id |
conf |
start |
state |
len
| episode.name
per New York Times Manual of Style
episode.slug
|
cmt |
released |
yt mp4 |
15122 |
137 |
Tue 14 10:45 |
1 |
40 |
Facebook, Dynamite, Uber, Bombs, and You
Facebook, Dynamite, Uber, Bombs, and You
Facebook_Dynamite_Uber_Bombs_and_You
|
|
Y |
|
15141 |
155 |
Tue 14 11:05 |
1 |
60 |
Evolution of Linux Containers to Container Native Storage...
Evolution of Linux Containers to Container Native Storage...
Evolution_of_Linux_Containers_to_Container_Native_Storage
|
|
Y |
|
15142 |
151 |
Tue 14 11:35 |
1 |
48 |
The Internet: Protecting Our Democratic Lifeline
The Internet: Protecting Our Democratic Lifeline
The_Internet_Protecting_Our_Democratic_Lifeline
|
|
Y |
|
15158 |
156 |
Tue 14 12:00 |
1 |
65 |
Dynamic Workloads need Dynamic Storage - using rook-ceph with k8s
Dynamic Workloads Need Dynamic Storage - Using Rook-ceph With K8s
Dynamic_Workloads_need_Dynamic_Storage_using_rookceph_with_k8s
|
|
Y |
|
15159 |
138 |
Tue 14 13:30 |
1 |
40 |
Privacy and Transparency in VPN industry
Privacy and Transparency in VPN Industry
Privacy_and_Transparency_in_VPN_industry
|
|
Y |
|
15160 |
141 |
Tue 14 13:30 |
1 |
42 |
OCIv2: Container Images Considered Harmful
OCIv2: Container Images Considered Harmful
OCIv2_Container_Images_Considered_Harmful
|
|
Y |
|
15179 |
152 |
Tue 14 14:05 |
1 |
79 |
Authentication Afterlife: the dark side of making lost password recovery harder
Authentication Afterlife: The Dark Side of Making Lost Password Recovery Harder
Authentication_Afterlife_the_dark_side_of_making_lost_password_recovery_harder
|
|
Y |
|
15180 |
157 |
Tue 14 14:20 |
1 |
52 |
Kubernetes Developer Workflows in Visual Studio Code
Kubernetes Developer Workflows in Visual Studio Code
Kubernetes_Developer_Workflows_in_Visual_Studio_Code
|
|
Y |
|
15195 |
153 |
Tue 14 14:40 |
1 |
18 |
You Shall Not Pass
You Shall Not Pass
You_Shall_Not_Pass
|
|
Y |
|
15196 |
139 |
Tue 14 15:45 |
1 |
72 |
An intro to improving the security of your code with free analysis tools
An Intro to Improving the Security of Your Code With Free Analysis Tools
An_intro_to_improving_the_security_of_your_code_with_free_analysis_tools
|
|
Y |
|
15197 |
142 |
Tue 14 15:45 |
1 |
61 |
The future of the desktop is on hypervisor powered containers
The Future of the Desktop Is on Hypervisor Powered Containers
The_future_of_the_desktop_is_on_hypervisor_powered_containers
|
|
Y |
|
15210 |
154 |
Tue 14 16:35 |
1 |
45 |
The Psychology of Multi-Factor Authentication
The Psychology of Multi-Factor Authentication
The_Psychology_of_MultiFactor_Authentication
|
|
Y |
|
15221 |
159 |
Tue 14 16:55 |
1 |
25 |
Every Image Has A Purpose
Every Image Has a Purpose
Every_Image_Has_A_Purpose
|
|
Y |
|
15128 |
11 |
Wed 15 10:45 |
1 |
55 |
An introduction to Penetration Testing using Kali Linux
An Introduction to Penetration Testing Using Kali Linux
An_introduction_to_Penetration_Testing_using_Kali_Linux
|
|
Y |
|
15126 |
4 |
Wed 15 10:45 |
1 |
52 |
Automated acceptance tests for terminal applications
Automated Acceptance Tests for Terminal Applications
Automated_acceptance_tests_for_terminal_applications
|
|
Y |
|
15125 |
3 |
Wed 15 10:45 |
1 |
62 |
We know when you are sleeping: The Rise of Energy Smart Meters
We Know When You Are Sleeping: The Rise of Energy Smart Meters
We_know_when_you_are_sleeping_The_Rise_of_Energy_Smart_Meters
|
|
Y |
|
15124 |
2 |
Wed 15 10:45 |
1 |
70 |
From bits to legs to locomotion: Building a hexapod from the ground up
From Bits to Legs to Locomotion: Building a Hexapod From the Ground Up
From_bits_to_legs_to_locomotion_Building_a_hexapod_from_the_ground_up
|
|
Y |
|
15123 |
1 |
Wed 15 10:45 |
1 |
60 |
Snek: A Python-Inspired Language for Tiny Embedded Computers
Snek: A Python-Inspired Language for Tiny Embedded Computers
Snek_A_PythonInspired_Language_for_Tiny_Embedded_Computers_2
|
|
Y |
|
15127 |
5 |
Wed 15 10:45 |
1 |
43 |
Building a zero downtime Kubernetes cluster
Building a Zero Downtime Kubernetes Cluster
Building_a_zero_downtime_Kubernetes_cluster
|
|
Y |
|
15147 |
10 |
Wed 15 11:40 |
1 |
46 |
Piku: git push deployments to your own servers
Piku: Git Push Deployments to Your Own Servers
Piku_git_push_deployments_to_your_own_servers
|
|
Y |
|
15143 |
6 |
Wed 15 11:40 |
1 |
11 |
I Was Wrong
I Was Wrong
I_Was_Wrong
|
|
Y |
|
15144 |
7 |
Wed 15 11:40 |
1 |
36 |
Everything Awesome about GPU Drivers
Everything Awesome About GPU Drivers
Everything_Awesome_about_GPU_Drivers
|
|
Y |
|
15145 |
8 |
Wed 15 11:40 |
1 |
41 |
Verified seL4 on secure RISC-V processors
Verified seL4 on Secure RISC-V Processors
Verified_seL4_on_secure_RISCV_processors
|
|
Y |
|
15146 |
9 |
Wed 15 11:40 |
1 |
69 |
Like, Share and Subscribe: Effective Communication of Security Advice
Like, Share and Subscribe: Effective Communication of Security Advice
Like_Share_and_Subscribe_Effective_Communication_of_Security_Advice
|
|
Y |
|
15164 |
15 |
Wed 15 13:30 |
1 |
81 |
Good, better, breast: Building a sensing mastectomy prosthetic with open hardware
Good, Better, Breast: Building a Sensing Mastectomy Prosthetic With Open Hardware
Good_better_breast_Building_a_sensing_mastectomy_prosthetic_with_open_hardware
|
|
Y |
|
15163 |
14 |
Wed 15 13:30 |
1 |
62 |
What Makes Decentralisation Hard? And How Do We Overcome This?
What Makes Decentralisation Hard? And How Do We Overcome This?
What_Makes_Decentralisation_Hard_And_How_Do_We_Overcome_This
|
|
Y |
|
15161 |
12 |
Wed 15 13:30 |
1 |
70 |
The Linux network stack extension for DDoS mitigation and web security
The Linux Network Stack Extension for DDoS Mitigation and Web Security
The_Linux_network_stack_extension_for_DDoS_mitigation_and_web_security
|
|
Y |
|
15166 |
22 |
Wed 15 13:30 |
1 |
25 |
Velociraptor - Dig Deeper
Velociraptor - Dig Deeper
Velociraptor_Dig_Deeper
|
|
Y |
|
15162 |
13 |
Wed 15 13:30 |
1 |
17 |
What UNIX Cost Us
What UNIX Cost Us
What_UNIX_Cost_Us
|
|
Y |
|
15165 |
16 |
Wed 15 13:30 |
1 |
41 |
Panfrost: Open Source meets Arm Mali GPUs
Panfrost: Open Source Meets Arm Mali GPUs
Panfrost_Open_Source_meets_Arm_Mali_GPUs
|
|
Y |
|
15181 |
17 |
Wed 15 14:25 |
1 |
88 |
Planning for and handling failures from open hardware, aviation, to production at Google
Planning for and Handling Failures From Open Hardware, Aviation, to Production at Google
Planning_for_and_handling_failures_from_open_hardware_aviation_to_production_at_Google
|
|
Y |
|
15182 |
18 |
Wed 15 14:25 |
1 |
50 |
Securing Container Runtimes -- How Hard Can It Be?
Securing Container Runtimes -- How Hard Can It Be?
Securing_Container_Runtimes_How_Hard_Can_It_Be
|
|
Y |
|
15183 |
19 |
Wed 15 14:25 |
1 |
77 |
Privacy is not Binary: A discussion of data systems, ethics, and human rights
Privacy Is Not Binary: A Discussion of Data Systems, Ethics, and Human Rights
Privacy_is_not_Binary_A_discussion_of_data_systems_ethics_and_human_rights
|
|
Y |
|
15184 |
20 |
Wed 15 14:25 |
1 |
69 |
How internet congestion control actually works in the bufferbloat age
How Internet Congestion Control Actually Works in the Bufferbloat Age
How_internet_congestion_control_actually_works_in_the_bufferbloat_age
|
|
Y |
|
15185 |
21 |
Wed 15 14:25 |
1 |
46 |
Clevis and Tang: securing your secrets at rest
Clevis and Tang: Securing Your Secrets at Rest
Clevis_and_Tang_securing_your_secrets_at_rest
|
|
Y |
|
15203 |
33 |
Wed 15 15:45 |
1 |
29 |
Kicad for software developers
Kicad for Software Developers
Kicad_for_software_developers
|
|
Y |
|
15198 |
23 |
Wed 15 15:45 |
1 |
42 |
Control Flow Integrity in the Linux Kernel
Control Flow Integrity in the Linux Kernel
Control_Flow_Integrity_in_the_Linux_Kernel
|
|
Y |
|
15199 |
24 |
Wed 15 15:45 |
1 |
65 |
Open collaborations: leadership succession and leadership success
Open Collaborations: Leadership Succession and Leadership Success
Open_collaborations_leadership_succession_and_leadership_success
|
|
Y |
|
15200 |
25 |
Wed 15 15:45 |
1 |
48 |
Desktop Linux, without a keyboard, mouse or desk
Desktop Linux, Without a Keyboard, Mouse or Desk
Desktop_Linux_without_a_keyboard_mouse_or_desk
|
|
Y |
|
15201 |
26 |
Wed 15 15:45 |
1 |
36 |
Electronics from your Kitchen Drawer
Electronics From Your Kitchen Drawer
Electronics_from_your_Kitchen_Drawer
|
|
Y |
|
15202 |
27 |
Wed 15 15:45 |
1 |
21 |
It's All About Timing
It's All About Timing
Its_All_About_Timing
|
|
Y |
|
15211 |
28 |
Wed 15 16:40 |
1 |
23 |
Open Source Citizenship
Open Source Citizenship
Open_Source_Citizenship
|
|
Y |
|
15212 |
29 |
Wed 15 16:40 |
1 |
35 |
Open AND High Performance Computing
Open AND High Performance Computing
Open_AND_High_Performance_Computing
|
|
Y |
|
15215 |
32 |
Wed 15 16:40 |
1 |
80 |
No Docs? No Problem! From Zero to Full Documentation in Less Time than You Think
No Docs? No Problem! From Zero to Full Documentation in Less Time Than You Think
No_Docs_No_Problem_From_Zero_to_Full_Documentation_in_Less_Time_than_You_Think
|
|
Y |
|
15214 |
31 |
Wed 15 16:40 |
1 |
44 |
The Story of PulseAudio and Compress Offload
The Story of PulseAudio and Compress Offload
The_Story_of_PulseAudio_and_Compress_Offload
|
|
Y |
|
15213 |
30 |
Wed 15 16:40 |
1 |
50 |
Linux in the Cloud, on Prem, or... on a Mainframe?
Linux in the Cloud, on Prem, Or... On a Mainframe?
Linux_in_the_Cloud_on_Prem_or_on_a_Mainframe
|
|
Y |
|
15131 |
36 |
Thu 16 10:45 |
1 |
57 |
Decoding battery management data - back in the old school
Decoding Battery Management Data - Back in the Old School
Decoding_battery_management_data_back_in_the_old_school
|
|
Y |
|
15132 |
37 |
Thu 16 10:45 |
1 |
75 |
Engineer tested, manager approved: Migrating Windows/.NET services to Linux
Engineer Tested, Manager Approved: Migrating Windows/.NET Services to Linux
Engineer_tested_manager_approved_Migrating_WindowsNET_services_to_Linux
|
|
Y |
|
15129 |
34 |
Thu 16 10:45 |
1 |
29 |
When Jargon Becomes Gibberish
When Jargon Becomes Gibberish
When_Jargon_Becomes_Gibberish
|
|
Y |
|
15130 |
35 |
Thu 16 10:45 |
1 |
83 |
Compiling Your Story: Using Techniques from Compiler Design to Check Your Narrative
Compiling Your Story: Using Techniques From Compiler Design to Check Your Narrative
Compiling_Your_Story_Using_Techniques_from_Compiler_Design_to_Check_Your_Narrative
|
|
Y |
|
15134 |
43 |
Thu 16 10:45 |
1 |
57 |
A B C of 3D : Introduction to making 3D art using blender
A B C of 3D : Introduction to Making 3D Art Using Blender
A_B_C_of_3D_Introduction_to_making_3D_art_using_blender
|
|
Y |
|
15133 |
38 |
Thu 16 10:45 |
1 |
59 |
Musings of an Accidental Chair - change from the inside out
Musings of an Accidental Chair - Change From the Inside Out
Musings_of_an_Accidental_Chair_change_from_the_inside_out
|
|
Y |
|
15150 |
41 |
Thu 16 11:40 |
1 |
32 |
Collecting information with care
Collecting Information With Care
Collecting_information_with_care
|
|
Y |
|
15151 |
42 |
Thu 16 11:40 |
1 |
92 |
In-depth technical story: Fixing I/O performance for Windows guests in OpenStack Ceph clouds
In-depth Technical Story: Fixing I/O Performance for Windows Guests in OpenStack Ceph Clouds
Indepth_technical_story_Fixing_IO_performance_for_Windows_guests_in_OpenStack_Ceph_clouds
|
|
Y |
|
15152 |
99 |
Thu 16 11:40 |
1 |
68 |
VM block error injection, a novel approach for testing Linux storage
VM Block Error Injection, a Novel Approach for Testing Linux Storage
VM_block_error_injection_a_novel_approach_for_testing_Linux_storage
|
|
Y |
|
15148 |
39 |
Thu 16 11:40 |
1 |
55 |
Behind (and under) the scenes of the Meson build system
Behind (And Under) the Scenes of the Meson Build System
Behind_and_under_the_scenes_of_the_Meson_build_system
|
|
Y |
|
15149 |
40 |
Thu 16 11:40 |
1 |
26 |
NTFS really isn't that bad
NTFS Really Isn't That Bad
NTFS_really_isnt_that_bad
|
|
Y |
|
15168 |
45 |
Thu 16 13:30 |
1 |
39 |
Building an ethical data infrastructure
Building an Ethical Data Infrastructure
Building_an_ethical_data_infrastructure
|
|
Y |
|
15172 |
54 |
Thu 16 13:30 |
1 |
64 |
Introduction to Rust (for people who have never used a compiler)
Introduction to Rust (For People Who Have Never Used a Compiler)
Introduction_to_Rust_for_people_who_have_never_used_a_compiler
|
|
Y |
|
15167 |
44 |
Thu 16 13:30 |
1 |
69 |
ROS on your robot: the tale of an inside, an outside robot and 2 arms
ROS on Your Robot: The Tale of an Inside, an Outside Robot and 2 Arms
ROS_on_your_robot_the_tale_of_an_inside_an_outside_robot_and_2_arms
|
|
Y |
|
15169 |
46 |
Thu 16 13:30 |
1 |
22 |
Privacy Preserving IoT
Privacy Preserving IoT
Privacy_Preserving_IoT
|
|
Y |
|
15170 |
47 |
Thu 16 13:30 |
1 |
47 |
Portable, Attested, Secure Execution with Enarx
Portable, Attested, Secure Execution With Enarx
Portable_Attested_Secure_Execution_with_Enarx
|
|
Y |
|
15171 |
48 |
Thu 16 13:30 |
1 |
64 |
How to capture 100G Ethernet traffic at wire speed to local disk
How to Capture 100G Ethernet Traffic at Wire Speed to Local Disk
How_to_capture_100G_Ethernet_traffic_at_wire_speed_to_local_disk
|
|
Y |
|
15187 |
50 |
Thu 16 14:25 |
1 |
41 |
KUnit - Unit Testing for the Linux Kernel
KUnit - Unit Testing for the Linux Kernel
KUnit_Unit_Testing_for_the_Linux_Kernel
|
|
Y |
|
15189 |
52 |
Thu 16 14:25 |
1 |
25 |
The Ops in the Serverless
The Ops in the Serverless
The_Ops_in_the_Serverless
|
|
Y |
|
15188 |
51 |
Thu 16 14:25 |
1 |
26 |
The Secret Life of Routers
The Secret Life of Routers
The_Secret_Life_of_Routers
|
|
Y |
|
15186 |
49 |
Thu 16 14:25 |
1 |
54 |
The EU Says The Laws of Mathematics Apply in Australia
The EU Says the Laws of Mathematics Apply in Australia
The_EU_Says_The_Laws_of_Mathematics_Apply_in_Australia
|
|
Y |
|
15204 |
55 |
Thu 16 15:45 |
1 |
100 |
Open Source Won, but Software Freedom Hasn't Yet: A Guide & Commiseration Session for FOSS activists
Open Source Won, but Software Freedom Hasn't Yet: A Guide & Commiseration Session for FOSS Activists
Open_Source_Won_but_Software_Freedom_Hasnt_Yet_A_Guide_Commiseration_Session_for_FOSS_activists
|
|
Y |
|
15205 |
56 |
Thu 16 15:45 |
1 |
35 |
Room scale VR tracking with OpenHMD
Room Scale VR Tracking With OpenHMD
Room_scale_VR_tracking_with_OpenHMD
|
|
Y |
|
15206 |
57 |
Thu 16 15:45 |
1 |
36 |
How to Write a Retro Arcade Emulator
How to Write a Retro Arcade Emulator
How_to_Write_a_Retro_Arcade_Emulator
|
|
Y |
|
15207 |
63 |
Thu 16 15:45 |
1 |
37 |
Macro Security for your Microservices
Macro Security for Your Microservices
Macro_Security_for_your_Microservices
|
|
Y |
|
15208 |
97 |
Thu 16 15:45 |
1 |
69 |
Using WhatsApp as a Command Line ( Breaking out of the walled Garden)
Using WhatsApp as a Command Line ( Breaking Out of the Walled Garden)
Using_WhatsApp_as_a_Command_Line_Breaking_out_of_the_walled_Garden
|
|
Y |
|
15209 |
98 |
Thu 16 15:45 |
1 |
35 |
Playable Ads: What REALLY are they?
Playable Ads: What REALLY Are They?
Playable_Ads_What_REALLY_are_they
|
|
Y |
|
15220 |
62 |
Thu 16 16:40 |
1 |
55 |
Practical Ethics: building it better in 2020 and beyond
Practical Ethics: Building It Better in 2020 and Beyond
Practical_Ethics_building_it_better_in_2020_and_beyond
|
|
Y |
|
15219 |
61 |
Thu 16 16:40 |
1 |
66 |
eChronos Lyrae: A 64-bit multi-core RTOS kernel for ARM and RISC-V
eChronos Lyrae: A 64-bit Multi-core RTOS Kernel for ARM and RISC-V
eChronos_Lyrae_A_64bit_multicore_RTOS_kernel_for_ARM_and_RISCV
|
|
Y |
|
15217 |
59 |
Thu 16 16:40 |
1 |
57 |
What Lies Beneath: What are they really tracking and how?
What Lies Beneath: What Are They Really Tracking and How?
What_Lies_Beneath_What_are_they_really_tracking_and_how
|
|
Y |
|
15216 |
58 |
Thu 16 16:40 |
1 |
20 |
Large Pages in Linux
Large Pages in Linux
Large_Pages_in_Linux
|
|
Y |
|
15218 |
60 |
Thu 16 16:40 |
1 |
38 |
Advanced Stream Processing on the Edge
Advanced Stream Processing on the Edge
Advanced_Stream_Processing_on_the_Edge
|
|
Y |
|
15139 |
100 |
Fri 17 10:45 |
1 |
75 |
Everything you know is wrong: why using big words can made you sound stupid
Everything You Know Is Wrong: Why Using Big Words Can Made You Sound Stupid
Everything_you_know_is_wrong_why_using_big_words_can_made_you_sound_stupid
|
|
Y |
|
15137 |
66 |
Fri 17 10:45 |
1 |
37 |
The Fight to Keep the Watchers at Bay
The Fight to Keep the Watchers at Bay
The_Fight_to_Keep_the_Watchers_at_Bay
|
|
Y |
|
15138 |
72 |
Fri 17 10:45 |
1 |
34 |
Behind the scenes of an ELK system
Behind the Scenes of an ELK System
Behind_the_scenes_of_an_ELK_system
|
|
Y |
|
15135 |
64 |
Fri 17 10:45 |
1 |
51 |
TPM based attestation - how can we use it for good?
TPM Based Attestation - How Can We Use It for Good?
TPM_based_attestation_how_can_we_use_it_for_good
|
|
Y |
|
15136 |
65 |
Fri 17 10:45 |
1 |
14 |
Zero Trust SSH
Zero Trust SSH
Zero_Trust_SSH
|
|
Y |
|
15140 |
101 |
Fri 17 10:45 |
1 |
48 |
The magical fantasy land of Linux kernel testing
The Magical Fantasy Land of Linux Kernel Testing
The_magical_fantasy_land_of_Linux_kernel_testing
|
|
Y |
|
15155 |
69 |
Fri 17 11:40 |
1 |
88 |
Privacy, Security, Convenience; when it comes to home automation, can we pick all three?
Privacy, Security, Convenience; When It Comes to Home Automation, Can We Pick All Three?
Privacy_Security_Convenience_when_it_comes_to_home_automation_can_we_pick_all_three
|
|
Y |
|
15156 |
70 |
Fri 17 11:40 |
1 |
53 |
Securing firmware: Secure and Trusted boot in OpenBMC
Securing Firmware: Secure and Trusted Boot in OpenBMC
Securing_firmware_Secure_and_Trusted_boot_in_OpenBMC
|
|
Y |
|
15157 |
71 |
Fri 17 11:40 |
1 |
41 |
Building a Compiler for Quantum Computers
Building a Compiler for Quantum Computers
Building_a_Compiler_for_Quantum_Computers
|
|
Y |
|
15153 |
67 |
Fri 17 11:40 |
1 |
31 |
Affordable Custom Input Devices
Affordable Custom Input Devices
Affordable_Custom_Input_Devices
|
|
Y |
|
15154 |
68 |
Fri 17 11:40 |
1 |
94 |
RFC 1984: Or why you should start worrying about encryption backdoors and mass data collection
RFC 1984: Or Why You Should Start Worrying About Encryption Backdoors and Mass Data Collection
RFC_1984_Or_why_you_should_start_worrying_about_encryption_backdoors_and_mass_data_collection
|
|
Y |
|
15178 |
103 |
Fri 17 13:30 |
1 |
43 |
smbcmp: A new tool to diff network captures
Smbcmp: A New Tool to Diff Network Captures
smbcmp_A_new_tool_to_diff_network_captures
|
|
Y |
|
15176 |
81 |
Fri 17 13:30 |
1 |
47 |
Professional quality layout design with Scribus
Professional Quality Layout Design With Scribus
Professional_quality_layout_design_with_Scribus
|
|
Y |
|
15175 |
75 |
Fri 17 13:30 |
1 |
33 |
Transpile anything to everything!
Transpile Anything to Everything!
Transpile_anything_to_everything
|
|
Y |
|
15174 |
74 |
Fri 17 13:30 |
1 |
92 |
The life of open source spatial with QGIS - From hobby to grown up, with bonus growing pains
The Life of Open Source Spatial With QGIS - From Hobby to Grown Up, With Bonus Growing Pains
The_life_of_open_source_spatial_with_QGIS_From_hobby_to_grown_up_with_bonus_growing_pains
|
|
Y |
|
15173 |
73 |
Fri 17 13:30 |
1 |
80 |
"Write a single library to handle all input devices, it'll be easy" they said...
"Write a Single Library to Handle All Input Devices, It'll Be Easy" They Said...
Write_a_single_library_to_handle_all_input_devices_itll_be_easy_they_said
|
|
Y |
|
15177 |
102 |
Fri 17 13:30 |
1 |
56 |
Betrusted: Better Security Through Physical Partitioning
Betrusted: Better Security Through Physical Partitioning
Betrusted_Better_Security_Through_Physical_Partitioning
|
|
Y |
|
15193 |
79 |
Fri 17 14:25 |
1 |
61 |
Senseless - environmental sensing without additional hardware
Senseless - Environmental Sensing Without Additional Hardware
Senseless_environmental_sensing_without_additional_hardware
|
|
Y |
|
15190 |
76 |
Fri 17 14:25 |
1 |
30 |
Tensorflow on open source GPUs
Tensorflow on Open Source GPUs
Tensorflow_on_open_source_GPUs
|
|
Y |
|
15191 |
77 |
Fri 17 14:25 |
1 |
43 |
Privacy and Decentralisation with Multicast
Privacy and Decentralisation With Multicast
Privacy_and_Decentralisation_with_Multicast
|
|
Y |
|
15192 |
78 |
Fri 17 14:25 |
1 |
60 |
New Phone, Who Dis?: Human Authentication in the Digital Age
New Phone, Who Dis?: Human Authentication in the Digital Age
New_Phone_Who_Dis_Human_Authentication_in_the_Digital_Age_2
|
|
Y |
|
15194 |
80 |
Fri 17 14:25 |
1 |
55 |
How to make kernel and user space CI for input devices?
How to Make Kernel and User Space CI for Input Devices?
How_to_make_kernel_and_user_space_CI_for_input_devices
|
|
Y |
|