Unsorted Bookmarks

49624 bookmarks
Custom sorting
OData - the Best Way to REST
OData - the Best Way to REST
OData, short for Open Data Protocol, is an open protocol to allow the creation and consumption of queryable and interoperable RESTful APIs in a simple and standard way.
·odata.org·
OData - the Best Way to REST
The power of lazy programming
The power of lazy programming
Customer service is our #1 priority. Get a premium domain for your website today. Financing available.
·totalitech.com·
The power of lazy programming
Unprecedented and Unlawful: The NSA’s “Upstream” Surveillance | Just Security
Unprecedented and Unlawful: The NSA’s “Upstream” Surveillance | Just Security
The FISA Amendments Act of 2008 (FAA) — the statute the government uses to engage in warrantless surveillance of Americans’ international communications — is scheduled to expire in December 2017. In anticipation of the coming legislative debate over reauthorization, Congress has already begun to hold hearings. While Congress must address many problems with the government’s […]
·justsecurity.org·
Unprecedented and Unlawful: The NSA’s “Upstream” Surveillance | Just Security
Namecoin
Namecoin
·namecoin.org·
Namecoin
KMIP: There’s a new Sheriff in town and his name is KMIP
KMIP: There’s a new Sheriff in town and his name is KMIP
The world relies on Thales to protect and secure access to your most sensitive data and software wherever created, shared or stored. Building an encryption strategy, licensing software, providing trusted access to the cloud, or meeting compliance mandates, you can rely on Thales to secure your digital transformation.
·thales-esecurity.com·
KMIP: There’s a new Sheriff in town and his name is KMIP
Integrating KMIP, PKCS 11, and SSH | Articles
Integrating KMIP, PKCS 11, and SSH | Articles
Introduction P6R has implemented a PKCS 11 Baseline Consumer as part of a SSH server's Public Key Authentication protocol (i.e., RFC 4252). This
·p6r.com·
Integrating KMIP, PKCS 11, and SSH | Articles
Open Source KMIP Implementation
Open Source KMIP Implementation
KMIP stands for key management interoperability protocol. Provides simple binary and TTLV variant protocol to manage various cryptographic key cycles for enter…
·slideshare.net·
Open Source KMIP Implementation
DNSCrypt - Official Project Home Page
DNSCrypt - Official Project Home Page
Home of the DNSCrypt project, a protocol to improve DNS security. Download DNSCrypt clients, the DNSCrypt server proxy, and read the specifications here.
·dnscrypt.org·
DNSCrypt - Official Project Home Page
What should Alexa do? - O'Reilly Media
What should Alexa do? - O'Reilly Media
The success of the Amazon Echo’s speech interface shows there's an opportunity for someone to build a completely new mobile operating system.
·oreilly.com·
What should Alexa do? - O'Reilly Media
Canonical Releases a Commercially-Supported Kubernetes for Multicloud Use - The New Stack
Canonical Releases a Commercially-Supported Kubernetes for Multicloud Use - The New Stack
Linux distributor Canonical is jumping into the fray rushing to simplify management of the Kubernetes. The company has released its own commercially-supported distribution of the open source container orchestration software. The news comes at the same time as the release of Kubernetes 1.4, which comes with expanded cluster and persistent data support. This Ubuntu-based version of Kubernetes provides consistent…
·thenewstack.io·
Canonical Releases a Commercially-Supported Kubernetes for Multicloud Use - The New Stack
Why Empathy is the Secret Sauce for Good Software Development - The New Stack
Why Empathy is the Secret Sauce for Good Software Development - The New Stack
“Typically we’re creating tools for other people.” We know empathy is a necessary human emotion. But is it necessary for good software? If you’re developing software for humans or even alongside other humans, then, yes, it is. As a software consultant and agile coach Daniel Bryant is often brought in when things are going awry —…
·thenewstack.io·
Why Empathy is the Secret Sauce for Good Software Development - The New Stack
Container Security and Docker's Pluggable Architecture - The New Stack
Container Security and Docker's Pluggable Architecture - The New Stack
In this episode of The New Stack Analysts podcast, we delve into the challenges of networking containers, how container namespaces have evolved, and the evolving state of container security today. The discussion also touches on the importance of pluggable ecosystems, and how implementing pluggable models benefits both vendors and users of Docker. IBM Senior Technical…
·thenewstack.io·
Container Security and Docker's Pluggable Architecture - The New Stack