richardkmiller / Richard

There are no people in richardkmiller’s collective.

Huffduffed (173) activity chart

  1. Security Now! Transcript of Episode #249

    Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week’s major security events and discuss questions and comments from listeners of previous episodes.

    They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world ‘application notes’ for any of the security technologies and issues we have previously discussed.

    https://www.grc.com/sn/sn-249.htm

    —Huffduffed by richardkmiller one month ago

  2. Security Now! Transcript of Episode #247

    Security Now! Weekly Internet Security Podcast: Steve and Leo continue with their "fundamentals of computing" series this week, building upon all previous installments, to explain the details of multi-threading, multi-tasking, multi-processing, multi-core … the "multi"-verse of modern computing.

    https://www.grc.com/sn/sn-247.htm

    —Huffduffed by richardkmiller one month ago

  3. Security Now! Transcript of Episode #242

    Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week’s major security events and discuss questions and comments from listeners of previous episodes.

    They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world ‘application notes’ for any of the security technologies and issues we have previously discussed.

    https://www.grc.com/sn/sn-242.htm

    —Huffduffed by richardkmiller one month ago

  4. Security Now! Transcript of Episode #241

    Security Now! Weekly Internet Security Podcast: In this fourth installment of Steve’s "How Computers Work" series, Steve explains the operation of "hardware interrupts" which, by instantly interrupting the normal flow of instructions, allow computers to attend to the needs of the hardware that interacts with the outside world while they are in the middle of doing other things.

    https://www.grc.com/sn/sn-241.htm

    —Huffduffed by richardkmiller one month ago

  5. Security Now! Transcript of Episode #240

    Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week’s major security events and discuss questions and comments from listeners of previous episodes.

    They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world ‘application notes’ for any of the security technologies and issues we have previously discussed.

    https://www.grc.com/sn/sn-240.htm

    —Huffduffed by richardkmiller one month ago

  6. Security Now! Transcript of Episode #239

    Security Now! Weekly Internet Security Podcast: After a significant security news update, Steve and Leo continue their description of the operation of computers at the raw hardware level.

    This week Steve explains why and how computers have multiple accumulators, and also how a computer’s "stack" operates and why stacks have become a crucial component of all modern computers.

    https://www.grc.com/sn/sn-239.htm

    —Huffduffed by richardkmiller one month ago

  7. Security Now! Transcript of Episode #238

    Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week’s major security events and discuss questions and comments from listeners of previous episodes.

    They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world ‘application notes’ for any of the security technologies and issues we have previously discussed.

    https://www.grc.com/sn/sn-238.htm

    —Huffduffed by richardkmiller one month ago

  8. Security Now! Transcript of Episode #237

    Security Now! Weekly Internet Security Podcast: A feature present in the earliest commercial computers, known as "indirection," has proven to be necessary, powerful, beneficial - and amazingly dangerous and difficult for programmers to "get right."

    This week, Steve and Leo examine the Power of Pointers and why, even after all these years, they continue to bedevil programmers of all ages.

    https://www.grc.com/sn/sn-237.htm

    —Huffduffed by richardkmiller one month ago

  9. Security Now! Transcript of Episode #236

    Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week’s major security events and discuss questions and comments from listeners of previous episodes.

    They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world ‘application notes’ for any of the security technologies and issues we have previously discussed.

    https://www.grc.com/sn/sn-236.htm

    —Huffduffed by richardkmiller one month ago

  10. Security Now! Transcript of Episode #235

    Security Now! Weekly Internet Security Podcast: After starting at the very beginning two weeks ago by looking at how resistors and transistors can be used to assemble logical functions, this week Steve and Leo use those functions to build a working digital computer that understands a simple but entirely useful and workable machine language.

    https://www.grc.com/sn/sn-235.htm

    —Huffduffed by richardkmiller one month ago

Page 2 of 18Newer Older