wiby  
Settings



2blowhards.com: Q&A With Gregory Cochran, Part One

http://www.2blowhards.com/archives/2007/09/qa_with_gregory.html

the political infrastructure. Without the foundation democratization isn't going to work. Witness what happened with Russia. Think we made a mistake by not providing support to Af
2blowhards.com - a weblog

NLnet; 55 New Projects Awarded NGI0 Grants

https://nlnet.nl/news/2023/20231123-announcing-projects.html

follow Layer 2 Network infrastructure Improvements for the next generation firewalling tool in Linux —Netfilter kernel improvements, user space tools and testing More details to f

Telegram FAQ

https://telegram.org/faq

multi-data center infrastructure and encryption, it is faster and way more secure . On top of that, private messaging on Telegram is free and will stay free — no ads, no subscript
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…

Svedic.org

https://svedic.org/

me for a dozen EV infrastructure problems in my part of the EU. Anecdotes below explain lessons I learned the hard way. When I see a cool new gadget, my rationality goes away. I t

Kernel Planet

https://planet.kernel.org/

there was also a lot of infrastructure code for safe orchestration of tuning changes, which is not an easy problem. Flame graphs were the key interface: the first time I saw them

CELF Embedded Linux Conference

https://www.embeddedlinuxconference.com/elc_2009/sessions.html

LLVM is a compiler infrastructure aimed at providing aggressive optimizations in the entire life of a program - compile time, link-time (particularly interprocedural), run-time an

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

building your callback infrastructure and test it. As you gain more experience and can move into roles, get your degree in something so you can bypass HR filters and do what you r
How to become a bug-bounty hunter and do penetration testing

Cryptography and Liberty 2000

https://archive.epic.org/reports/crypto2000.html/

global communications infrastructure. In response to these challenges, the security mechanisms of traditional paper-based communications media - envelopes and locked filing cabine

U.S. Army Armor and Aviation branches without battlefield functions

http://www.combatreform.org/heavytankshelicopters.htm

easy-to-hit civilian infrastructure targets (power plants, dams, bridges) from above 15,000 feet and most air defense weapons, without need of a politically risky ground invasion,

Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

US National Information Infrastructure Act Businesses and media begin taking notice of the Internet .sk (Slovakia) and .cz (Czech Republic) created after split of Czechoslovakia;
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

Winlink 2000 Radio-Email System Overview

http://www.arrl-mdc.net/Winlink/MDCWL2KOVwAM.htm

there is communications infrastructure loss, the system provides the means to recover email service in such areas for all users. Email messaging is the common denominator used by

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/archive/activity.html

to get enough of the infrastructure bootstrapped & working to run a first simple calc unit test - adding two ones via a spreadsheet, in the build tree. Continued hacking away


Find more...