To Curate 3

Facebook Twitter

Web. Internet. Understanding Data. Semi automated... Idées à la con (mais on ne sait jamais) Technomancy. TICS. BibSonomy. §. Chris Blackwell's Domain. Jeniffer Thompson - Author Websites, Internet Marketing Consultant - home. Serious Flaw Emerges In Quantum Cryptography. The problem of sending messages securely has troubled humankind since the dawn of civilisation and probably before.

Serious Flaw Emerges In Quantum Cryptography

In recent years, however, physicists have raised expectations that this problem has been solved by the invention of quantum key distribution. This exploits the strange quantum property of entanglement to guarantee the secrecy of a message. Entanglement is so fragile that any eavesdropper cannot help but break it, revealing the ruse. Technology transfer, intellectual property, and cockroach living. Radical Conceptual Innovation In After Virtue, Alasdair McIntyre points out an argument made by Karl Popper–that new technology cannot be predicted with any specificity: Some time in the Stone Age you and I are discussing the future and I predict that within the next ten years someone will invent the wheel.

Technology transfer, intellectual property, and cockroach living

“Wheel?” Cool Websites, Software and Internet Tips. Technology and Programming News. SecureIndex. Free Vectors & Graphics for Download. Automate your Dropbox. Flash. Widgetbox.

Keeping your Mac locked down: a Mac OS X security primer: Page 1. Apple's approach to security can be a little bewildering at times.

Keeping your Mac locked down: a Mac OS X security primer: Page 1

It's a well-trumpeted aspect of the OS, marketed in detail on the website. Mac OS X has integrated smartcard support and Apple has certified the OS under the Common Criteria guidelines; a section of Apple's developer site is devoted to the subject of security. At the same time, Apple didn't offer cryptographically signed software updates until its hand was forced in July 2002. The company is notorious for boiling down release notes for software updates to "provides bug fixes and security updates" (although the separate mailings posted to the security-announce list do tend to offer a little more detail).

While other Unix distributions tend to patch holes in open-source code relatively quickly, Apple sometimes delays rolling out a security fix in the open-source components of Mac OS X for months or even years. Mac OS X: Rebuild Your Mac with 20 Useful Downloads. Hacker Factor: Gender Guesser. The words you use can disclose identifying features. This tool attempts to determine an author's gender based on the words used. Submitted text is evaluated based on two types of writing: formal and informal. Formal writing includes fiction and non-fiction stories, articles, and news reports. Informal writing includes blog and chat-room text. (Email can be formal, informal, or some combination.) PDF gratuits : des PDF gratuits pour tous !

Basics of APA Style. Alojamiento web. Technology. FTP Client. Geek meditation session. The Joy of Tech is a comic about technology and pop culture, created by Nitrozac and Snaggy, and updated three times a week.

Geek meditation session.

We like to feature the people and events that are making today's tech news. We've been making comics on the web since early 1999, and The Joy of Tech just celebrated its 10th anniversary. We're very proud to be featured regularly on places like AllThingsD (from the people who publish The Wall Street Journal), Bloomberg Businessweek, Macworld UK magazine, Folha in Brazil, and others, both on the web and in print. We currently live on Vancouver Island, Canada, where we have a lovely perspective of the silicon valleys to the south. We make The Joy of Tech using Apple computers, mostly on our MacBook Pros, running Mac OS X Snow Leopard.

The evolution of the web. Expressing Technology: A Roundtable With Sir James Dyson. Sir James Dyson at Wired's NYC office.

Expressing Technology: A Roundtable With Sir James Dyson

Photo: Dave Mosher/Wired.com On Wednesday, Sept. 14, Wired hosted a roundtable with Sir James Dyson at our New York offices. Dyson and his staff began by showing off their new vacuum cleaner (the DC 41) and Dyson Hot, a new fan/space heater, which was being introduced later that day. We asked Sir James questions about every aspect of emerging and commercial technology, ranging from intellectual property and education reform to the overlap between Steve Jobs’ design philosophy and his own.

We learned (among other things) why research and development in battery technology and artificial intelligence are critical to the future of household cleaning, and why it’s harder to sell high-end vacuum cleaners in China and Brazil. Internet Encephalography : Art of Failure. Apptastic. Articles de fond. Botnet TDL4. Le L∞p. Deep Web Research 2010.

Bots, Blogs and News Aggregators is a keynote presentation that I have been delivering over the last several years, and much of my information comes from the extensive research that I have completed over the years into the "invisible" or what I like to call the "deep" web.

Deep Web Research 2010

The Deep Web covers somewhere in the vicinity of 1 trillion pages of information located through the world wide web in various files and formats that the current search engines on the Internet either cannot find or have difficulty accessing. The current search engines find about 200 billion pages at the present time of this writing. In the last several years, some of the more comprehensive search engines have written algorithms to search the deeper portions of the world wide web by attempting to find files such as .pdf, .doc, .xls, ppt, .ps. and others. L’attaque de l’année ! Planet RDF. Socrata. News.

F.lux: software to make your life better. Application Portal. NordForsk aims at bringing together prominent research groups in order to strengthen and increase the quality of and collaboration within research and research training.

Application Portal

It is important that PhD students and young researchers participate actively in the network. A Researcher Network should aim at establishing joint research training in a given field, consolidate research as a basis for joint Nordic, European or international projects, and thereby establish excellence in its field of research. Thus, the intention should be to continue the established collaboration beyond the grant period. NordForsk encourages research cooperation between the Nordic and Baltic countries in the networks, and according to the Guidelines for the Nordic Council of Ministers' Nordic-Baltic cooperation 2009-2013, the cooperation is a partnership on equal footing. Cleverbot.com - a clever bot - speak to an AI with some Actual Intelligence? Fry, Ben.

Zamzar. 7 outils indispensables de ton PC que tu n'utilises jamais. Trois outils pour vous aider à faire du contenu unique sur Internet. Removing Your Personal Information From Google. As our culture continues to move online, personal information about us that previously may have only been seen by our friends and family is increasingly shared in public spaces on the internet.

Removing Your Personal Information From Google

What can you do if you search for your name on Google and find information you’d rather keep private? Or find yourself or home in Google Street View and want it blurred? Read on for instructions on how to get it removed. NOTE: If you want content removed from Google that’s located on a site that you do own, see Removing Pages from Google: A Comprehensive Guide for Content Owners for details. Why Google Generally Won’t Remove Your Personal Information. Le Tekos. The Daily WTF: Curious Perversions in Information Technology.

My Favorite Smallware - StumbleUpon. Books. Barcelona, centro neurálgico de las apps. BIBLIOTHEQUES CALIBRE. Download calibre. Free Icons. Arduino. Players, Downloaders & Converters.

Apps. Technology Blogs & Websites. Keyboards. Technology. Create Bootable USB Drive for Windows 7. Computerworld - IT news, features, blogs, tech reviews, career advice. Keyboard Shortcuts to use in Microsoft Word. 100 Unbelievably Useful Reference Sites You’ve Never Heard Of. Beyond Google, Wikipedia and other generic reference sites, the Internet boasts a multitude of search engines, dictionaries, reference desks & databases that have organized and archived information for quick and easy searches.

100 Unbelievably Useful Reference Sites You’ve Never Heard Of

In this list, we’ve compiled just 100 of our favorites, for teachers, students, hypochondriacs, procrastinators, bookworms, sports nuts and more. Dictionaries and More When you need a quick definition or want more specialized results that display synonyms, rhyming words and slang, turn to this list that is perfect for students or writers. OneLook: This no-frills online dictionary lets you look up basic definitions, related words, phrases and more. Pdf4Eclipse. Pdf4Eclipse enriches Eclipse with a pdf reader.

Pdf4Eclipse

One of its notable feature is a complete integration of SyncTeX, which allows forward and inverse search in pdf files. This makes it a perfect viewer for documents created with TeXlipse. Homepage. Import/Export/Copy Lists. One of the challenges I'm currently trying to solve is related to the site directory. After my upgrade the site directory is a bit messed up (the upgrade seemed to have merged columns). In an attempt to get the site directory in a state that I can work with I'm looking at several possibilities. One of those was configure the site directory the way I want it, export the Sites list and then import back after my upgrade completes. In order to accomplish this I had to create the ability to import and export lists (turns out this alone won't solve my problems but the commands I've created could be extremely handy in many scenarios).

Cooperative Association for Internet Data Analysis. File Dropper. How to dual-boot Linux and Windows. Many of us like to run more than one operating system on a single machine. It's a great way of experimenting with how the other half live, testing new distributions and even playing a few Windows-based games. But dual and triple booting has always been considered something of a dark art. This is because it involves the double jeopardy of messing around with your disk partition tables and playing with a pre-installed operating system.

If things go wrong, it can be a disaster. Or at least, that's the popular perception. Electronics. The App Fest. AntennaWeb. Utility Linux. Keyboard shortcuts for Windows. This article lists keyboard shortcuts that you can use with Windows. Windows system key combinations F1: HelpCTRL+ESC: Open Start menuALT+TAB: Switch between open programsALT+F4: Quit programSHIFT+DELETE: Delete item permanentlyWindows Logo+L: Lock the computer (without using CTRL+ALT+DELETE) Windows program key combinations CTRL+C: CopyCTRL+X: CutCTRL+V: PasteCTRL+Z: UndoCTRL+B: BoldCTRL+U: UnderlineCTRL+I: Italic.

Función social de la Abogacía en la era digital. Linux - OS Tools. AltaVista. Yahoo Yahoo <a id="logo" target="_top" href=" class="ai-large ai-purple ai-autoplay" style="visibility:visible">Yahoo</a> Please try the full Yahoo experience at Yahoo.com Montreal46°FCloudy<img src=" alt="Showers" title="Showers"/>Today56°42°<img src=" alt="Showers" title="Showers"/>Tomorrow51°34°<img src=" alt="Sunny" title="Sunny"/>Thursday55°33° Technology. Junar · The Open Data Platform. 6 Volt Battery Hack - Science - Science Funny Pictures, Funny Videos, Cool Videos. Haztuwebmovil.es. World IPv6 Launch.