background preloader

To Curate 3

Facebook Twitter

Internet. Understanding Data. Semi automated... Idées à la con (mais on ne sait jamais) Technomancy. TICS. BibSonomy :: home. Chris Blackwell's Domain. Jeniffer Thompson - Author Websites, Internet Marketing Consultant - home. Serious Flaw Emerges In Quantum Cryptography. The problem of sending messages securely has troubled humankind since the dawn of civilisation and probably before. In recent years, however, physicists have raised expectations that this problem has been solved by the invention of quantum key distribution. This exploits the strange quantum property of entanglement to guarantee the secrecy of a message.

Entanglement is so fragile that any eavesdropper cannot help but break it, revealing the ruse. So cryptographers can use it to send a secure key called a one time pad that can then be used to encrypt a message. If the key is intercepted, the sender simply sends another and repeats this until one gets through. So-called quantum key distribution is unconditionally secure–it offers perfect secrecy guaranteed by the laws of physics. Or at least that’s what everyone thought. For example, lasers that are supposed to send one photon at a time can sometimes send several and this allows information to leak to an eavesdropper.

Here’s the problem. Research Enterprise | Technology transfer, intellectual property, and cockroach living. Radical Conceptual Innovation In After Virtue, Alasdair McIntyre points out an argument made by Karl Popper–that new technology cannot be predicted with any specificity: Some time in the Stone Age you and I are discussing the future and I predict that within the next ten years someone will invent the wheel. “Wheel?” You ask. “What is that?” McIntyre sums up: “The notion of the prediction of radical conceptual innovation is itself conceptually incoherent” (93). Building Pillar One: Freedom To Innovate Of the seven pillars of university new innovation practice, freedom to innovate is the most important. Equitable Sharing Rather Than Compulsory Ownership The default premise of university invention management was “equitable sharing.”

The Future is Uncertain, and the Exit is not Always Near Pitchbook is out with figures for private equity exits in 2013. Highlights include–it’s taking longer to get to a private equity exit, but Q4 of 2013 was “stellar” with $59b on 192 exits. Shocking, Isn’t It? Technology and Programming News. Dot Org • SecureIndex. Free Vectors & Graphics for Download. Automate your Dropbox. Flash. Widgetbox.

Keeping your Mac locked down: a Mac OS X security primer: Page 1. Apple's approach to security can be a little bewildering at times. It's a well-trumpeted aspect of the OS, marketed in detail on the website. Mac OS X has integrated smartcard support and Apple has certified the OS under the Common Criteria guidelines; a section of Apple's developer site is devoted to the subject of security. At the same time, Apple didn't offer cryptographically signed software updates until its hand was forced in July 2002. The company is notorious for boiling down release notes for software updates to "provides bug fixes and security updates" (although the separate mailings posted to the security-announce list do tend to offer a little more detail).

While other Unix distributions tend to patch holes in open-source code relatively quickly, Apple sometimes delays rolling out a security fix in the open-source components of Mac OS X for months or even years. The phrase "security through obscurity" gets tossed around from time to time when discussing Mac OS X. Mac OS X: Rebuild Your Mac with 20 Useful Downloads. Hacker Factor: Gender Guesser.

The words you use can disclose identifying features. This tool attempts to determine an author's gender based on the words used. Submitted text is evaluated based on two types of writing: formal and informal. Formal writing includes fiction and non-fiction stories, articles, and news reports. Informal writing includes blog and chat-room text. (Email can be formal, informal, or some combination.) You should view the results based on the appropriate type of writing. About Gender Guesser In 2003, a team of researchers from the Illinois Institute of Technology and Bar-Ilan University in Israel (Shlomo Argamon, Moshe Koppel, Jonathan Fine, and Anat Rachel Shimoni) developed a method to estimate gender from word usage.

A simplified version of this work was implemented as the Gender Genie. This Gender Guesser system is heavily based on the Gender Genie. (Oh yeah, and Gender Guesser is completely implemented in JavaScript. A few quick notes: The system generates a simple estimate (profiling). PDF gratuits : des PDF gratuits pour tous ! Basics of APA Style. Alojamiento web. Tinkercad. Technology. FTP Client. Geek meditation session. The Joy of Tech is a comic about technology and pop culture, created by Nitrozac and Snaggy, and updated three times a week. We like to feature the people and events that are making today's tech news. We've been making comics on the web since early 1999, and The Joy of Tech just celebrated its 10th anniversary.

We're very proud to be featured regularly on places like AllThingsD (from the people who publish The Wall Street Journal), Bloomberg Businessweek, Macworld UK magazine, Folha in Brazil, and others, both on the web and in print. We currently live on Vancouver Island, Canada, where we have a lovely perspective of the silicon valleys to the south. We make The Joy of Tech using Apple computers, mostly on our MacBook Pros, running Mac OS X Snow Leopard.

We use software from Apple, Adobe, BBedit, OpenOffice.org, and others, including Microsoft (yep, we do use Microsoft Office for Mac on occasion). Nitrozac uses a Wacom tablet to draw her illustrations. The evolution of the web. Expressing Technology: A Roundtable With Sir James Dyson | Epicenter  Sir James Dyson at Wired's NYC office. Photo: Dave Mosher/Wired.com On Wednesday, Sept. 14, Wired hosted a roundtable with Sir James Dyson at our New York offices. Dyson and his staff began by showing off their new vacuum cleaner (the DC 41) and Dyson Hot, a new fan/space heater, which was being introduced later that day. We asked Sir James questions about every aspect of emerging and commercial technology, ranging from intellectual property and education reform to the overlap between Steve Jobs’ design philosophy and his own.

We learned (among other things) why research and development in battery technology and artificial intelligence are critical to the future of household cleaning, and why it’s harder to sell high-end vacuum cleaners in China and Brazil. Wired’s interviewers included Steven Levy, John Abell, Jason Tanz, Dave Mosher and Tim Carmody. Dawn Lim, Dave Mosher and Tim Carmody transcribed the conversation. On becoming the company’s public face and namesake.

Internet Encephalography : Art of Failure. Apptastic. Botnet TDL4. Botnet TDL4 Cette news m'a fasciné... La société Kaspersky a mis au jour un réseau de botnet du nom de TDL4 (ou TDSS) de plus de 4,5 millions de machines. D'après l'éditeur d'antivirus, TDL4 a véritablement été conçu pour régner en maitre sur ses machines grâce à : Un système d'affiliation qui permet de rémunérer les gens qui installent (volontairement) ce malware sur les machines d'autres personnes (pas vraiment au courant). Ça rapporterait entre 20 et 200$ pour les 1000 installs. Bref, un beau petit joujou qui fait mal et qui est réparti dans les pays de la manière suivante : TDL4 est utilisé pour collecter des données personnelles (accès à des serveurs, n° de carte de crédit, vol d'identité...etc) mais aussi pour lancer des attaques Ddos...etc.

Pfiou ! [Source] Vous avez aimé cet article ? Le L∞p. Deep Web Research 2010. Bots, Blogs and News Aggregators is a keynote presentation that I have been delivering over the last several years, and much of my information comes from the extensive research that I have completed over the years into the "invisible" or what I like to call the "deep" web. The Deep Web covers somewhere in the vicinity of 1 trillion pages of information located through the world wide web in various files and formats that the current search engines on the Internet either cannot find or have difficulty accessing. The current search engines find about 200 billion pages at the present time of this writing. In the last several years, some of the more comprehensive search engines have written algorithms to search the deeper portions of the world wide web by attempting to find files such as .pdf, .doc, .xls, ppt, .ps. and others.

This Deep Web Research 2010 article is divided into the following sections: ARTICLES, PAPERS, FORUMS, AUDIOS AND VIDEOS (Current and Historical) Metadata? L’attaque de l’année ! Même dans des situations où on pense que son système de sécurité est infaillible, les hackers font preuve d'une imagination sans limite. Dernier exemple avec la société Netragard qui a pratiqué un audit chez l'un de ses clients, dont le système informatique était hyper sérieux, avec tout un tas de règles très strictes sur l'utilisation des réseaux sociaux, des téléphones, et sur l'accès physique aux ordinateurs.

Et pourtant, Netraguard a réussi sans se déplacer à avoir accès à un ordinateur de l'entreprise (et donc à l'intranet et à tout le reste...). Comment ? Grâce à une souris "Cheval de Troie" qui a été modifiée pour contenir un micro contrôleur s'activant 60 secondes après que la souris soit branchée sur l'ordinateur, et capable de "taper" des choses aux clavier... Enfin, plus exactement, d'envoyer des signaux correspondants à des touches de clavier. Bel exploit en tout cas !!! Allez, hop hop hop, on démonte tout ce qu'on reçoit à partir d'aujourd'hui !

Comment ça, "non" ? Planet RDF. Socrata. F.lux: software to make your life better. Application Portal. NordForsk aims at bringing together prominent research groups in order to strengthen and increase the quality of and collaboration within research and research training. It is important that PhD students and young researchers participate actively in the network. A Researcher Network should aim at establishing joint research training in a given field, consolidate research as a basis for joint Nordic, European or international projects, and thereby establish excellence in its field of research.

Thus, the intention should be to continue the established collaboration beyond the grant period. NordForsk encourages research cooperation between the Nordic and Baltic countries in the networks, and according to the Guidelines for the Nordic Council of Ministers' Nordic-Baltic cooperation 2009-2013, the cooperation is a partnership on equal footing. Cleverbot.com - a clever bot - speak to an AI with some Actual Intelligence? Fry, Ben. Zamzar. 7 outils indispensables de ton PC que tu n'utilises jamais. Bon, j'exagère, tu en utilises sûrement au moins un. Et si tu es un bon élève, peut-être plusieurs. Mais pas tous, ou pas régulièrement. Sans compter que bon nombre de tes proches n'en ont peut-être jamais entendu parler. Et pourtant... ces quelques outils peuvent te sauver la vie... enfin, au moins ton PC et tes données, c'est déjà pas mal.

(n.b. : les exemples cités et les captures d'écran ci-dessous concernent Windows, mais la plupart de ces outils sont aussi disponibles sous Mac et Linux. Que les utilisateurs bien informés de ces deux systèmes se manifestent en commentaire Programme de sauvegarde Imagines la scène : tu veux allumer ton PC un matin, pour terminer ce super rapport qui t'a demandé des heures de travail, consulter ta collection de photos de soirées que tu accumules depuis des mois, ou finir la partie de ton jeu préféré où tu as enfin atteint le dernier niveau... et là... plus rien, ton PC ne démarre plus, le disque dur est mort.

Assez de cette vision d'horreur ? Trois outils pour vous aider à faire du contenu unique sur Internet. Tout le monde le sait pour émerger dans les résultats des moteurs de recherche il faut de la pertinence mais aussi de l’unicité. Produire du contenu unique est essentiel et parfois il faut s’aider de quelques outils pour être encore plus différent dans la rédaction de votre article. Voici trois petits outils à mettre en favori et à utiliser selon le besoin. Le premier est un dictionnaire de synonymes proposé par le laboratoire CRISCO de l’Université de Caen. Vous mettez un mot l’outil vous proposera des synonymes classés par pertinence.

Le second outil est un outil pour calculer le taux de similarité (appelé aussi duplicate content) entre deux textes (votre source par exemple et votre article). Très simple aussi, il est basé sur les algorithmes Shingles pour définir un taux de similarité entre les deux textes (méthode utilisée par les moteurs). Un bon moyen de vérifier le caractère unique de votre article versus un autre site (source ou repreneur de votre l’information). Removing Your Personal Information From Google. As our culture continues to move online, personal information about us that previously may have only been seen by our friends and family is increasingly shared in public spaces on the internet. What can you do if you search for your name on Google and find information you’d rather keep private? Or find yourself or home in Google Street View and want it blurred? Read on for instructions on how to get it removed. NOTE: If you want content removed from Google that’s located on a site that you do own, see Removing Pages from Google: A Comprehensive Guide for Content Owners for details.

Why Google Generally Won’t Remove Your Personal Information Google’s core product, web search, simply indexes pages on the web and makes them available to searchers. Since Google doesn’t control the information on those pages, they will generally only remove them from their index if the site owner removes the pages from the site or uses standard methods of blocking the content from search engines. Le Tekos. The Daily WTF: Curious Perversions in Information Technology. My Favorite Smallware - StumbleUpon. Books. Barcelona, centro neurálgico de las apps. El mundo de las aplicaciones para smartphones está en plena efervescencia. Las hay de todo tipo. En este escenario de espectacular crecimiento, los servicios de las ciudades son uno de los ámbitos más activos y Barcelona se quiere posicionar como uno de los actores más dinámicos, tanto en la creación como en el papel de territorio privilegiado para la experimentación de nuevas apps.

La capitalidad mundial del móvil entre 2013 y 2018 es un acicate que la administración, los emprendedores y las empresas quieren aprovechar. El objetivo es generar actividad económica y empleo a partir de nuevas herramientas que ayuden a mejorar la calidad de vida de los ciudadanos. Esta estrategia está en la hoja de ruta del Ayuntamiento de Barcelona, que se ha lanzado a promover apps desarrolladas por emprendedores que buscan una oportunidad. Hay actores que apuestan fuerte por esta capitalidad y que están contribuyendo a la dinamización del sector.

BIBLIOTHEQUES CALIBRE. Download calibre. Free Icons. Arduino. Players, Downloaders & Converters. Apps. Technology Blogs & Websites. Keyboards. Technology. Create Bootable USB Drive for Windows 7. Computerworld - IT news, features, blogs, tech reviews, career advice. Keyboard Shortcuts to use in Microsoft Word. 100 Unbelievably Useful Reference Sites You’ve Never Heard Of | Teaching Tips. Beyond Google, Wikipedia and other generic reference sites, the Internet boasts a multitude of search engines, dictionaries, reference desks & databases that have organized and archived information for quick and easy searches. In this list, we’ve compiled just 100 of our favorites, for teachers, students, hypochondriacs, procrastinators, bookworms, sports nuts and more. Dictionaries and More When you need a quick definition or want more specialized results that display synonyms, rhyming words and slang, turn to this list that is perfect for students or writers.

OneLook: This no-frills online dictionary lets you look up basic definitions, related words, phrases and more. Teacher References Teaching guides like these will help you double-check facts, look for relevant quotes, find different careers in education, and get ideas for lesson plans. Twain Quotations A to Z: Inspire (or confuse) your students by throwing out a Mark Twain quote every once in a while.

Librarian References Just for Fun. Pdf4Eclipse. Homepage. Import/Export/Copy Lists. Cooperative Association for Internet Data Analysis. File Dropper. How to dual-boot Linux and Windows. Electronics. The App Fest. AntennaWeb. Utility Linux. Keyboard shortcuts for Windows. Derecho de Internet | Función social de la Abogacía en la era digital. Linux - OS Tools. AltaVista. Technology. Junar · The Open Data Platform.

6 Volt Battery Hack - Science - Science Funny Pictures, Funny Videos, Cool Videos. World IPv6 Launch.