dashhttps://www.anildash.com/tags/tech/
best of The lost infrastructure of social media. 08 Aug 2016 blogs search social media tech twitter New York-Style Tech 15 Jul 2016 nyc tech On the Hunt 24 Feb 2016 tech twitter s
A blog about making culture. Since 1999.
Cryptography, crime, terror, and surveillancehttps://mohit.uk/git-bin/epq/paper.html
in the hardware and infrastructure that users of the Internet rely on. In the West, a small number of companies (such as Intel, Nvidia, Arm and Apple) design and produce the major
Friden EC-130 Electronic Calculatorhttps://www.oldcalculatormuseum.com/friden130.html
US government's secret infrastructure. Those who would know details about this work, even to this day, are not forthcoming with information relating to the government projects, so
https://www.ietf.org/rfc/rfc3490.txthttps://www.ietf.org/rfc/rfc3490.txt
changes to the existing infrastructure. IDNA is only meant for processing domain names, not free text. Table of Contents 1. Introduction...........................................
SoylentNews: SoylentNews is peoplehttps://soylentnews.org/
targeted critical infrastructure last year : Three new threat groups began targeting critical infrastructure last year, while a well-known Beijing-backed crew - Volt Typhoon - con
https://www-users.cse.umn.edu/~odlyzko/doc/decline.txthttps://www-users.cse.umn.edu/~odlyzko/doc/decline.txt
where an entire new infrastructure is required, it is often still 15-30 years. Optical amplifiers took around 20 years from concept to deployment. Combinatorial chemistry, which o
Internet Census 2012https://census2012.sourceforge.net/paper.html
3.3 C&C less Infrastructure A classic botnet usually requires one or more command and control (C&C) servers the clients can connect to. A C&C server comes with several
JB's Placehttp://jbschirtzinger.beiteshelpublications.org/
and blows up all of our infrastructure from our good intentions, though, we will have the consolation of saying to ourselves “Yeah, but look how tolerant and diverse we were!” At
Find more...