Please enter your username below and press the send button.A password reset link will be sent to you.
If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.
This link recently saved by krisvandenbergh on June 15, 2011
This link recently saved by krisvandenbergh on November 19, 2010
Hector has decided to invest this bounty into hacking tools and devices for a group of people he works with closely (e.g. iPhone Dev Team members, Wii hacker team Team Twiizers, and a few others). They don’t have much expendable income to buy tools and devices to hack, and sometimes this hobby can be a bit expensive, this will be a good investment that will allow them to hack more and newer devices.
This link recently saved by krisvandenbergh on March 18, 2010
There is a vast amount of data available today and data is now being collected and stored at a rate never seen before. Much, if not most, of this data however is locked into specific applications or formats and difficult to access or to integrate into new uses. Public data is often unfortunately held private or needlessly buried behind random, inefficient, and cumbersome interfaces.
The Open Data Protocol (OData) provides a way to unlock your data and free it from silos that exist in applications today, making it easy for data to be shared in a manner that follows the philosophy of Open Data. OData enables a new level of data integration and interoperability across a broad range of clients, servers, services, and tools.
This link recently saved by krisvandenbergh on March 06, 2010
This link recently saved by krisvandenbergh on December 12, 2009
This paper is about how we can prevent the loss of trust and go forward to give Internet users a deep sense of safety, privacy, and certainty about whom they are relating to in cyberspace. Nothing could be more essential if Web-based services and applications are to continue to move beyond “cyber publication” and encompass all kinds of interaction and services. Our approach has been to develop a formal understanding of the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity. Taken together, these laws define a unifying identity metasystem that can offer the Internet the identity layer it so obviously requires.
This link recently saved by krisvandenbergh on July 25, 2009
De open source-beweging is volgens Microsoft in 2001 vergelijkbaar met het 'gratis'-businessmodel dat tot de ondergang vele dotcoms heeft geleid. Een jaartje later is open source in de ogen van Microsoft vergelijkbaar met de alles-opetende Pacman, of zelfs met een kankergezwel.