Complexity Classes
What’s easy for a computer to do, and what’s almost impossible? Those questions form the core of computational complexity. We present a map of the landscape.
EXPTIME  PSPACE  PH  NP  BQP  BPP  P  vs  Complexity  theory 
Spectre Mitigations in Browsers
Great overview of Spectre mitigations, timing restrictions slow down attacks, but don't prevent them.
spectre  speculative  execution  web  engines 
16 days ago
Learn to Crypto
Great set of crypto exercises, but why JS?!
crypto  learning  tutorial  cryptopals 
5 weeks ago
Awasi Patagonia
Situated in a private reserve overlooking Torres del Paine National Park, our lodge has just 14 villas and a main lodge. Each villa is assigned with a private guide and 4WD so guests can explore at their own pace, visiting where they want, when they want.
Hotels  Patagonia  Lodges 
10 weeks ago
Panter Tourron
Design consultancy in Lausanne
hardware  design  Lausanne 
12 weeks ago
In blockchain we trust
A realistic article about blockchains.
april 2018
« earlier      
abuse academia activism address advice ai algorithms analysis android anonymous anxiety app apple applications apps appsec arab arabia architecture art assembly attack authentication backdoor bgp binary bitcoin bittorrent blockchain blogs book bookmarks_bar books browser buffer c c++ car category censorship chat cheatsheet clang class clothes clothing cloud_related code coding collaboration_app compiler compiler_technology complexity computer computing course crimea crowdfunding crypto cryptocat cryptography css ctf culture cv cyber dance_parcours_and_other_crazy_stuff dashboard data database datamining dataviz ddos deep deployement depression design designer designers_companies developement devices_&_hardware distributed dns download drm drone e-government ecc editor education electronic_circuits electronics email encryption engineering epfl ethical europe exploitation facebook feminism fingerprints fonts food formal fourier framework frameworks free fun funding fuzzing game git github google guide hack hacking hacks happiness hardware haskell health hiring hosting hosting_and_cloud html5 http https hyperloop information injection inspirational intelligence internet interview introduction ios iphone iran jailbreak java javascript javascripts job jobs json kernel key keyboard language languages latex lattices learning ledger life lifestyle linux live llvm mac mac_hardware machine malware management map markdown math math_and_science maths media medical memory mental metadata ml mobile mobile_dev money monitoring music netneutrality network networks neural news nginx nist nsa obfuscation objective-c online online_tools open open_and_free_software opendata opensource operating opsec os osx overflow passwords pdf people phd philosophy phone photography physics pictures pinning pirate_party places_to_be places_to_visit posters prevention printing privacy processing programming protocol psychology publishing push_notifications quantum quantuminfo random rape react readings regex relationships remote research ressources resume reverse reverse-engineering revolution rights rsa runtime russia rust saudi scala science sciences_&_research secrecy secure security server servers sgx sha3 shoes shopping silicon sites sleep small_tools sncbleak social software source speaking sql ssh ssl startup startups statistics stickers store stripe suicide surveillance swift swiss_web_companies switzerland syria syrianelectronicarmy sysadmin system systems t-shirt t_shirts_&_geek_clothing tcp tech technology terminal testing theory time tls to tool toolkit tools tor transform travel tutorial twitter uber ui ui_design ux valley verification via:popular video videos visualization walkthrough war weather_-_meteo web webrtc websitesilike work working writing x xss

Copy this bookmark: