405
U
Property:Has description
From SHA2017 Wiki
This is a property of type Text.
Pages using the property "Has description"
Showing 25 pages using this property.
S | |
|---|---|
| Session:KiCad-basics Workshop + | Want to learn how to use KiCad? This workshop will make a walk trough starting with the schematic design and going trough until the gerber export of the finished project. + |
| Session:Kombucha is Easy + | You will learn how to grow kombucha SCOBY making a lovely probiotic drink for yourself. + |
| Session:KubernetesDockerClusterWorkshop + | ''Learn how to deploy docker application on a Kubernetes cluster''<br /> <br /> You've probably heard lots about '''Docker'''. Now Docker alone is useful, but to deploy it you are better off using an orchestrator like '''Kubernetes'''. This workshop will tell you how to install one on your laptop, write your own yaml files, and learn the basics on how to use a kubernetes cluster.<br /> <br /> This workshop will be given twice<br />(both identical):<br /> Day 2: sat 5-Aug, 19:30 - 21:30<br /> Day 3: sun 6-Aug, 19:30 - 21:30<br /> + |
| Session:LED TSHIRT UPCYCLING + | Pimp up your existing clothing for SHA2017 with LEDs - no programming necessary or soldering - instead we use sewing! Bring your own clothing and I will teach you about what is an e-textile and then you can create your own illuminated fashion tech on the spot! Kids welcome with adult supervision. This class is DAILY starting Aug 5th until Aug 8 at 11am in the Hardware Hacking Area + |
| Session:LEVELZ-23 + | we will play aggro drum and bass, if you're not familiar with the style - please come and talk to us come on down and get your levels checked howling encouraged -- STRICTLY NO MCs -- MCs on rotation^H^Hmushrooms: - MC Ruinit - MC Don't bother - MC Tryharder - MC Escher + |
| Session:LearnToSolder + | Learn to Solder! A large variety of way cool kits are available, all designed for total beginners to complete successfully -- and intriguing enough for the total hardware geek. <span style="color:orange">'''''This ongoing workshop will be happening concurrently with lots of other way cool workshops<br />at the Hardware Hacking Area!'''''</span> + |
| Session:Let's talk in private, introduction to GPG and VPN + | Let's talk in private, introduction to GPG and VPN + |
| Session:Lora Hacking + | Just have some fun with Lora. + |
| Session:MadTeaParty + | Artists and rabbits join for madness and tea, in a cozy corner yet to be found. Feel free to bring tea and your fancy hat. + |
| Session:Make aluminium profile connections + | Quick workshop where you learn how to make sturdy aluminium profile connections. Always handy to know. + |
| Session:Medical Device Security + | find me to discuss Medical Device Security call DECT 5001 + |
| Session:Mesh Networks in Brasil + | “Free Digital Territories” is an artistical research project focusing the exchange of the work by free network communities in Brazil and Germany. 2017 we spoke to people active in free WiFi communities as the Casa dos Meninos Sao Paulo, where mesh networks support also education, the COOLAB which is funded by Mozilla to bring the idea forward, the Sempreviva Organização Feminista (SOF) is planning a Meshnetwork, to support farmer women in Vale do Rebeira, the NGO „Article 19“, which is engaged for the expression of free speach. And we spoke to Flávia Lefèvre, member of the Brazilian Internet Steering Committee, who esplained us the situation of internet in Brasil. In this talk I want to give you a summary about the meetings and our further plans. Time: Day 3 @2pm Duration: 30min + |
| Session:Missing Maps Marathon: validation + | Come help map Malawi, and validate the work of other mappers + |
| Session:Mobile World + | Digital forensics could be very challenging when you need to work with mobile devices. They are far more difficult to investigate than PCs or Macs, and, at the same time, they are connected with many different cloud services. We’ll talk about new extraction and analysis programs, as well as cloud technologies + |
| Session:Modern Digital Forensics analysis, where to find evidences + | In the modern interconnected world it’s not simple to find where digital evidences are. They can be found on devices (both PCs and mobiles), on virtual machines, in the cloud. We’ll discuss about modern investigation techniques, OSINT, and how to correlate information from different sources to trace where the evidences could be found. + |
| Session:Monitoring Government Surveillance Capabilities by means of Transparency tools + | This project is a concept to exploit the availability of public procurement data sets, required by anticorruption transparency laws, to discover government surveillance capabilities. We'll present early findings of a mixed-strategy approach, based on transparency and privacy activism, to uncover government capabilities analyzing procurement data of Ministry of Interior, Justice and Defense that are allowed by law to buy and use surveillance products and services. This project will present manifold outcomes, such as the mapping of surveillance capabilities, expenditures, governmental project code names, providers and peculiar participants of surveillance related tenders. The project will move forward exploiting the new FOIA laws by asking for:<br /> - all invoices of each company that we found out selling surveillance technologies to the government<br /> - all technical and economic offers of all the contractors related to surveillance technologies<br /> In this way, we’ll try to shed light on the use of surveillance technologies providing a public database of knowledgeable information that can help to hold governments accountable for violations of human rights. + |
| Session:Morse Code workshop + | Communicate by morse code. De morse key has to made by your self. All materials are available and included in the workshop. number of participants 7 (at once) last workshop 7/8/17 15:00 lt + |
| Session:Music Synthesizer Meetup + | Get-together to show our music synthesizer projects, and talk about how they work. All are welcome to learn and share! + |
| Session:My own system + | Modern Personal Computer are migrating to an Always-on paradigm. We use cloud account to authenticate, Cloud drives and services, software houses want to collect more and more personal data. The simplest solution could be to choose an alternative operating system (like GNU/Linux or *BSD) and simply ignoring the world which is changing. Otherwise you can begin an hardening process and try to balance new Technologies and a resonable level of security. It's challenging but you can do it. Furthermore It's a way to build an antiforensics system + |
| Session:New challenges + | PCs and Macs are changing. They are inheriting many features from the mobile devices. They use cloud accounts, SSDs, cryptography, always-on and connected-stand-by. These features are challenging and are changing extraction and analysis techniques. Now it’s not more possible to simply acquire an hard drive and then perform an off-line investigation. You have to mix and match different approaches. + |
| Session:Noise + | Effects of amplified noises on the general sleep behavior of homo sapiens after midnight + |
| Session:Open Molecular Cooking Night + | Open Molecular Cooking Night is the perfect place to put a molecular twist on some of your favourite recipes. + |
| Session:OpenStreetMap Mapping Party + | During the camp, the Maptime village will organize a small OpenStreetMap Mapping Party. We will head out into the forests surrounding the camp and see if there is any information we can add to the map. On return in the camp, we will add the data directly to OpenStreetMap using the iD or JOSM editors. Join us if you want to learn how to edit OpenStreetMap, or if you simply would like to have a hike in the nature around the camp. + |
| Session:OpenStreetMap.org: cartography development + | Openstreetmap is a map of the world, created by people like you and free to use under an open license. The focus of this talk will be on the development of the cartographic stylesheet used on OpenStreetMap.org. + |
| Session:Organizational Security for Human Rights Defenders in the Global South + | Organizations defending human rights in what is referred to as the Global South -- what some prefer to call, the developing world -- have to deal with lack of resources in the face of intrusive surveillance and interception from governments. How can they protect their data, either at rest or in transit? How can they protect the information entrusted in them by their constituencies? This workshop is meant to come up with a practical manual that can be used by those organizations to learn how to secure their information so that they can stop worrying about that and get busy doing their primary job: protecting human rights. + |