Considered harmful

Results: 96



#Item
31Actor model / Concurrent computing

Redundancy No Longer Considered Harmful Ike Antkaretoo International Institute of Technology United Slates of Earth

Add to Reading List

Source URL: membres-lig.imag.fr

Language: English - Date: 2014-01-09 04:24:29
32Statistics / Hypothesis testing / Knowledge / Design of experiments / Academia / Formal sciences / Statistical inference / Data analysis / Scientific method / Data mining / Null hypothesis / Statistical hypothesis testing

Interactive Data Mining Considered Harmful∗ (If Done Wrong) Pauli Miettinen Max-Planck-Institut für Informatik Saarbrücken, Germany

Add to Reading List

Source URL: poloclub.gatech.edu

Language: English - Date: 2014-07-21 14:53:21
33Software engineering / Computer programming / Computing / Edsger W. Dijkstra / Control flow / Source code / Goto / Structured programming / Label / Spaghetti code / Statement / Considered harmful

An Empirical Study of Goto in C Code from GitHub Repositories Meiyappan Nagappan1 , Romain Robbes2 , Yasutaka Kamei3 , Éric Tanter2 , Shane McIntosh4 , Audris Mockus5 , Ahmed E. Hassan6 1

Add to Reading List

Source URL: www.se.rit.edu

Language: English - Date: 2015-07-15 20:05:57
34Computer hardware / Computing / Computer architecture / Boot loaders / IBM PC compatibles / Classes of computers / USB flash drive / Laptop / Flash memory / BIOS / Firmware / USB

State considered harmful A proposal for a stateless laptop Joanna Rutkowska December 2015

Add to Reading List

Source URL: blog.invisiblethings.org

Language: English - Date: 2016-05-30 05:11:43
35Software / Computing / Microsoft / Online backup services / Windows Live / Cloud storage / Microsoft Office / Universal Windows Platform apps / OneDrive / URL shortening / Bitly / Google Drive

Gone in Six Characters: Short URLs Considered Harmful for Cloud Services Vitaly Shmatikov Cornell Tech arXiv:1604.02734v1 [cs.CR] 10 Apr 2016

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2016-04-11 20:37:56
36

Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication Jan Spooren, Davy Preuveneers, Wouter Joosen iMinds-DistriNet Department of Computer Science, KU Leuven Leuven, Belgium

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English - Date: 2015-07-31 14:34:27
    37

    As part of our ongoing effort to support current and future legislative bans on substances considered harmful to individuals and / or the environment, Bel has confirmed that neither our products nor our packaging materia

    Add to Reading List

    Source URL: belfuse.com

    - Date: 2009-06-30 14:04:00
      38Cryptography / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Cryptographic protocols / MD5 / Certificate authority / Public key certificate / HTTPS / Chain of trust / X.509

      MD5 Considered Harmful Today Creating a rogue CA certificate Alexander Sotirov Marc Stevens Jacob Appelbaum Arjen Lenstra

      Add to Reading List

      Source URL: www.trailofbits.com

      Language: English - Date: 2016-04-15 11:36:17
      39

      gem5, GPGPUSim, McPAT, GPUWattch, "Your favorite simulator here" Considered Harmful Jaikrishnan Menon Chen-Han Ho Karthikeyan Sankaralingam University of Wisconsin - Madison

      Add to Reading List

      Source URL: research.cs.wisc.edu

      Language: English - Date: 2014-06-13 23:49:29
        40Software / Computer architecture / System software / Boot loaders / BIOS / X86 architecture / Unified Extensible Firmware Interface / System Management Mode / Intel vPro / Coreboot / Trusted Execution Technology / Rootkit

        Intel x86 considered harmful Joanna Rutkowska October 2015 Intel x86 considered harmful Version: 1.0

        Add to Reading List

        Source URL: blog.invisiblethings.org

        Language: English - Date: 2016-03-16 08:27:13
        UPDATE