David Hacker

Results: 17



#Item
1Software / Computing / System software / C++ Standard Library / Intermodal container / Modularity / Docker / Container / Associative containers / Operating-system-level virtualization / Weather Research and Forecasting Model

4.3 Collaborative WRF-based research and education with reproducible numerical weather prediction enabled by software containers. Hacker, Josh, John Exby, David Gill, National Center for Atmospheric Research, and Ca

Add to Reading List

Source URL: www2.mmm.ucar.edu

Language: English - Date: 2016-06-16 12:19:59
2Hacker culture / Internet slang / OpenBSD / Hackathon

Extracurricular  Tempta/ons   Panel  at  CRA  Snowbird,  July  2016     Moderator:  Ellen  Zegura,  Georgia  Tech   Panelists:  David  Liben-­‐Nowell  (Carleton),

Add to Reading List

Source URL: cra.org

Language: English - Date: 2016-07-19 11:41:14
3

Performance Analysis of a Space-Based GMTI Radar System Using Separated Spacecraft Interferometry Troy L. Hacker, Raymond J. Sedwick, and David W. Miller

Add to Reading List

Source URL: ssl.mit.edu

Language: English - Date: 2012-08-09 16:58:42
    4

    Impact of increased hematocrit on right ventricular afterload in response to chronic hypoxia David A. Schreier, Timothy A. Hacker, Kendall Hunter, Jens Eickoff, Aiping Liu, Gouqing Song and Naomi Chesler J Appl Physiol 1

    Add to Reading List

    Source URL: vtb.bme.wisc.edu

    Language: English - Date: 2015-02-03 15:22:53
      5SparkFun Electronics / Hackers: Heroes of the Computer Revolution / Make / Do it yourself / Hacker / TV-B-Gone / Computing / Electronics / Electronic engineering

      Breadboard to Best Buy... Why don’t more DIY electronics projects go BIG? David Merrill maker shed pic

      Add to Reading List

      Source URL: www.sketching10.com

      Language: English - Date: 2010-07-30 01:53:59
      6Software testing / Hacking / Black Hat Briefings / David Litchfield / Vulnerability / Application security / SecurityFocus / Hacker / Security / Computer security / Computing / Cyberwarfare

      Visit us at: www.microsoft.com/security security portal SecurityFocus is the leading provider of security intelligence services for business, and a trusted information resource for the security

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-05-28 15:51:14
      7Hacker ethic / Richard Stallman / Free software movement / Typeface / Hacker / Copyleft / Free software / Free culture movement / Free and open source software / Computing / Social movements / Software licenses

      THE FREE FONT MOVEMENT david crossland Dissertation submitted in partial fulfilment of the requirements for the MA Typeface Design, University of Reading, 2008

      Add to Reading List

      Source URL: understandingfonts.com

      Language: English - Date: 2015-03-01 19:54:28
      8Native American history / Paleo-Indians / Recent single origin hypothesis / David G. Anderson / J&J Hunt Submerged Archaeological Site / Americas / History of North America / Archaic period in the Americas

      A PRELIMINARY ARCHAEOLOGICAL CONTEXT FOR GREENVILLE COUNTY, SOUTH CAROLINA Michael Trinkley, Ph.D., Debi Hacker, and Natalie Adams Introduction This section presents information about the archaeology that has been done i

      Add to Reading List

      Source URL: chicora.org

      Language: English - Date: 2008-07-09 16:34:05
      9Hacker ethic / Hackers: Heroes of the Computer Revolution / Hacker / What the Hack / Information wants to be free / Hacks at the Massachusetts Institute of Technology / Electron / Steven Levy / Hacker Emblem / Computing / Electronics / Hacking

      How Digital Technology Found Utopian Ideology: Lessons From the First Hackers’ Conference Fred Turner Department of Communication Stanford University Forthcoming in David Silver and Adrienne Massanari, eds., Critical C

      Add to Reading List

      Source URL: fredturner.stanford.edu

      Language: English - Date: 2012-08-02 18:55:52
      10Spamming / Email / Cybercrime / Marketing / Spam / Hacker / Email spam / Computer virus / Internet censorship in Hong Kong / Computing / Internet / Hacking

      Hackers in Hong Kong and the attitude of Hong Kong Courts towards hacking David Leung, 11 November 2000

      Add to Reading List

      Source URL: www.isfs.org.hk

      Language: English - Date: 2009-02-23 04:43:25
      UPDATE