Cultural interpretations of Design and Openness

Subscribers:
6,000
Published on ● Video Link: https://www.youtube.com/watch?v=e4jdd7c1m9E



Duration: 23:35
3 views
0


FOSDEM 2018 FOSDEM 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-14GDAL Tips and Tricks GDAL installation, Python usage, and Cloud GeoTIFFs
2022-06-14Graal How to use the new JVM JIT compiler in real life
2022-06-14G CORE The LDBC Graph Query Language Proposal
2022-06-11Easy jit just in time compilation for C
2022-06-11Data integrity protection with cryptsetup tools what is the Linux dm integrity module and why we ex…
2022-06-11Community & Business Two worlds, one galaxy
2022-06-11Compiler assisted Security Enhancement
2022-06-11DWARF Pieces And Other DWARF Location Woes
2022-06-11Component Sourcing for Design and Manufacturing in Shenzhen An augmentation of Bunnie Huang's Guid
2022-06-11Designing PCBs with code Designing circuits with code instead of CAD
2022-06-11Cultural interpretations of Design and Openness
2022-06-11Firefox How to ship quality software 8000 new patches, a release every 6 weeks, how Mozilla does i
2022-06-11Everything is a deviceLessons learned from experimenting with MH
2022-06-11Efficient implementation of a spectrum scanner on a software defined radio platform
2022-06-11Digital Archaeology Main'taining our digital heritage
2022-06-11Easy GnuPG Shell scripts to make GnuPG more accessible and easier to use
2022-06-11Cypher for Apache Spark
2022-06-11Cyborg Teams Training machines to be Open Source contributors
2022-06-11Efficient Graph Algorithms in Neo4j
2022-06-11Efficient and interactive 3D point cloud processing Combining the strengths of pdal, ipyvolume and …
2022-06-11Experiences with testing dev MySQL versions and why it's good for you



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering