Web

Internet

Understanding Data

semi automated...

idées à la con (mais on ne sait jamais)

Technomancy

TICS

Vous avez demandé à visiter , mais en dépit de tous nos efforts, nos ordinateurs n'ont pas réussi à la trouver. Que s'est-il passé ? le lien sur lequel vous avez cliqué pour arriver ici comportait une erreur http://www.esj-paris.com/christophe/tendancewebdesign2011.pdf http://www.esj-paris.com/christophe/tendancewebdesign2011.pdf
Chris Blackwell's Domain Chris Blackwell's Domain Most men die at twenty five they just aren’t buried until they are seventy five. – Benjamin Franklin A modern paradox is that it’s simpler to create complex interfaces because it’s so complex to simplify them. – Pär Almqvist PHP Tip: When to use the alternative syntax I use PHP shorthand syntax all the time when working with html templates with embedded PHP. I find the syntax much cleaner then having a bunch of closing brackets in my WordPress or Laravel template files.
Jeniffer Thompson - Author Websites, Internet Marketing Consultant - home Looking for a Speaker? My name is Jeniffer Thompson and I am an author, speaker, and Internet Marketing strategist. I’m not a guru—I don’t have some miracle answer to guarantee your online success. What I do offer is a common sense approach to Internet Marketing. I concentrate on the nuts and bolts of how you can establish a professional online presence and will teach you simple steps anyone can follow: develop your brand and fine-tune your message,build a professional website and implement a strategic marketing funnel,write engaging content that draws in your audience,drive traffic and convert that traffic into revenue. Jeniffer Thompson - Author Websites, Internet Marketing Consultant - home
Serious Flaw Emerges In Quantum Cryptography The problem of sending messages securely has troubled humankind since the dawn of civilisation and probably before. In recent years, however, physicists have raised expectations that this problem has been solved by the invention of quantum key distribution. This exploits the strange quantum property of entanglement to guarantee the secrecy of a message. Entanglement is so fragile that any eavesdropper cannot help but break it, revealing the ruse. Serious Flaw Emerges In Quantum Cryptography
Radical Conceptual Innovation In After Virtue, Alasdair McIntyre points out an argument made by Karl Popper–that new technology cannot be predicted with any specificity: Some time in the Stone Age you and I are discussing the future and I predict that within the next ten years someone will invent the wheel. “Wheel?” Research Enterprise | Technology transfer, intellectual property, and cockroach living Research Enterprise | Technology transfer, intellectual property, and cockroach living
Technology and Programming News
Dot Org • SecureIndex
Flash
Apple's approach to security can be a little bewildering at times. It's a well-trumpeted aspect of the OS, marketed in detail on the website. Mac OS X has integrated smartcard support and Apple has certified the OS under the Common Criteria guidelines; a section of Apple's developer site is devoted to the subject of security. At the same time, Apple didn't offer cryptographically signed software updates until its hand was forced in July 2002. The company is notorious for boiling down release notes for software updates to "provides bug fixes and security updates" (although the separate mailings posted to the security-announce list do tend to offer a little more detail). While other Unix distributions tend to patch holes in open-source code relatively quickly, Apple sometimes delays rolling out a security fix in the open-source components of Mac OS X for months or even years. Keeping your Mac locked down: a Mac OS X security primer: Page 1 Keeping your Mac locked down: a Mac OS X security primer: Page 1
Mac OS X: Rebuild Your Mac with 20 Useful Downloads
Hacker Factor: Gender Guesser The words you use can disclose identifying features. This tool attempts to determine an author's gender based on the words used. Submitted text is evaluated based on two types of writing: formal and informal. Formal writing includes fiction and non-fiction stories, articles, and news reports. Informal writing includes blog and chat-room text. (Email can be formal, informal, or some combination.) Hacker Factor: Gender Guesser
PDF gratuits : des PDF gratuits pour tous ! - emma, documentaliste Mercredi 20 avril 2011 3 20 /04 /Avr /2011 10:14 -Communauté : NTIC : Nouvelles technologies C'est en effectuant quelques recherches sur les derniers guides PDF publiés sur Internet que j'ai trouvé PDF gratuit. Il s'agit d'un site qui regroupe beaucoup de documents dans les rubriques suivantes (je ne les citerai pas toutes) : - alimentation (conseils, guides nutritionnels, recettes, jeux...)

PDF gratuits : des PDF gratuits pour tous ! - emma, documentaliste

Alojamiento web Alojamiento web Quiénes somos Alojalia Networks se funda en 2003 aunque nuestra existencia en el sector del alojamiento web es muy anterior. Nuestra experiencia se transmite en el día a día demostrándolo con un alto rendimiento y un óptimo nivel de funcionamiento, pensando siempre en el crecimiento futuro.
FTP Client
The Joy of Tech is a comic about technology and pop culture, created by Nitrozac and Snaggy, and updated three times a week. We like to feature the people and events that are making today's tech news. We've been making comics on the web since early 1999, and The Joy of Tech just celebrated its 10th anniversary. We're very proud to be featured regularly on places like AllThingsD (from the people who publish The Wall Street Journal), Bloomberg Businessweek, Macworld UK magazine, Folha in Brazil, and others, both on the web and in print. We currently live on Vancouver Island, Canada, where we have a lovely perspective of the silicon valleys to the south. We make The Joy of Tech using Apple computers, mostly on our MacBook Pros, running Mac OS X Snow Leopard. Geek meditation session. Geek meditation session.
The evolution of the web
Expressing Technology: A Roundtable With Sir James Dyson | Epicenter  Sir James Dyson at Wired's NYC office. Photo: Dave Mosher/Wired.com On Wednesday, Sept. 14, Wired hosted a roundtable with Sir James Dyson at our New York offices. Dyson and his staff began by showing off their new vacuum cleaner (the DC 41) and Dyson Hot, a new fan/space heater, which was being introduced later that day. We asked Sir James questions about every aspect of emerging and commercial technology, ranging from intellectual property and education reform to the overlap between Steve Jobs’ design philosophy and his own. We learned (among other things) why research and development in battery technology and artificial intelligence are critical to the future of household cleaning, and why it’s harder to sell high-end vacuum cleaners in China and Brazil.
Internet Encephalography : Art of Failure
Articles de fond

Botnet TDL4 Cette news m'a fasciné... La société Kaspersky a mis au jour un réseau de botnet du nom de TDL4 (ou TDSS) de plus de 4,5 millions de machines. D'après l'éditeur d'antivirus, TDL4 a véritablement été conçu pour régner en maitre sur ses machines grâce à : Un système d'affiliation qui permet de rémunérer les gens qui installent (volontairement) ce malware sur les machines d'autres personnes (pas vraiment au courant). Botnet TDL4
Heisenberg : [NONE|SETTLED|MOVING IN|INSTALLED|HOME] December 16, 2013 at 18:00 | by tom | categories: atelier Demain, mardi 16 décembre à partir de 19h, nous serons quelques uns à jouer avec Xen, xen-tools et compagnie. Le but est de partager nos expériences, se refiler des trucs et astuces, et aussi, peut-être, améliorer la configuration des serveurs de virtualisation déployés au Loop. Pas de maître de conférence, pas de slides, juste des gens et de la bonne humeur. A vot' bon (double) cœur !

Le L∞p

Deep Web Research 2010 Bots, Blogs and News Aggregators is a keynote presentation that I have been delivering over the last several years, and much of my information comes from the extensive research that I have completed over the years into the "invisible" or what I like to call the "deep" web. The Deep Web covers somewhere in the vicinity of 1 trillion pages of information located through the world wide web in various files and formats that the current search engines on the Internet either cannot find or have difficulty accessing. The current search engines find about 200 billion pages at the present time of this writing. In the last several years, some of the more comprehensive search engines have written algorithms to search the deeper portions of the world wide web by attempting to find files such as .pdf, .doc, .xls, ppt, .ps. and others.
L’attaque de l’année !
Planet RDF
Application Portal
7 outils indispensables de ton PC que tu n'utilises jamais
Trois outils pour vous aider à faire du contenu unique sur Internet
Removing Your Personal Information From Google
Le Tekos
Barcelona, centro neurálgico de las apps
Arduino

Players, Downloaders & Converters

Apps

Technology Blogs & Websites

Keyboards

Technology

Create Bootable USB Drive for Windows 7
Keyboard Shortcuts to use in Microsoft Word
100 Unbelievably Useful Reference Sites You’ve Never Heard Of | Teaching Tips
Pdf4Eclipse
Homepage
Import/Export/Copy Lists
File Dropper
How to dual-boot Linux and Windows
Electronics

The App Fest
AntennaWeb
Utility Linux

Derecho de Internet | Función social de la Abogacía en la era digital
Linux - OS Tools

Technology

6 Volt Battery Hack - Science - Science Funny Pictures, Funny Videos, Cool Videos
Haztuwebmovil.es
World IPv6 Launch