2blowhards.com: Q&A With Gregory Cochran, Part Onehttp://www.2blowhards.com/archives/2007/09/qa_with_gregory.html
the political infrastructure. Without the foundation democratization isn't going to work. Witness what happened with Russia. Think we made a mistake by not providing support to Af
2blowhards.com - a weblog
NLnet; 55 New Projects Awarded NGI0 Grantshttps://nlnet.nl/news/2023/20231123-announcing-projects.html
follow Layer 2 Network infrastructure Improvements for the next generation firewalling tool in Linux —Netfilter kernel improvements, user space tools and testing More details to f
Telegram FAQhttps://telegram.org/faq
multi-data center infrastructure and encryption, it is faster and way more secure . On top of that, private messaging on Telegram is free and will stay free — no ads, no subscript
This FAQ provides answers to basic questions about Telegram.Check out our Advanced FAQ for more technical information.…
Svedic.orghttps://svedic.org/
me for a dozen EV infrastructure problems in my part of the EU. Anecdotes below explain lessons I learned the hard way. When I see a cool new gadget, my rationality goes away. I t
Archivehttps://jxself.org/archive.shtml
of modern computing infrastructure. Shifting the Trap Fri, 24 Apr 2026 Back in 2009, Richard Stallman warned us about The JavaScript Trap . The pitch was simple, and it's aged hor
CELF Embedded Linux Conferencehttps://www.embeddedlinuxconference.com/elc_2009/sessions.html
LLVM is a compiler infrastructure aimed at providing aggressive optimizations in the entire life of a program - compile time, link-time (particularly interprocedural), run-time an
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
building your callback infrastructure and test it. As you gain more experience and can move into roles, get your degree in something so you can bypass HR filters and do what you r
How to become a bug-bounty hunter and do penetration testing
Cryptography and Liberty 2000https://archive.epic.org/reports/crypto2000.html/
global communications infrastructure. In response to these challenges, the security mechanisms of traditional paper-based communications media - envelopes and locked filing cabine
U.S. Army Armor and Aviation branches without battlefield functionshttp://www.combatreform.org/heavytankshelicopters.htm
easy-to-hit civilian infrastructure targets (power plants, dams, bridges) from above 15,000 feet and most air defense weapons, without need of a politically risky ground invasion,
Hobbes' Internet Timeline - the definitive ARPAnet & Internet historyhttps://www.zakon.org/robert/internet/timeline/
US National Information Infrastructure Act Businesses and media begin taking notice of the Internet .sk (Slovakia) and .cz (Czech Republic) created after split of Czechoslovakia;
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'
Winlink 2000 Radio-Email System Overviewhttp://www.arrl-mdc.net/Winlink/MDCWL2KOVwAM.htm
there is communications infrastructure loss, the system provides the means to recover email service in such areas for all users. Email messaging is the common denominator used by
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/archive/activity.html
to get enough of the infrastructure bootstrapped & working to run a first simple calc unit test - adding two ones via a spreadsheet, in the build tree. Continued hacking away
Find more...