Memory Corruption: from sandbox to SMM

Positive Hack Days il y a 8 ans

Developing Good Operations Tools

James Turnbull il y a 8 ans

7 lessons on Presentation Design from TED TALKS | Curly Films

Storyline Presentations il y a 8 ans

ARC302 AWS Cloud Design Patterns - AWS re: Invent 2012

Amazon Web Services il y a 11 ans

Formal Verification

Ilia Levin il y a 9 ans

On Smart Cards Security

Ilia Levin il y a 11 ans

A Modern View of Smart Cards Security

Ilia Levin il y a 11 ans

Fun with p and q

Ilia Levin il y a 9 ans

Advanced Json

guestfd7d7c il y a 16 ans

Realizing Linux Containers (LXC)

Boden Russell il y a 10 ans

Docker, Linux Containers (LXC), and security

Jérôme Petazzoni il y a 9 ans

Top 10 Trends of 2015

Buzz Marketing Group il y a 9 ans

Koru wearable trends 2015

KoruLab il y a 9 ans

UX. How to start?

Oleksandr Lisovskyi il y a 9 ans

Top Data Science Trends for 2015

VMware Tanzu il y a 9 ans

How Spotify scales Apache Storm Pipelines

Kinshuk Mishra il y a 9 ans