Home
Recent
Comments
Search
Login
Search
Search:
Stories
Comments
Order By:
Relevance
Newest
Points
130 results for "darpa"
10
Xerox PARC's Self-Destructing Chip
hardware
security
computerworld.com.au
via
zgrep
2 years ago
|
cached
|
5 comments
5
2
A New Design for Cryptography’s Black Box (indistinguishability obfuscation)
compsci
math
privacy
security
quantamagazine.org
via
craigstuntz
2 years ago
|
cached
|
no comments
0
3
Snowsuit Zine // issue 09 - FreeBSD
culture
freebsd
snowsuit.io
via
apy
2 years ago
|
cached
|
no comments
0
3
50 years ago today the word “hypertext” was introduced
person
web
gigaom.com
via
pushcx
3 years ago
|
cached
|
4 comments
4
17
HOWTO: Get tenure
compsci
person
matt.might.net
via
stijlist
3 years ago
|
cached
|
15 comments
15
0
Pennsylvania to Become First State to Use “Precrime” Statistics in Criminal Sentencing
law
infowars.com
via
atmosx
3 years ago
|
cached
|
4 comments
4
3
CUFP 2013: Tom Hawkins: Redesigning the Computer for Security
video
hardware
security
youtube.com
via
wally
3 years ago
|
cached
|
no comments
0
2
The Next Wave A Conversation With John Markoff
☶
cogsci
culture
person
edge.org
via
joe_the_user
3 years ago
|
cached
|
no comments
0
46
Hackers Remotely Kill a Jeep on the Highway - With Me in It
hardware
security
wired.com
via
journeysquid
3 years ago
|
cached
|
33 comments
33
11
Richard Feynman and The Connection Machine (1989)
person
longnow.org
via
rubenbarroso
3 years ago
|
cached
|
1 comment
1
12
Why Unikernels Can Improve Internet Security
devops
networking
security
web
linux.com
via
itistoday
3 years ago
|
cached
|
no comments
0
4
Is 'Good Enough' Computing Good Enough?
hardware
programming
cacm.acm.org
via
kellogh
3 years ago
|
cached
|
no comments
0
8
The first first-person shooter
games
polygon.com
via
calvin
3 years ago
|
cached
|
no comments
0
6
The State of Probabilistic Programming
compilers
math
moalquraishi.wordpress.com
via
jtobin
3 years ago
|
cached
|
no comments
0
5
Reviewing the second year of OCaml Labs in 2014
ml
programming
anil.recoil.org
via
tizoc
3 years ago
|
cached
|
no comments
0
15
The Racket Manifesto
lisp
programming
ccs.neu.edu
via
zedoary
3 years ago
|
cached
|
no comments
0
13
What is noninterference, and how do we enforce it?
compsci
programming
security
pl-enthusiast.net
via
awruef
3 years ago
|
cached
|
2 comments
2
2
Crowdsourcing isn’t broken
culture
medium.com
via
jcs
3 years ago
|
cached
|
no comments
0
10
The Design and Implementation of Probabilistic Programming Languages
cogsci
math
dippl.org
via
animatronic
3 years ago
|
cached
|
no comments
0
8
A Conversation with Arthur Whitney (2009)
person
programming
queue.acm.org
via
mrfabbri
3 years ago
|
cached
|
no comments
0
Page:
1
2
3
4
5