Looking at Open Source Security from the Community Angle
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 43 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/67141 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
AngleInformation securityLocal GroupInformation securityOpen sourceMusical ensembleSatelliteComputer animationLecture/ConferenceMeeting/Interview
00:33
AngleInformation securityLocal GroupData modelSoftware developerReference dataSoftwareScripting languageOpen sourceExplosionBitSoftware developerOpen sourceGroup actionDifferent (Kate Ryan album)Data managementAngle of attackAnalytic setProjective planePivot elementComputer animation
01:31
Programmable read-only memoryLocal GroupFormal grammarData modelSoftware developerSoftwareElectric currentExplosionOpen sourceScripting languageRootSoftware developerDebuggerWeb 2.0Angle of attackDifferent (Kate Ryan album)Front and back endsGroup actionWeb-DesignerLecture/ConferenceComputer animation
02:15
Open sourceGroup actionInformation securityOpen sourceSelf-organizationLecture/Conference
02:40
SoftwareChainInterface (computing)Continuous functionCodeInformation securityRun time (program lifecycle phase)Open sourceDistribution (mathematics)Point cloudAerodynamicsMIDITelecommunicationMathematical optimizationProgrammable read-only memoryVirtual machineDistanceGraphics processing unitInformationEuclidean vectorSoftware frameworkMetric systemSoftware frameworkProduct (business)Power (physics)Self-organizationTouch typingPoint cloudCodeDifferent (Kate Ryan album)SoftwarePoint (geometry)Endliche ModelltheorieOpen sourceChainUser interfaceConnectivity (graph theory)Computing platformElectric generatorField (computer science)Instance (computer science)Information securityComputer animationXML
04:52
TelecommunicationInformationWeb 2.0Library (computing)Open sourceWeb applicationLecture/Conference
05:17
Open sourceVirtual machineInformationTelecommunicationAerodynamicsControl flowPhysical systemContinuous functionProgrammable read-only memoryCAN busData modelData miningGraphics processing unitComputing platformPoint cloudScalabilityDistanceMathematical optimizationSoftware frameworkEuclidean vectorReinforcement learningSelf-organizationInformation securityData managementTask (computing)Staff (military)Integrated development environmentStack (abstract data type)Case moddingMereologyMedical imagingInformation securityRight angleProduct (business)Open sourceSelf-organizationSoftware maintenanceChainSoftwareSound effectStack (abstract data type)INTEGRALComputer animationXML
06:05
Self-organizationProjective planeSoftware maintenanceOpen sourceNormal (geometry)Integrated development environmentLecture/Conference
06:35
Open sourceSelf-organizationInformation securityStaff (military)Task (computing)Data managementIntegrated development environmentStack (abstract data type)Self-organizationExecution unitOpen sourceComputer animation
07:14
Open sourceSelf-organizationOpen sourceSelf-organizationCASE <Informatik>Shape (magazine)Projective planeTask (computing)Computer animation
07:46
Local GroupPersonal digital assistantCASE <Informatik>Open sourceSelf-organizationOpen sourceExecution unitInformation securityLine (geometry)Projective planeData managementoutputParallel portCollaborationismTerm (mathematics)1 (number)Self-organizationDifferent (Kate Ryan album)Group actionFeedbackSoftware developerXMLComputer animation
08:53
Tournament (medieval)ExplosionCASE <Informatik>Product (business)Interior (topology)Open sourceVideo gameVulnerability (computing)Self-organizationCycle (graph theory)Different (Kate Ryan album)Angle of attackMereologyLecture/Conference
09:15
Open sourceComputer architectureTerm (mathematics)Computer animationLecture/Conference
09:37
1 (number)Theory of relativitySelf-organizationOpen sourceLatent heatInformation securityTerm (mathematics)Spectrum (functional analysis)Computer animation
10:00
ChainSoftwareSoftware developerFeedbackProgrammschleifeInformation securityData managementTouch typingInformation securitySoftwareSoftware developerFeedbackChainLatent heatProduct (business)Self-organizationPoint (geometry)Computer animation
10:58
Information securityProcess (computing)Software developerAutomationLecture/Conference
11:29
Open sourceSoftware developerComponent-based software engineeringOpen sourceSelf-organizationConnectivity (graph theory)Process (computing)Dynamical systemInformation securityArmProduct (business)Online helpSoftware developerProjective planeAutomationLecture/ConferenceComputer animation
12:44
TrailOpen sourceAngle of attackInformation securityProjective planeSoftware maintenanceSoftware bugWordService (economics)Parallel portSelf-organizationTrailSoftware developerTask (computing)Instance (computer science)Computer animationLecture/Conference
15:09
Self-organizationSoftwareOpen sourceInformation securityOnline helpSoftware maintenanceLecture/Conference
15:34
Open sourceOpen setStaff (military)Information securityChainCollaborationismSoftwareContinuous functionDigitizingModul <Datentyp>Data managementTerm (mathematics)Observational studyArchaeological field surveyData modelCapability Maturity ModelFreewareCASE <Informatik>Meta elementTwin primeGEDCOMIntegral domainLocal GroupFood energyNumerical taxonomyStaff (military)CollaborationismChainSelf-organizationOpen sourceSoftware developerShared memory9K33 OsaInformation securityProcess (computing)Projective planeGroup actionBitDigitizingDifferent (Kate Ryan album)Online helpComa BerenicesMessage passingComputer animation
17:41
Numerical taxonomyWebsiteOpen sourceDifferent (Kate Ryan album)DialectWeb pageComputer programmingSoftware repositoryLecture/ConferenceComputer animationXML
18:32
WebsiteSelf-organizationControl flowOpen sourceOffice suiteComputer programmingBitLecture/Conference
18:51
WebsiteMereologyOpen sourceSoftware developerBitMultiplication signSelf-organizationNumberCASE <Informatik>Open setLecture/ConferenceMeeting/Interview
19:44
SpacetimeGroup actionData managementInstance (computer science)CASE <Informatik>Latent heatSelf-organizationOpen setInformation securityProjective planeVulnerability (computing)Lecture/Conference
20:54
Vulnerability (computing)Touch typingSelf-organizationCASE <Informatik>Point (geometry)Rule of inferenceLecture/ConferenceMeeting/Interview
21:23
WebsiteRule of inferenceSelf-organizationInformationWebsiteFlow separationLecture/Conference
21:55
WebsiteLecture/ConferenceMeeting/Interview
22:16
WebsiteArchaeological field surveyPulse (signal processing)9K33 OsaLecture/Conference
22:38
Traffic reportingArchaeological field surveyLecture/Conference
23:03
Information securityStaff (military)Open sourceChainCollaborationismInformation securityAngle of attackLecture/Conference
23:29
Key (cryptography)Presentation of a groupLevel (video gaming)SpacetimeLecture/Conference
23:58
SpacetimeRule of inferenceInformation securitySelf-organizationSoftware frameworkLecture/Conference
24:29
WebsiteOpen sourceIterationLecture/ConferenceMeeting/Interview
25:05
Self-organizationLecture/Conference
25:36
Programmable read-only memoryWebsiteMusical ensembleLecture/Conference
Transcript: English(auto-generated)