Memory Corruption: from sandbox to SMM

Positive Hack Days 9 years ago

Developing Good Operations Tools

James Turnbull 8 years ago

ARC302 AWS Cloud Design Patterns - AWS re: Invent 2012

Amazon Web Services 11 years ago

Formal Verification

Ilia Levin 9 years ago

On Smart Cards Security

Ilia Levin 11 years ago

A Modern View of Smart Cards Security

Ilia Levin 11 years ago

Fun with p and q

Ilia Levin 9 years ago

Advanced Json

guestfd7d7c 16 years ago

Realizing Linux Containers (LXC)

Boden Russell 10 years ago

Docker, Linux Containers (LXC), and security

Jérôme Petazzoni 9 years ago

Top 10 Trends of 2015

Buzz Marketing Group 9 years ago

Koru wearable trends 2015

KoruLab 9 years ago

UX. How to start?

Oleksandr Lisovskyi 9 years ago

Top Data Science Trends for 2015

VMware Tanzu 9 years ago

How Spotify scales Apache Storm Pipelines

Kinshuk Mishra 9 years ago