To Curate 3
Get flash to fully experience Pearltrees
idées à la con (mais on ne sait jamais)
The problem of sending messages securely has troubled humankind since the dawn of civilisation and probably before.
The (f)(2) agreement that your university must require you to sign
Apple's approach to security can be a little bewildering at times. It's a well-trumpeted aspect of the OS, marketed in detail on the website.
Mac OS X only: So you erased your hard drive to install Leopard , and now you've got to load your Mac up with all your essential software.
The words you use can disclose identifying features. This tool attempts to determine an author's gender based on the words used.
Mercredi 20 avril 2011 3 20 / 04 / Avr / 2011 10:14
There are approximately two billion children (persons under 18) in the world.
The Joy of Tech is a comic about technology and pop culture, created by Nitrozac and Snaggy, and updated three times a week. We like to feature the people and events that are making today's tech news.
On Wednesday, Sept. 14, Wired hosted a roundtable with Sir James Dyson at our New York offices. Dyson and his staff began by showing off their new vacuum cleaner ( the DC 41 ) and Dyson Hot , a new fan/space heater, which was being introduced later that day.
Articles de fond
Bots, Blogs and News Aggregators is a keynote presentation that I have been delivering over the last several years, and much of my information comes from the extensive research that I have completed over the years into the "invisible" or what I like to call the "deep" web. The Deep Web covers somewhere in the vicinity of 1 trillion pages of information located through the world wide web in various files and formats that the current search engines on the Internet either cannot find or have difficulty accessing. The current search engines find about 200 billion pages at the present time of this writing. In the last several years, some of the more comprehensive search engines have written algorithms to search the deeper portions of the world wide web by attempting to find files such as .pdf, .doc, .xls, ppt, .ps. and others.
Même dans des situations où on pense que son système de sécurité est infaillible, les hackers font preuve d'une imagination sans limite. Dernier exemple avec la société Netragard qui a pratiqué un audit chez l'un de ses clients, dont le système informatique était hyper sérieux, avec tout un tas de règles très strictes sur l'utilisation des réseaux sociaux, des téléphones, et sur l'accès physique aux ordinateurs.
Welcome back! It’s been another week and we have several new products to talk about.
Ever notice how people texting at night have that eerie blue glow ? Or wake up ready to write down the Next Great Idea, and get blinded by your computer screen? During the day, computer screens look good—they're designed to look like the sun . But, at 9PM, 10PM, or 3AM, you probably shouldn't be looking at the sun. f.lux f.lux fixes this: it makes the color of your computer's display adapt to the time of day, warm at night and like sunlight during the day.
NordForsk aims at bringing together prominent research groups in order to strengthen and increase the quality of and collaboration within research and research training.
Players, Downloaders & Converters
Technology Blogs & Websites
Linux - OS Tools