Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

February 25 2014

17:07

February 18 2014

21:34

February 13 2014

14:06

5by5 | In Beta #72: Giant Life-Defining Spreadsheet

Web-based project management apps Trello, Asana, Basecamp. Also, spreadsheets. http://5by5.tv/inbeta/72
13:35

5by5 | In Beta #71: Maybe We Should All Stop Breathing

Scott Berkun talks about managing WordPress, remote working, and trying to avoid writing **that** kind of management book. http://5by5.tv/inbeta/71

February 09 2014

18:58

5by5 | The Pen Addict #92: Awinkening

In this episode Brad and Myke dig into all things Every Day Carry. EDC means different things to different people so we try to bridge that gap and discuss all types of quality EDC pens and pencils. We also talk about a couple of new products to hit the ma http://5by5.tv/penaddict/92

February 06 2014

22:02

5by5 | In Beta #85: The Google Basket

Putting all your eggs in one online basket, and how to get away from said basket. http://5by5.tv/inbeta/85

February 01 2014

09:09

5by5 | Back to Work #33: The Hypocrite You Can Live With

Merlin Mann and Dan Benjamin have a totally natural emotional reaction to the unreasonable demands they place on themselves after reading The Spongebob Report. Maybe they wouldn't have offended non-ex-Marines if they had just taken some time and consulted http://5by5.tv/b2w/33

January 28 2014

20:42

5by5 | Back to Work #90: Quit!™

TOPIC: Sleep and How to Get It http://5by5.tv/b2w/90

January 25 2014

17:39

5by5 | Back to Work #31: You Can Polish AC/DC All Day Long

With Dan on sabbatical, Merlin is joined by John Roderick of The Long Winters to talk about life as a bull in a china closet, craving real-world constraints, making better records, and being banned for life from Interpol's corn chip bowl. http://5by5.tv/b2w/31

January 24 2014

01:55

5by5 | The Pen Addict #90: The Perfect Pen For Now

In this episode Brad and Myke dive deeper into finding the perfect pen for his friend. The list is getting narrowed down and getting larger at the same time. Is that even possible? We also discuss a Visionnaire convert, ink and Ink, and a slew of new pen http://5by5.tv/penaddict/90

January 23 2014

17:59

Show 176 – Intro to Python & Automation for Network Engineers

In this show, network automation geeks Jeremy Schulman and John Deatherage join host Ethan Banks for a practical look at getting started with Python and a host of related tools that the networking industry is making use of. The point being…you can, too. The automation movement in networking is driven in no small part by the open source community, meaning that there’s a lot of tools available for free.

January 16 2014

06:32

5by5 | In Beta #70: Technical Skills for a Clean Blog

Parsing the recent wave of new writing tools, and the best systems for getting the right attendees to your event. http://5by5.tv/inbeta/70
03:48

5by5 | In Beta #82: Agile Heat Developers

How creepy is the now Google-owned Nest? Kevin & Haddie Cooke discuss. http://5by5.tv/inbeta/82

January 11 2014

15:02

5by5 | Back to Work #42: Coconut Headphones

This week Dan and Merlin talk about asking good questions instead of massaging your real problem until it fits the comforting solution you found on the cover of a magazine. http://5by5.tv/b2w/42

January 10 2014

22:20

5by5 | In Beta #81: The Chaise Lounge Tablet Life

Kevin & Dan Benjamin cover CES, wearables, Android tablets, working on tablets, and leaving your laptop at work (intentionally)Kevin & http://5by5.tv/inbeta/81

January 08 2014

15:07

5by5 | Back to Work #115: Invitation to a Blame Party

TOPIC: Fixing the Culture of Meetings http://5by5.tv/b2w/115
01:30

5by5 | The Pen Addict #88: Mollycoddling

In this episode Brad and Myke discuss their stationery resolutions and wish lists for 2014. Many challenges lie ahead in the new year as well as many budget-breaking purchases. Brad has already marked one off the list and the year just began! http://5by5.tv/penaddict/88

January 07 2014

23:59

Beyond the Tech: Building Internet Freedom Tools for Real People

Few hackers will disagree that users are not given enough consideration when building Internet Freedom Tools designed to circumvent censorship and surveillance. But how do we do it? This talk will outline a framework for a user-focused approach to the Development and Impact of Internet Freedom Tools through using ethnography, human-centered design, and the practice of research-based product definition. This talk is intended for developers, researchers, and journalists who seek to understand how better tools can be developed to protect anonymity and provide unfettered access to the Internet. Internet Freedom Tools (IFTs) are developed to solve the technical challenges of anonymity, privacy, security and information access. Focus on these technical challenges rather than the user of an IFT can lead to overlooking the motivations, needs and usability issues faced by user communities. Further, IFTs may solve a technical challenge for users, and yet fall short when it comes to user experience. There is a disconnect that must be remedied for IFTs and the people who use them to realize their full potential. This talk seeks to provide new insights to developers and users in need of knowledge on how they can better address relevant problems, create appropriate solutions and help users with IFTs. This talk will explain to the audience what tools are available for user-focused design. It will also walk through a framework to guide the development of IFTs that is grounded in ethnographic methods and human-centered design, and how this framework is being used to conduct an IFT user community. This work is currently being conducted by SecondMuse and Radio Free Asia through the Open Technology Fund (www.opentechfund.org). ADDENDUM: But, what is "Ethnography"? What are "User Communities"? Ethnography is defined as the study of culture and human motivation through qualitative research. Ethnographic practices complement usability studies by tapping into needs and motivations of people and users to give the "why" behind certain actions observed solely through conducting usability research. This method includes interviews, observing specific behaviors and understanding the material culture and surrounds of a target group. A community is defined as a group of users that can be defined by geography, culture, shared experiences, or shared challenges. User is defined as someone who is currently utilizing a particular IFTs such as Tor, RedPhone, CryptoCat, and/or other privacy, security, anonymity and access enhancing technologies and methodologies created by developers or users themselves. A user may also be defined as a potential user of such technologies and tools. http://events.ccc.de/congress/2013/Fahrplan/events/5550.html Day: 2013-12-30 Start time: 11:30 Duration: 01:00 Room: Saal G Track: Science & Engineering Language: en
23:45

An introduction to Firmware Analysis

This talk gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be really tricky. After that it introduces the necessary tools, gives tips on how to detect the processor architecture, and explains some more advanced analysis techniques, including how to figure out the offsets where the firmware is loaded to, and how to start the investigation. The talk focuses on the different steps to be taken to acquire and analyze the firmware of an embedded device, especially without knowing anything about the processor architecture in use. Frequently datasheets are not available or do not name any details about the used processor or System on Chip (SoC). First the prerequisites, like knowledge about the device under investigation, the ability to read assembly language, and the tools of the trade for acquisition and analysis, are shown. The question "How do I get the firmware out of device X?" makes the next big chapter: From easy to hard we pass through the different kinds of storage systems and locations a firmware can be stored to, the different ways the firmware gets transferred onto the device, and which tools we can use to retrieve the firmware from where it resides. The next step is to analyze the gathered data. Is it compressed in any way? For which of the various different processor architectures out there was it compiled for? Once we successfully figured out the CPU type and we've found a matching disassembler, where do we start to analyze the code? Often we have to find out the offset where the firmware is loaded to, to get an easy-to-analyze disassembler output. A technique to identify these offsets will be shown. The last chapter covers the modifications we can apply to the firmware, and what types of checksum mechanisms are known to be used by the device or the firmware itself to check the integrity of the code. http://events.ccc.de/congress/2013/Fahrplan/events/5477.html Day: 2013-12-27 Start time: 12:45 Duration: 01:00 Room: Saal 1 Track: Security & Safety Language: en
10:30

5by5 | The Pen Addict #2: My Favorite Pens

In this episode of The Pen Addict, Brad and Myke discuss Brad's current favorite pens, elaborate on some of the Glossary terms from Episode 1, and answer reader mail. http://5by5.tv/penaddict/2
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl