Search for "15" returned 4793 results

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…

Computer Science in the DPRK
33 min

Computer Science in the DPRK

A view into technology on the other side of the world

Top X* usability obstacles
59 min

Top X* usability obstacles

*(will be specified later based on usability test with…

“Nabovarme” opensource heating infrastructure in Christiania
30 min

“Nabovarme” opensource heating infrastructure in Christiania

Freetown Christiania´s digitally controlled/surveyed…

How does the Internet work?
50 min

How does the Internet work?

An explanation of Inter-Net and everyday protocols

The Global Assassination Grid
63 min

The Global Assassination Grid

The Infrastructure and People behind Drone Killings

Hacking Reality
60 min

Hacking Reality

Mixed Reality and multi-sensory communication

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

Repair-Cafés
43 min

Repair-Cafés

… und warum ihr dabei mitmachen solltet

The Universe Is, Like, Seriously Huge
32 min

The Universe Is, Like, Seriously Huge

Stuff in Space Is Far Away – but How Do We Know?

Lifting the Fog on Red Star OS
60 min

Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's…

Simulating the future of the global agro-food system
35 min

Simulating the future of the global agro-food system

Cybernetic models analyze scenarios of interactions between…

„Wir beteiligen uns aktiv an den Diskussionen“
62 min

„Wir beteiligen uns aktiv an den Diskussionen“

Die digitale „Agenda“ der Bundesregierung aus inhaltlicher,…

Was schützt eigentlich der Datenschutz?
62 min

Was schützt eigentlich der Datenschutz?

Warum DatenschützerInnen aufhören müssen von individueller…

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

Mind-Hacking mit Psychedelika
65 min

Mind-Hacking mit Psychedelika

Eine Einführung in die Wirkungsweise psychedelischer…