-
### Describe the feature
I would like to be able to capture the status of any mitigations that are documented within threat composer
### Use Case
Mitigations are the "What are we going to do about …
-
Propose one or more computational social scientists (as an Issue Comment below) we can invite for our seminar series this year, including a 1-2 sentence defense of why others might want to hear from t…
-
First of all, this is a great initiative. I think all developer teams can save a lot of time and find security more pleasurable to work with if they use this tool.
I have tested it using the gpt4-…
-
We have added a list of brief descriptions of things that are representative of what we're involved in as a team.
[briefs.md](../blob/main/briefs.md)
**👉 Read through the briefs and then add o…
-
> When used as a single HTML file, TiddlyWiki5 allows content to be encrypted using the Stanford JavaScript Crypto Library.
But why not when used with the node server?
-
- [ ] Consider "my data identity" as a first lesson in the DS pathway. Leverage June Ahn's work, along with ["Dear Data"](https://www.youcubed.org/tasks/dear-data/) and Kathi's opening activity in her…
-
Please leave critiques and reviews below.
-
#### Feature Description
##### Context & Background
Currently, the CN on a Consul Connect Leaf Certificate requested through the /agent/connect endpoint follows a quite unique and non-standard s…
-
[We ignore the disaster in the antibiotics market at our peril](https://www.ft.com/content/4da1c6e4-603d-11e9-9300-0becfc937c37) Financial Times article on economics of Antibiotic Research.
-
* Seifried, R.M. and C.A.M. Gardner. 2019. "Reconstructing historical journeys with least-cost analysis: Colonel William Leake in the Mani Peninsula, Greece." _Journal of Archaeological Science: Repor…