• Information Security
  • Singularity
  • Science
  • About

HackingTheUniverse

  • Subscribe by RSS

History of Science & Technology

Era - Second Industrial

1800 – voltaic pile (battery)
1802 – Abel – bio
1804 – Jacobi – bio
1805 – Hamilton – bio
1805 – Dirichlet – bio
1807 – Fourier analysis
1809 – Grassman – bio
1811 – Galois – bio
1814 – Sylvester – bio
1815 – Boole – bio
1815 – Geissler – bio
1815 – Lovelace – bio
1817 – gyroscope
1819 – Foucault – bio
1822 – Hermite – bio
1822 – Louis Pasteur – bio
1822 – Mendel – bio
1823 – Betti – bio
1826 – Riemann – bio
1829 – Non-Euclidean geometry
1831 – electromagnetic induction
1831 – Maxwell – bio
1834 – Haeckel – bio
1834 – soliton
1834 – Mendeleev – bio 1834 – Mendeleev – bio
1838 – Jordan – bio
1838 – Mach – bio
1838 – telegraph
1842 – Lie – bio
1844 – Benz – bio
1844 – Boltzmann – bio
1845 – Cantor – bio
1845 – Roentgen – bio
1845 – Clifford – bio
1849 – Klein – bio
1850 – Heaviside – bio
1853 – Lorentz – bio
1853 – Ricci-Curbastro – bio
1854 – Maxwell’s Fish-Eye Lens
1854 – mercury vacuum pump
1854 – Poincare – bio
1855 – vacuum tube
1856 – Tesla – bio
1856 – Thomson – bio
1857 – Tsiolkovsky – bio
1858 – Planck – bio
1859 – Riemann hypothesis
1861 – Engel – bio
1861- Whitehead – bio
1862 – Hilbert – bio
Next Page »

Solve the puzzle

crack the puzzle

Enter your email address to subscribe to the content newsletter by email:
Click here to preview the email newsletter

Random Quote

“A human being is a part of the whole, called by us "Universe," a part limited in time and space. He experiences himself, his thoughts and feelings as something separated from the rest - a kind of optical delusion of his consciousness. This delusion is a kind of prison for us, restricting us to our personal desires and to affection for a few persons nearest to us. Our task must be to free ourselves from this prison by widening our circle of compassion to embrace all living creatures and the whole of nature in its beauty. Nobody is able to achieve this completely, but the striving for such achievement is in itself a part of the liberation and a foundation for inner security.”


by Albert Einstein

  • Latest
  • Tags
  • Archives
  • Pages
  • The Singularity is an Ascension
  • Living In The Asteroid Belt – part 6 – Lifestyle
  • Living In The Asteroid Belt – part 5 – Habitats
  • Living In The Asteroid Belt – part 4 – Mining
  • Living In The Asteroid Belt – part 3 – Getting There
  • Living In The Asteroid Belt – part 2 – Geography and Geology
  • Living In The Asteroid Belt – part 1 – Introduction
  • The Space Elevator Concept
  • Variable Ethics
  • 1778 – Davy – bio

3D printing 800-53 AI Artificial Intelligence asteroid Asteroid Belt astronomy Attack Methodology Augmented Reality BioGenetics Computing electronics energy Era - Electronic Era - First Industrial Era - Renaissance era - second industrial Ethics geometry group theory habitat hacking History of Science and Technology InfoSec intelligence Knowledge Engineering light mathematics Nanotechnology news NIST Computer Security Penetration penetration testing physics risk management Robotics Science science fiction SciFi security controls Singularity Space Space Exploration Tools UAV

  • November 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • Information Security
    • Attack Methodology
      • Counter Defense
      • Disrupt
      • Entrench
        • Whoami?
      • Methodology Overview
      • Penetration
      • Pivot
      • Recon
      • Summary
    • Attack vs Defense
      • Attack vs Defense on an Organizational Scale
        • 1 – Introduction
        • 10 – Distributed Denial of Service Attack
        • 11 – Aftermath and Lessons Learned
        • 12 – Concluding Notes
        • 13 – References
        • 2 – Preparation
          • A – Defenders: Policy and Paperwork
          • B – Attackers: Training
        • 3 – Using Google for Reconnaissance
        • 4 – Perimeter
        • 5 – Wireless Network
        • 6 – Bypass
        • 7 – Walk-in
        • 8 – Entrench
        • 9 – Zero Day
    • Cloud Security
    • News
    • NIST Computer Security
      • Authorization (C&A)
      • Configuration Management
      • Continuous Monitoring
      • Disposal
      • Introduction to 800-53 Controls
      • Overview
      • Risk Assessment
      • SDLC Framework
      • Security Control Implementation
      • Security Plans
      • System Characterization
    • Tools
  • Singularity
    • Artificial Intelligence
    • Augmented Reality
    • BioGenetics
    • Computing
    • Energy
    • Ethics
    • Knowledge Engineering
    • Nanotechnology
    • Robotics
    • Singularity General Articles
  • Science
    • History of Science and Technology
      • History of Science and Technology – Era – Ancient
      • History of Science and Technology – Era – Current
      • History of Science and Technology – Era – Electronic
      • History of Science and Technology – Era – First Industrial
      • History of Science and Technology – Era – Middle Ages
      • History of Science and Technology – Era – Prehistory
      • History of Science and Technology – Era – Renaissance
      • History of Science and Technology – Era – Roman
      • History of Science and Technology – Era – Second Industrial
    • Science Fiction
    • Space
      • Asteroid Belt
      • Space Exploration
  • About
    • Omar Fink

Links We Like:

by category

InfoSec

  • NIST SP 800
  • Penetration Testing Framework
  • SANS ISC
  • Security Database
  • Top 100 Network Security Tools
  • US-CERT

other

  • Optimize Survival

Singularity

  • Accelerating Future
  • Blogging the Singularity
  • Cryonics
  • Flexibility Envelope
  • Kurzweil AI
  • Machine Intelligence (MIRI) blog
  • Nanotechnology
  • The Singularity Hypothesis

Copyright © 2019 HackingTheUniverse

Structure Theme