Archive for the ‘Security’ Category


‘An Axiomatic Basis for Computer Programming’ by C.A.R. Hoare.

Leading a Healthcare Company to the Big Data Promised Land: A Case Study of Hadoop in Healthcare

Nathan Marz on Storm, Immutability in the Lambda Architecture, Clojure

Homo Sapiens 2.0: Genetic Enhancement and the Future of Humanity

At-Google Talks: “Scrum” with Dr Jeff Sutherland | London, UK

Telling Technology Stories with IPython Notebook

Guide for Technical Development

Enchanted Objects — Internet of Things

Computational Neuroscience – An Introduction

Building the world’s largest radio telescope | Maria Grazia Labate |

Python 3 Metaprogramming

Tesla Motors – The Future of Electric Cars [Full Documentary]

MIT Aeronautics and Astronautics Department’s 2014 Centennial celebration

Welcome to Deep Learning

The Virtual Interview: Edward Snowden — OCTOBER 11, 2014

Deep Learning: Intelligence from Big Data

The Future of Civilian Robotics

Mikey Dickerson Velocity NY 2014 Keynote: “One Year After…”

The Singularity Is Near When Humans Transcend Biology By Ray Kurzweil

Talks at Google: David Rose, “Enchanted Objects”

Lesie Lamport ACM 2014 A.M. Turing Award Winner

Entrepreneurship Through the Lens of Venture Capital: Jessica Livingston, Y Combinator

Entrepreneurship Through the Lens of Venture Capital: Rob Freelan, Silicon Valley Bank

Ed Boyden on Singularity 1 on 1: Let’s Bring Engineers into Studying the Brain

Y Combinator: “fund for the pivot”

Humans Need Not Apply

A Conversation with Max Kuhn – The useR! 2014 Interview

A Conversation with Hadley Wickham – the useR! 2014 interview

Field Trip: Google Self-Driving Cars!

Biodiversity Seminar

Dr. Ivar Jacobson – The Essence of Software Engineering: the SEMAT Approach

Is Bitcoin the Future of Money? – SXSW Interactive 2014 (Full Session)

Bitcoin: The Future of Currency?

What Is Fracking? This Simple Animation Is The Best Explanation We’ve Ever Seen

New Developments in Valve Technology

Towards Ubiquitous OWL Computing: Simplifying Programmatic Authoring of and Querying with OWL Axioms

Can We Create A Science of Consciousness?

Getting Started with Glass

Understanding and Using Regular Expressions

NASA’s Updated Warp Drive Space Craft Concept Looks Like Science Fiction Brought to Life
Read more:
Follow us: @33rdsquare on Twitter | 33rdsquare on Facebook

Jonathan Bush, Where Does It Hurt? | Talks at Google

SpaceX Dragon V2 can seat up to seven passengers, use thrusters to land on solid ground

The Illicit World Of ‘Dark Wallet’

Asia-Pacific Security: A Changing Role for the United States

Home-Ownership And The Stalled Economy

The Mega Costs Of Miracle Drugs



The discovery that could rewrite physics



So You Want to Be a Security Expert

How to Break Into Security, Ptacek Edition

Selected Documents on Secrecy and Security Policy



Kantara Initiative grants Accreditation to Deloitte & Touche LLP, and, eValid8, and Approves Verizons Universal Identity Service at LoA3

RSA 2011 Keynotes

“Can We Fix the Security Economics of Federated Authentication?” – Ross Anderson

New paper on Wi-Fi positioning systems

Hacking Techniques in Wireless Networks

TCP/IP Suite [for Computer Networks Handbook] Prabhaker Mateti, Wright State University,

Privacy Rethinks and the Example of Privacy-Preserving Marketplaces

Cyber Security

NRECA/Cooperative Research Network (CRN) Regional Smart Grid Demonstration
A Guide to Developing a Cyber Security and Risk Mitigation Plan

IEEE – Guest Editor’s Introduction • Kevin Rudd • June 2011

Cyber Attacks May Be “Acts Of War”

The Center for a New American Security (CNAS)
Improving Smart Grid Cyber Security

America’s Cyber Future: Security and Prosperity in the Information Age

Cyber Security Guide, Template and Checklist Download

Threat Modeling

Privacy Bill of Rights

Nothing to Hide: The False Tradeoff between Privacy and Security

Well-Meaning “Privacy Bill of Rights” Wouldn’t Stop Online Tracking

Federal Trade Commission (Bureau of Consumer Protection) A Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers (December 1, 2010)

Commercial Privacy Bill of Rights