Search for "Ron" returned 9743 results

Message generation at the info layer
27 min

Message generation at the info layer

Basic introduction in coding on unvirtual realities.

Data Retention Update
68 min

Data Retention Update

News and Perspectives on Implementation and Opposition

A "Box" Full of Tools and Distros
35 min

A "Box" Full of Tools and Distros

Toolbox and Distrobox on openSUSE MicroOS & Tumbleweed

Open Source Schlüssel und Schlösser
51 min

Open Source Schlüssel und Schlösser

Offene Quellen zum Bösen und Guten: von downloadbaren…

KI – Macht – Ungleichheit.
39 min

KI – Macht – Ungleichheit.

Was ist die soziale Dimension von Nachhaltigkeit und warum…

Cybercrime Convention
57 min

Cybercrime Convention

Hacking on its way to become a criminal act?

Ecocide and (green) colonialism in Sápmi
42 min

Ecocide and (green) colonialism in Sápmi

Data centers on indigenous land in Northern Europe

Turris: secure open source router
52 min

Turris: secure open source router

Who is the root on your router?

Is the SSLiverse a safe place?
58 min

Is the SSLiverse a safe place?

An update on EFF's SSL Observatory project

Hopalong Casualty
45 min

Hopalong Casualty

On automated video analysis of human behaviour

Lightning Talks II
31 min

Lightning Talks II

DeepVGI - Einsatz von Lowcost-Lidarsystemen für die…

Europäische Biometriestrategien
64 min

Europäische Biometriestrategien

Die Automatisierung von Personenidentifizierung an der…

Huey: Pivoting hundreds of millions of rows in the Browser
56 min

Huey: Pivoting hundreds of millions of rows in the Browser

Blazing fast in-browser Analytics based on DuckDB/WASM

Was wollen die Regierungen im Internet?
42 min

Was wollen die Regierungen im Internet?

Neue Entwicklungen in der internationalen…

Free Software and Platform Regulation
42 min

Free Software and Platform Regulation

The impact of the Digital Market Act on Free Software

Lightning Talks I
34 min

Lightning Talks I

Routenplanung durch Flächen - Interaktive Visualisierung…

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

Ceph Explained - With Raspberry Pis
50 min

Ceph Explained - With Raspberry Pis

Demonstration of Ceph on a Raspberry Pi cluster

Practical Mac OS X Insecurity
52 min

Practical Mac OS X Insecurity

Security Concepts, Problems, and Exploits on Your Mac

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
58 min

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade

Reporting on the secret trial of Chelsea Manning