Search for "atd" returned 7638 results

Privacy by design
74 min

Privacy by design

how to code GDPR and e-privacy regulation safe

30 seconds to Code
25 min

30 seconds to Code

Streamlining development setups with Docker and Open Build…

The Youth Hostel
52 min

The Youth Hostel

An odyssey in the margins of software and paper

Podjournalism
66 min

Podjournalism

The Role of Podcasting in Critical and Investigative…

Sovereign Keys
64 min

Sovereign Keys

A proposal for fixing attacks on CAs and DNSSEC

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Digital Musical Instruments
34 min

Digital Musical Instruments

Evolution and design of new interfaces for musical…

Long Distance Quantum Communication
36 min

Long Distance Quantum Communication

Concepts and components for intercontinal communication…

From Computation to Consciousness
60 min

From Computation to Consciousness

How computation helps to explain mind, universe and…

An ultrashort history of ultrafast imaging
60 min

An ultrashort history of ultrafast imaging

Featuring the shortest movies and the largest lasers

spispy: SPI flash device emulation
32 min

spispy: SPI flash device emulation

Open source tools for flash emulation and research

Transhuman Expression
62 min

Transhuman Expression

Interdisciplinary research in Painting and Robotics. with…

Wind: Off-Grid Services for Everyday People
60 min

Wind: Off-Grid Services for Everyday People

Integrating nearby and offline connectivity with the…

Digital Airwaves
46 min

Digital Airwaves

Software Defined Radio Basics and some Modulation Theory

The Realm of Too Many Options
47 min

The Realm of Too Many Options

Write, record, mix and actually finish your music

From Physical to Cloud to Container
24 min

From Physical to Cloud to Container

One system to deploy and manage them all

HTCPCP - Networking your Coffeepot
20 min

HTCPCP - Networking your Coffeepot

IoT done right for fun and no profit

8 Years of Config Management
59 min

8 Years of Config Management

a journey through one company's challenges and learnings

Weaponized Social
35 min

Weaponized Social

Understanding and tools to mitigate network-scale violences

Towards automatic end to end mail encryption
98 min

Towards automatic end to end mail encryption

mail encryption overview and hands-on Autocrypt sessions

Pirate Radio
43 min

Pirate Radio

Running a Station and Staying on the Air

Closing Event
30 min

Closing Event

So long and thanks for all the fish

What you thought you knew about C
47 min

What you thought you knew about C

Impacts of undefined behaviour and other C oddities