• Information Security
  • Singularity
  • Science
  • About

HackingTheUniverse

  • Subscribe by RSS

History of Science & Technology

Era - Electronic

1900 – Pauli – bio
1901 – Fermi – bio
1901 – Heisenberg – bio
1901 – Tarski – bio
1902 – Dirac – bio
1903 – Kolmogorov – bio
1903 – Von Neumann
1903 – Wright brothers flight
1905 – photoelectric effect
1905 – special relativity
1906 – amplifier tube
1906 – Godel – bio
1911 – cloud chamber 1911 - cloud chamber
1912 – Turing – bio
1913 – quantum theory
1915 – general relativity
1916 – Shannon – bio
1918 – Feynman – bio
1922 – Brillouin scattering
1922 – Stern-Gerlach experiment
1924 – wave particle duality
1925 – electron “spin”
1926 – Wave mechanics
1928 – Dirac equation
1930 – Cooper – bio
« Previous Page

Solve the puzzle

crack the puzzle

Enter your email address to subscribe to the content newsletter by email:
Click here to preview the email newsletter

Random Quote

“Painting is just another way of keeping a diary.”


by Pablo Picasso

  • Latest
  • Tags
  • Archives
  • Pages
  • The Singularity is an Ascension
  • Living In The Asteroid Belt – part 6 – Lifestyle
  • Living In The Asteroid Belt – part 5 – Habitats
  • Living In The Asteroid Belt – part 4 – Mining
  • Living In The Asteroid Belt – part 3 – Getting There
  • Living In The Asteroid Belt – part 2 – Geography and Geology
  • Living In The Asteroid Belt – part 1 – Introduction
  • The Space Elevator Concept
  • Variable Ethics
  • 1778 – Davy – bio

3D printing 800-53 AI Artificial Intelligence asteroid Asteroid Belt astronomy Attack Methodology Augmented Reality BioGenetics Computing electronics energy Era - Electronic Era - First Industrial Era - Renaissance era - second industrial Ethics geometry group theory habitat hacking History of Science and Technology InfoSec intelligence Knowledge Engineering light mathematics Nanotechnology news NIST Computer Security Penetration penetration testing physics risk management Robotics Science science fiction SciFi security controls Singularity Space Space Exploration Tools UAV

  • November 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • Information Security
    • Attack Methodology
      • Counter Defense
      • Disrupt
      • Entrench
        • Whoami?
      • Methodology Overview
      • Penetration
      • Pivot
      • Recon
      • Summary
    • Attack vs Defense
      • Attack vs Defense on an Organizational Scale
        • 1 – Introduction
        • 10 – Distributed Denial of Service Attack
        • 11 – Aftermath and Lessons Learned
        • 12 – Concluding Notes
        • 13 – References
        • 2 – Preparation
          • A – Defenders: Policy and Paperwork
          • B – Attackers: Training
        • 3 – Using Google for Reconnaissance
        • 4 – Perimeter
        • 5 – Wireless Network
        • 6 – Bypass
        • 7 – Walk-in
        • 8 – Entrench
        • 9 – Zero Day
    • Cloud Security
    • News
    • NIST Computer Security
      • Authorization (C&A)
      • Configuration Management
      • Continuous Monitoring
      • Disposal
      • Introduction to 800-53 Controls
      • Overview
      • Risk Assessment
      • SDLC Framework
      • Security Control Implementation
      • Security Plans
      • System Characterization
    • Tools
  • Singularity
    • Artificial Intelligence
    • Augmented Reality
    • BioGenetics
    • Computing
    • Energy
    • Ethics
    • Knowledge Engineering
    • Nanotechnology
    • Robotics
    • Singularity General Articles
  • Science
    • History of Science and Technology
      • History of Science and Technology – Era – Ancient
      • History of Science and Technology – Era – Current
      • History of Science and Technology – Era – Electronic
      • History of Science and Technology – Era – First Industrial
      • History of Science and Technology – Era – Middle Ages
      • History of Science and Technology – Era – Prehistory
      • History of Science and Technology – Era – Renaissance
      • History of Science and Technology – Era – Roman
      • History of Science and Technology – Era – Second Industrial
    • Science Fiction
    • Space
      • Asteroid Belt
      • Space Exploration
  • About
    • Omar Fink

Links We Like:

by category

InfoSec

  • NIST SP 800
  • Penetration Testing Framework
  • SANS ISC
  • Security Database
  • Top 100 Network Security Tools
  • US-CERT

other

  • Optimize Survival

Singularity

  • Accelerating Future
  • Blogging the Singularity
  • Cryonics
  • Flexibility Envelope
  • Kurzweil AI
  • Machine Intelligence (MIRI) blog
  • Nanotechnology
  • The Singularity Hypothesis

Copyright © 2019 HackingTheUniverse

Structure Theme