Proposal for an open and democratic Design Rule format A missing piece in the open source EDA world

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=EmGC5MszdyQ



Duration: 25:31
0 views
0


FOSDEM 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-18The future of Sympa from mailing lists to social networks
2022-06-18The case against It just works or how to avoid idiocracy Design, education, politics and fake n
2022-06-18Scaling Deep Learning to hundreds of GPUs on HopsHadoop
2022-06-18Surviving in an Open Source Niche the Pythran case a compiler for scientific kernels written in Py
2022-06-18Software necromancy with Perl
2022-06-18So you think you can validate email addresses A journey down RFC5321
2022-06-18So we have free web fonts now what Open source fonts dominate the web, but not print or embedded …
2022-06-18ProxySQL GTID Consistent Reads Adaptive query routing based on GTID tracking
2022-06-18Rust On L4Re Safe Language Meets Safe Microkernel
2022-06-18Proposal for better font handling in LibreOffice
2022-06-18Proposal for an open and democratic Design Rule format A missing piece in the open source EDA world
2022-06-18Rust memory management A short intro
2022-06-18Reflections on Teaching a Unix Class With FreeBSD Lessons learned on both sides
2022-06-18Reducing CPU usage of a Toro Appliance
2022-06-18Pronto Raster A C library for Map Algebra
2022-06-18Rust embedding WebAssembly for scripting WebAssembly in non Javascript environments
2022-06-18Recycle Parsers With Grammar Common in Perl 6
2022-06-18Programming UEFI for dummies What I have learned while tweaking FreePascal to output UEFI binaries
2022-06-18Running Android on the Mainline Graphics Stack
2022-06-18Package quality assurance
2022-06-18Productionizing Spark ML Pipelines with the Portable Format for Analytics



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering