Hackers

Sort by:

Emerging Markets: Kenya with Nelly Cheboi

Africa is rapidly adopting the same software and hardware technologies that have transformed the western world over the last few decades. But access to computers and technology education

SPIFFE: Zero Trust Workload Identification with Evan Gilman

Modern software consists of sprawling international networks of servers. Users contact these servers to access applications. Microservices talk to each other to fulfill complicated

Jailbreaking Apple Watch with Max Bazaliy

Apple operating systems are closed source. This closed source nature gives Apple an extremely successful business model–and a very different software developer ecosystem than

Counting People with Andrew Farah

If you operate a restaurant, you want to know how many people are inside your restaurant at any given time. You also want to be able to know your occupancy if you operate a movie

Kademlia: P2P Distributed Hash Table with Petar Maymounkov

Napster, Kazaa, and Bittorrent are peer-to-peer file sharing systems. In these P2P systems, nodes need to find each other. Users need to be able to search for files that exist across the