Sublime
An inspiration engine for ideas
David Schapiro
@davids
destination. This discovery protocol can be a source of attack, which will be discussed in Part II of the book.
Douglas Jacobson • Introduction to Network Security (Chapman & Hall/CRC Computer and Information Science Series Book 19)
Paul Steckler
@bricin

The Argument Analyst @tana_inc Template is OUT🚀
This is the product of our collaboration with
@francis_miller
It embeds Francis' brilliant framework
making it immediately applicable.
With an AI agent we built you can analyze your own... See more
Michael R. Barnard
@michaelrbarnard
The "Blind Pig" was made famous by Phil Jackson's (Tex Winter) Triangle Offense
But the best part is it's actually very easy to implement
Just make sure you only use it when:
(A.) Someone is being heavily denied on your team (e.g. face guard)
(B.) B... See more
Matt Hackenbergx.comMaksim Pecherskiy
@maksim
D Newberger
@dbn
Melih Efeoglu
@melih