2blowhards.com: Q&A With Gregory Cochran, Part Onehttp://www.2blowhards.com/archives/2007/09/qa_with_gregory.html
the political infrastructure. Without the foundation democratization isn't going to work. Witness what happened with Russia. Think we made a mistake by not providing support to Af
2blowhards.com - a weblog
NLnet; 55 New Projects Awarded NGI0 Grantshttps://nlnet.nl/news/2023/20231123-announcing-projects.html
follow Layer 2 Network infrastructure Improvements for the next generation firewalling tool in Linux —Netfilter kernel improvements, user space tools and testing More details to f
Telegram FAQhttps://telegram.org/faq
multi-data center infrastructure and encryption, it is faster and way more secure . On top of that, private messaging on Telegram is free and will stay free — no ads, no subscript
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…
Svedic.orghttps://svedic.org/
me for a dozen EV infrastructure problems in my part of the EU. Anecdotes below explain lessons I learned the hard way. When I see a cool new gadget, my rationality goes away. I t
Kernel Planethttps://planet.kernel.org/
there was also a lot of infrastructure code for safe orchestration of tuning changes, which is not an easy problem. Flame graphs were the key interface: the first time I saw them
CELF Embedded Linux Conferencehttps://www.embeddedlinuxconference.com/elc_2009/sessions.html
LLVM is a compiler infrastructure aimed at providing aggressive optimizations in the entire life of a program - compile time, link-time (particularly interprocedural), run-time an
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
building your callback infrastructure and test it. As you gain more experience and can move into roles, get your degree in something so you can bypass HR filters and do what you r
How to become a bug-bounty hunter and do penetration testing
Cryptography and Liberty 2000https://archive.epic.org/reports/crypto2000.html/
global communications infrastructure. In response to these challenges, the security mechanisms of traditional paper-based communications media - envelopes and locked filing cabine
U.S. Army Armor and Aviation branches without battlefield functionshttp://www.combatreform.org/heavytankshelicopters.htm
easy-to-hit civilian infrastructure targets (power plants, dams, bridges) from above 15,000 feet and most air defense weapons, without need of a politically risky ground invasion,
Hobbes' Internet Timeline - the definitive ARPAnet & Internet historyhttps://www.zakon.org/robert/internet/timeline/
US National Information Infrastructure Act Businesses and media begin taking notice of the Internet .sk (Slovakia) and .cz (Czech Republic) created after split of Czechoslovakia;
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'
Winlink 2000 Radio-Email System Overviewhttp://www.arrl-mdc.net/Winlink/MDCWL2KOVwAM.htm
there is communications infrastructure loss, the system provides the means to recover email service in such areas for all users. Email messaging is the common denominator used by
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/archive/activity.html
to get enough of the infrastructure bootstrapped & working to run a first simple calc unit test - adding two ones via a spreadsheet, in the build tree. Continued hacking away
Find more...