Map öffentlich
[search 0]
Mehr
Download the App!
show episodes
 
Artwork

1
Geomatik, Schlüsseltechnologie für die Zukunft | Video

FHNW, HABG, Hochschule für Architektur, Bau und Geomatik, Institut Vermessung und Geoinformation

icon
Unsubscribe
icon
Unsubscribe
Monatlich
 
Videodokumentationen studentischer Arbeiten zu verschiedenen Themen der Geomatik: Map your World - Kartographiere deine Welt Mobile Mapping ProMeRe Andermatt - Analyse der Raumentwicklung Der virtuelle Globus i3D OpenWebGlobe Map your World - das gehört dazu
  continue reading
 
Artwork

1
Munich Centre for Advanced Photonics

Ludwig-Maximilians-Universität München

icon
Unsubscribe
icon
Unsubscribe
Täglich+
 
Am Exzellenzcluster Munich-Centre for Advanced Photonics (MAP) loten weltweit renommierte Forscherinnen und Forscher aus dem Bereich der Photonik neue Einsatzmöglichkeiten für Photonen aus. Damit leistet MAP einen wichtigen Beitrag zum technologischen Fortschritt, weil Photonen, Photonen- und Teilchenquellen sowie anwendungsbezogene technische Verfahren Schlüsselbestandteile der Technologie des 21. Jahrhunderts sind. Ziel von MAP ist es unter anderem, höhere Intensitäten, eine höhere Frequen ...
  continue reading
 
AKTIV & GESUND: Der Fitness-Booster Podcast Dein Begleiter auf dem Weg zu mehr Fitness und Wohlbefinden. Powered by MAP Bitburg #map #bitburg #fitness #gesundheit #abnehmen #rückenschmerzen #athletik #neuroathletik Dein Begleiter auf dem Weg zu mehr Fitness und Wohlbefinden. Powered by MAP Bitburg #bitburg #fitness #gesundheit #training #map MAP AKTIV & GESUND in Bitburg #bitburg #fitness #gesundheit #training #map Dieser Podcast ist perfekt für dich, egal ob du gerade erst mit deinem Fitnes ...
  continue reading
 
Artwork

1
REWIRED+INSPIRED: Mental Fitness School Podcast

Lilly Beyond, Founder Mental Fitness School

icon
Unsubscribe
icon
Unsubscribe
Monatlich+
 
Hier bekommst du Mut vor Rat. Ratschläge braucht kein Mensch. Wir brauchen mehr Mut in dieser Welt das zu erkennen, was tief in dir ist und wie wir uns damit von den Fesseln des Hamsterrads befreien können. ⭐ Gedankenstrategien ⭐ Time Management Secrets ⭐ Burnout Prävention Host: Lilly Beyond, Founder of Mental Fitness School Lilly ist zertifizierter Life Coach mit 15+ Jahren Erfahrung in Kommunikations-Design und Art Consulting, sowie ein anerkannter Creative Strategist und Authentic Leader ...
  continue reading
 
Loading …
show series
 
The internet cleanup foundation publishes the baseline security of 150.000 domains of 10.000 important organizations in the Netherlands. This talk shows what we've done in 2024 and highlights some of the nice things to come in 2025 maybe spoiling one or two things :) - It had a ton of impact and large banks, internet providers and all kinds of othe…
  continue reading
 
Operational Technology (OT) is vital for industrial processes, yet strategic understanding of OT’s security complexity is often lacking at the executive level. This presentation emphasizes the need for organizations to approach OT as a strategic priority, highlighting its unique challenges—such as legacy systems and non-negotiable uptime—amid risin…
  continue reading
 
This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and more.Ever wanted to become sovereign on the internet? Want to know what its like to run an ISP? Are you a sysadmin that wants to learn more about networking? Then you're …
  continue reading
 
The European electricity network has become a ‘smart grid.’ This offers many opportunities for sustainability but also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy syst…
  continue reading
 
Tijdens Hacker Hotel krijg je de unieke kans om deel te nemen aan Operation Check Mate, een meeslepende interactieve ervaring waarin je zelf in de schoenen van een rechercheur staat. Deze game is ontwikkeld door experts uit het veld en biedt een fascinerende inkijk in de wereld van strafrechtelijk onderzoek.In teams werk je aan een intrigerende zaa…
  continue reading
 
Wat je als 𝘏𝘰𝘮𝘰 𝘊𝘺𝘣𝘦𝘳𝘯𝘦𝘵𝘪𝘤𝘶𝘴 altijd al hebt willen weten: hoe krijg je het voor elkaar dat de 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶s (= niet hackende mens) ein-de-lijk het belang van jouw werk inziet en een beetje meewerkt.Strijk neer op je handdoek en leun achterover, want deze zondagmiddag (Don't Panic. Time is an illusion.) nemen Roxane Kortland en ik je mee hoe je al…
  continue reading
 
Nuclear fusion is a clean safe energy. Fusing hydrogen nuclei to release an enormous amount of energy. This talk will cover:- A recap of the physics that makes fusion work- How to build a fusion reactor at home- How nuclei collide and what is needed to the coulomb barrier- Challenges in how to scale it up and make it generate more power - How far a…
  continue reading
 
In this talk I will show you the theory behind parametric arrays what is involved in making your own low-cost directional speakerParametric speakers are extremely directional speakers that produce audible sound by modulating an audible signal on top of an ultrasonic carrier. Commercial options have existed for a long time but are quite expensive fo…
  continue reading
 
It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport.It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport. We are experts in moving people t…
  continue reading
 
What is an LLM? Can you run it yourself? Can you hack it?This session will explain high-level how an LLM works, how you can run this yourself (maybe for privacy reasons), Coding with LLMs and the hacking possibilities of these AI systems. Expect many demos and hopefully useful tips and tricks, so you can directly try all this stuff out yourself.Key…
  continue reading
 
The Dutch Tax and Customs Administration deals with criminals claiming to be representatives of the organization and contacting the public with phishing emails daily. In this presentation, we will take you into the world of the criminals sending phishing emails and the recipients of the phishing mail. A live phishing demo is included.This presentat…
  continue reading
 
Sociale constructen gebruikt in software context en alles wat daar entertainment mee maakt :)Een interactieve presentatie over waarom beperkingen op je dataset zetten onhandig is.Wat is data?Hoe lang duurt een dag?Hoe lang duurt een uur?Hoe lang is een maand?Wat is een jaartal?Wat is een geboortedatum?Wat is een naam?Hoe lang is een pincode?Waaruit…
  continue reading
 
The summary that's fun for both outsiders and insiders of this gem of a genre. Talk is in Dutch :)I wanted to do another talk, but Hacker Hotel decided to sell branded bomber jacks, which forced my hand as this conference then also needs the talk that goes along with those jackets. During the talk we'll listen to the evolution of a genre using samp…
  continue reading
 
Frank talks about AI, why it all of a sudden is everywhere and what it means.The keynotes of the likes of Microsoft, Google and Apple can all be summarized in 10 words: “A.I., A.I., A.I., Large Language Model, A.I., A.I., GPT, A.I. …“, so no doubt artificial intelligence holds a promise for the future. But what promise? Will A.I. save use or doom u…
  continue reading
 
In The Netherlands, everyone can trust the outcome of elections. That is our mission as The Dutch electoral council.But you don't have to trust us to be able to trust the outcome of elections. Anyone can verify the results and in this presentation, we aim to explain to you which security measures have been taken in the election process here in The …
  continue reading
 
I spent the past 6 years restoring and upgrading the 2 flights of stairs in my almost 100 years old house in my off time, taking into them into the 21st century while I was at it. The result is a standalone extensible system that supports an unlimited number of sensors and can light up to 256 cheap LED strips on a setup that can run completely off …
  continue reading
 
This talk delves into the technical aspects of the Tanmatsu hardware design, the latest creation by the badge team, set to be released alongside the availability of ESP32-P4 chips. It will also form the foundation for the WHY2025 badge. Topics include an exploration of the PCB's high-level design, cost considerations for producing 4000 units, chall…
  continue reading
 
Meshtastic and LoRa, what is it and what can you do with it?LoRa, or Long Range radio, is a technology that operates on freely available frequency bands. Thanks to its unique way of transmitting and receiving signals, it’s not only remarkably resistant to noise but also capable of bridging impressive distances with very little power.One of the most…
  continue reading
 
De geschiedenis en toekomst van de nederlandse hackercampsKom mee door deze geschiedenis les ter voorbereiding van het jubuleum kamp, WHY2025!Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/NCKS3X/Von Boekenwuurm
  continue reading
 
Since the start of the war, our community has risen to help friends in Ukraine in many different ways. Roman Kniaziev is coming over from Kharkiv to explain how he works with all the volunteers of ETOC to support his country. Even though the news can be overwhelming, everyone can help. This talk shows you how.The IT community in Kharkiv is doing th…
  continue reading
 
CubeSats are small satellites comprised of 10x10x10cm "units" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a platform and why?CubeSats are small satellites comprised of 10x10x10cm "units" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a p…
  continue reading
 
With the support of the Dutch embassy in Tokyo, I have researched Coordinated Vulnerability Disclosure (CVD) in Japan for DIVD. Japan’s governmental policy on CVD dates back to 2004. Although Japanese criminal law and jurisprudence do not allow for large-scale intrusive vulnerability research and disclosure, Japanese institutes help citizens disclo…
  continue reading
 
The total number of vulnerabilities continues to rise. If we had to rely on just CVSS for prioritizing those vulnerabilities, we have an enormous hard time to remediate all of them. In this talk, we’ll explore the critical gaps in CVSS-based prioritization and discuss why factors like exploitability, asset criticality, and real-time threat intellig…
  continue reading
 
This workshop is especially for all attendants who are not Dutch natives. In an exact and logical manner I will guide you through the syntax and semantics of the Dutch language, from sounds (the famous 'ggh' and vowel inventory) to gender of nouns and word order. There will be simple illustrations to help you get a grip on the language and bluff yo…
  continue reading
 
This talk describes the computer and its interfaces the DSKY (DiSplay-KeYboard) on board the Apollo missions that got us to the moon and back.I will point out several modern sources of information about this historical project and how it entertains lots of people to this day, including several emulation projects.Back in the period 1962 to 1969 the …
  continue reading
 
The Election Council is working on Abacus, the tabulation software for the elections. Come to this workshop to try your hands on the software in a production-like setting and learn more about the choices and concepts behind it.The Election Council is working on Abacus, the tabulation software for the elections. This workshop will show you how it wo…
  continue reading
 
"AiTM: Lessons Learned" dives into the evolving threat of AiTM attacks. Our presentation highlights the transition from basic phishing tactics to sophisticated methods that compromise organizational security. The presentation outlines the journey from oldschool phishing attacks, to phishing framework like UADMIN, and the introduction of tools like …
  continue reading
 
How to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.How to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.Other topics are:* Reading and analysing logging* Capture a scrolling text* Query of classes etcLicensed to the public under http://creati…
  continue reading
 
I have been struggling with my weight for over 25 years. After reading the book : The Obesity Code" everything clicked. Since I have lost 13 kg within 6 months. The great thing about this is that it is effortless.In this workshop we start with the theory of gaining and loosing weight. After that we are going to look at recipes for individual partic…
  continue reading
 
De opkomst van geavanceerde technologie en kunstmatige intelligentie heeft ongekende mogelijkheden gecreëerd, maar ook een sluimerend probleem blootgelegd: de validatiecrisis. In deze lezing neemt Brenno de Winter, gerenommeerd cybersecurity-expert en auteur van De Validatiecrisis, u mee in de wereld van misleidende aannames, ongeteste technologie,…
  continue reading
 
This you really want to know. Huib has been responsibly disclosing the Secret Services, criminals and hackers. Now we turn it around: ask Huib anything. Chris van ‘t Hof will guide the conversation.Books: 2024 “Dit wil je echt niet weten”, 2019 “Het is oorlog en niemand die het ziet”, “There's a War Going On But No One Can See It” - Its war and eve…
  continue reading
 
Openingstalk by Dimitri opening Hackerhotel 2025In this openingstalk i will open Hackerhotel 2025 and thank all people that helped me and explain about how this Hackerhotel 2025 organisation went.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/EMVMAX/…
  continue reading
 
How to make an Android App for Android Auto, a demo of the MapLibre sample app, and stories about Flitsmeister.FrankkieNL has worked on the Android Auto (and Automotive) version of the Flitsmeister app.This navigation app uses MapLibre to render a map on the Car screen.During this talk, we will discuss how this works and how you can create your own…
  continue reading
 
You've maybee seen the raking robot that got a CEH (Certified Estetisch Harker) certificate, the Telex linked to Twitter/Telegram or the ASCII foto booth. They are all made by me. If this talk gets accepted I will do a deep dive on these three contraptions and what I learned building them.Beside Schuberg Philis, DIVD, attending the farm and keeping…
  continue reading
 
In today's rapidly evolving digital landscape, the increasing frequency and the scale of security incidents pose significant challenges for incident response teams. The traditional approach, rooted in digital forensics, is no longer sufficient nor is it efficient enough. It's time for a shift towards an automated incident response strategy that com…
  continue reading
 
A short introduction to cryptography, its past, present and future for the not yet fully initiated.Many talks mentioned cryptography somewhere along the presentation and everybody just nods. But how many people actually know the insights of cryptography? Why some things work and some things don't? During this talk I will explain the difference betw…
  continue reading
 
A year later, we are back at the wonderful company Acme where nice people make beautiful things.This time we will follow up on that and tell you how the company can improve their own maturity and security levels as explained in the standard.A year later, we are back at the wonderful company Acme where nice people make beautiful things. How did they…
  continue reading
 
Lockpicking is a sport where you open locks without force and mostly without keys. While doing this activity nothing much can be seen of the actual process. In stead you need to rely on sound and feel (tactile feedback from the lock). Therefor a lot of people (including us) think a visual impaired person could be rather good at this (as they are mo…
  continue reading
 
Motivationsvortrag über verschiedene Microcontroller und Abstraktionsfähigkeit durch höhere ProrgammiersprachenAssembler->C->Rust, Arduino, STM32, ESP32https://www.ulm.ccc.de/ccc/chaosseminar/2025_02_embedded-software-entwicklung/https://wieerwill.dev/about this event: https://www.ulm.ccc.de/ccc/chaosseminar/2025_02_embedded-software-entwicklung/…
  continue reading
 
🇬🇧 English VersionOpen Politics – Collaborative Tools for Open Political Data Politics is complex, and making sense of it requires access to good information. The Open Politics Project is working on and operationalising open-source tools that help analyse political structures, decisions, and developments—so that journalists, researchers, activists,…
  continue reading
 
Let's join in a quiet moment to bid farewell to the chaotic wonderland that has been 38C3 and prepare ourselves for the harsh reality outside.Gather round and take a deep breath and enjoy the unique atmosphere before you will feel the spirit again at the next hacker event close to you.Licensed to the public under http://creativecommons.org/licenses…
  continue reading
 
This talks gives a behind the scenes on how the infrastructure side of the event is done.A lot of teams help to make this event happen. This talk gives them the opportunity to show you what they do and how they do it.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://events.ccc.de/congress/2024/hub/even…
  continue reading
 
Wetter- und Notfallwarnungen empfangen zu können kann Leben retten. Nutzende, die ihre Privatsphäre nicht Google oder Apple ausliefern möchten sollten dabei nicht im Nachteil sein. Wir berichten über den aktuellen Stand der FOSS Entwicklung und allerlei Beobachtungen rund um Notfallwarnungen.Die Flutkatastrophe vom Juli 2021 hat schmerzlich bewusst…
  continue reading
 
Der IT-Sicherheitsalptraum-Rück­blick: Manchmal belustigend, zuweilen beunruhigend, aber mit Ausblick.Es ist wieder ein Jahr vergangen und niemand ist von einem Smartmeter erwürgt worden: Ist überhaupt etwas Berichtenswertes passiert? Und wenn nein, wird es denn nächstes Jahr wenigstens schlimmer?Wir betrachten das vergangene Jahr, versuchen Muster…
  continue reading
 
Ihr wolltet schon immer wissen was der „Morgenthau-Plan“ mit Kreisverkehren und „Schönwetterfreizeitsportgeräten“ zu tun hat? Dann lasst mich euch mitnehmen in die wundersamen, obskuren und humoristisch wertvollen Untiefen eines lokalen Nachrichtenportals. Was kann die interessierte Beobachterin von außen über das System lernen? Welche Werkzeuge br…
  continue reading
 
This talk examines philosophical, legal, and ethical questions of the merging of human minds with intelligent machines through Brain-Computer-Interfaces, provides an overview of current debates and international regulatory development - and what might be at stake when technologies increasingly access the human brain.Human minds and machines, or org…
  continue reading
 
Ever wondered what data is stored inside DB print-at-home train tickets or those in your local transport association's app? Join me for the deep dive into digital railway ticketing you didn't know you needed.After getting my shiny new Deutschlandsemesterticket from University I was so annoyed with the quality of the SaarVV app that I set out to put…
  continue reading
 
Gaining a reasonable level of trust on the firmware that runs your everyday activitiesCorebootable or not corebootable, that is the question.The nerdiest nerds already corebooted their old X230 ThinkPads... but what about your new ThinkPad, or even your gaming rig? Well, Intel has a trick called the "BootGuard" inside the Management Engine.It is su…
  continue reading
 
I'll introduce the technology underlying bluetooth trackers from Apple and Google, and will describe and show what can actually be seen on the air (using a hackrf/rad1o for example).This is part demonstration of what is possible right now, part explanation of the underlying principles, and part invitation to would-be hackers to make creative use of…
  continue reading
 
Loading …

Kurzanleitung

Hören Sie sich diese Show an, während Sie die Gegend erkunden
Abspielen