
No place to hide
Online privacy is a human right. Privacy is a fundamental condition to be free. Snowden has remembered us the extraordinary ability of any human being ...
Online privacy is a human right. Privacy is a fundamental condition to be free. Snowden has remembered us the extraordinary ability of any human being ...
From June 27th to July 15th I was attending to the World Roller Games 2019, the world's largest event comprising all the world championship roller ...
Hace unos años - no demasiados tampoco - cuando los niños eran más pequeños y les sacaba más fotos al día de las que mi ...
Muchas veces hay ciertas situaciones que hacen que me plantee si esto de programar es para mí, sobre todo cuando, despues de un debug largo ...
Who doesn't like the backpacks?, I have to admit that I have a kind of fetich with the backpacks in general and with the everydaycarry ...
Fashion today is rant on about Apple. No matter what they do or what they did in the past, rant is the easiest way. I ...
Si un proyecto me ha llamado poderosamente la atención - llegando incluso a ponerme muy pesado con el tema - en estos últimos años en ...
Creo que desde siempre me ha gustado organizar "cosas". No lo digo como algo bueno, ni como algo malo, sino como algo que sale de ...
Blockchain as technology has evolved rapidly, as new techniques deriving from the proliferation of blockchain projects have emerged. Hence the attempts to understand the present ...
This article will show you how to implement and deploy a smart contract for a crowdfunding campaign use case. The idea of crowdfunding is a ...
Algo tan sencillo y aparentemente inocuo como un punto de montaje puede convertirse en una letal arma de destrucción de paciencia/tiempo. Hay una especie de ...
It's not the end of the year but we're close. This year has been a bit weird, lots of unexpected stuff happened but hey, it's ...
Half of a year is a long time. But time passes, well, time flies. I was forced to learn to change my habits because some ...
Cryptography can be defined as the practice of hiding information and includes techniques for message-integrity checking, sender/receiver identity authentication, and digital signatures. The following are ...
To publish Docker images to ECR, you need to perform the following tasks: Ensure you are logged into ECR Build and tag your Docker image ...