Visiting DeepSec 2009 confirmed my impression from last year that speakers who are using their hacker nom-de-guerre are most likely hubristic buffons who re-tell old stuff in overblown rhetoric.
Categories
Visiting DeepSec 2009 confirmed my impression from last year that speakers who are using their hacker nom-de-guerre are most likely hubristic buffons who re-tell old stuff in overblown rhetoric.
I like this track. Nice and compact and the trains don’t end up going always the same way.
The IETF Meeting started today in Hiroshima (without me), the speermint session is tomorrow at an ungodly hour with respect to CET, but the real news is somewhere else: JD Rosenberg left Cisco and joins Skype. and Jonathan and Cullen published a new VoIP interconnection idea. Their analysis is similar to mine, but their solution […]
This time, I decided not to use the bridge pieces. The kids (especially Elena) always push the tracks around a bit and thus destroy the bridges. That leads to loud complaints and need parental repair jobs. So, this time: No bridges. I ran out of switches, thus the long loop at the top.