CSS, HTML5 and Responsive Site Templates
How to Migrate Your Facebook Account and Data to Google+
Arrrrrgh, the really sad part is that you sent this to me and in all that searching for an alternative fb/g+ sharer, I didn't realize this could also do that. I'm having some trouble loading stuff up though. The home page is very slow, but loaded...but now that I've got it installed the Facebook and Twitter "login" pages don't seem to be loading at all. I'd love to add this to the article, but I can't really do that until I get it working...any advice? The FB/Twitter icons on the right side of the top toolbar should pop up authorization windows for each of the services and require you to login, once that is completed, you will have to click those buttons again & hit the "login" link one more time to get it to actually connect. Once you've connected, there will be checkbox/icons in the share box for whatever services you're signed into. Hopefully that helps... Yeah, what I'm saying is that when I click on the icons you mention, they *don't* pop up authorization windows.
Start Google Plus | Convert Facebook to Google+
Evidence Based Scheduling by Joel Spolsky Friday, October 26, 2007 Software developers don’t really like to make schedules. Most of the schedules you do see are halfhearted attempts. Hilarious! You want to be spending your time on things that get the most bang for the buck. Why won’t developers make schedules? Over the last year or so at Fog Creek we’ve been developing a system that’s so easy even our grouchiest developers are willing to go along with it. The steeper the curve, the more confident you are that the ship date is real. Here’s how you do it. 1) Break ‘er down When I see a schedule measured in days, or even weeks, I know it’s not going to work. This forces you to actually figure out what you are going to do. If you are sloppy, and pick big three-week tasks (e.g., “Implement Ajax photo editor”), then you haven’t thought about what you are going to do. Setting a 16-hour maximum forces you to design the damn feature. 2) Track elapsed time You can’t, really. So, keep timesheets. Summary
Evidence Based Scheduling
All commands | commandlinefu.com
Commands marked • are bash built-ins Many commands particularly the Core Utils are also available under alternate shells (C shell, Korn shell etc). More bash commands: Linux Command Directory from O'Reilly, GNU CoreUtils.SS64 bash discussion forumLinks to other Sites, books etc
An A-Z Index of the Bash command line for Linux
Welcome to Python.org
Sinclair ZX81 Hersteller Hauptentwickler Jim Westwood (Leitung, Hardware), Rick Dickinson (Gehäuse), John Grant (Betriebssystem), Steven Vickers (BASIC) Verkaufsstart und Neupreis Vereinigtes Konigreich 5. November 1981 für 149,95 US$Deutschland Herbst 1981 für 398 DMJapan Dezember 1981 für 38.700 ¥ Einstellung der Produktion Verkaufte Geräte Hauptprozessor Arbeitsspeicher ab Werk 1024 Bytes Grafikausgabe 32 × 24 Zeichen (schwarzweiß) 64 × 48 Pixel (Blockgrafik, schwarzweiß) Tonausgabe Nicht vorhanden. Gehäuseabmessungen (H/B/T) 40 mm / 167 mm / 167 mm Lieferumfang (Westdeutschland) Computer, Netzteil, Antennenkabel, Bedienungsanleitung, Buch ZX BASIC Programming, Gewährleistungskarte, Kartonverpackung, Styropor Ober- und Unterschale Der Sinclair ZX81 (kurz ZX81) ist ein auf dem Z80-Mikroprozessor basierender Heimcomputer des britischen Herstellers Sinclair Research Ltd. Der ZX81 ist eine Weiterentwicklung des ZX80 und wurde von vornherein als Massenware für Einsteiger konzipiert.
Tandy TRS 80 Model 100
Der TRS 80 Modell 100 von Tandy RadioShack aus dem Jahr 1983 gehörte zu einer Familie von portablen Computern, die allesamt aus der Fertigung des Unternehmens Kyocera stammten. Ausgerüstet mit einem sparsamen CMOS-Prozessor 8085 und statischem RAM (8–32 kB) sorgten 4 AA-Batterien für eine Betriebszeit von etwa 20 Stunden. Besonders unter Journalisten war das Gerät wegen seines eingebauten 300 Baud-Modems und der enthaltenen Textverarbeitung sehr verbreitet. Weltweit wurden über 6 Millionen Stück verkauft. Technische Daten[Bearbeiten] Intel 80C85 8-Bit-Prozessor, CMOS, 2,4 MHz32 KByte ROM, 8, 16, 24 oder 32 KByte RAMLC-Display 240 × 64 Pixel (nicht hintergrundbeleuchtet)Externes 3,5-Zoll Diskettenlaufwerk (Kapazität 90 KByte) Versionen[Bearbeiten] Baugleich waren Olivetti M-10 und NEC PC-8201. Trivia[Bearbeiten] Weblinks[Bearbeiten] Umfangreiche Infoseite über Emulatoren und Lösung des Jahr-2000-Problems (Englisch)
Der Commodore 64 (kurz C64, umgangssprachlich 64er oder „Brotkasten“) ist ein 8-Bit-Heimcomputer mit 64 KB Arbeitsspeicher. Seit seiner Vorstellung im Januar 1982 auf der Winter Consumer Electronics Show war der von Commodore gebaute C64 Mitte bis Ende der 1980er Jahre sowohl als Spielcomputer als auch zur Softwareentwicklung äußerst populär. Er gilt als der meistverkaufte Heimcomputer weltweit – Schätzungen der Verkaufszahlen bewegen sich zwischen 12,5 Mio. und 30 Mio. Exemplaren. Der C64 ermöglichte mit seiner umfangreichen Hardwareausstattung zu einem – nach einer teureren Einführungsphase – erschwinglichen Preis einer ganzen Generation von Jugendlichen in den 1980er Jahren erstmals Zugang zu einem für diese Zeit leistungsstarken Computer. Blinkender „Ready“-Startbildschirm des C64. Entwicklung[Bearbeiten] Geöffneter C64 Externes Netzteil des C64 Unterseite des C64 Das Projekt hatte zunächst den Codenamen VC-40, der in Anlehnung an das Vorgängermodell VC-20 gewählt worden war.
Enabling Communications, Anywhere, Anytime: Arduino Yun as a possible Mesh Extender Platform
Regular readers of this blog will know that we have been looking at a variety of hardware options for the Serval Mesh Extender. The Serval Mesh Extender is a device that combines ad-hoc WiFi meshing with long-range license-free UHF packet radio to allow the easy formation of mesh networks spanning useful distances. Typically the UHF packet radio has a range about ten times greater than WiFi. This means that in ordinary suburban and urban areas we get a range of a block or two, and in open rural areas the range can be in the kilometres. We run our award winning Serval Mesh software over the top, providing an easy to use communications system that lets you use your cell phone without cellular coverage, for example, during a disaster, or when you and your friends are near one another outside of the range of your native network. The challenge with the Mesh Extender design is that we haven't had the budget to design our own device from the ground up.
Graphic Applications ACDSee Imgv is a unique and feature rich Image Viewer. It is released as free software with full source code. Imgv is portable and can run on Windows, Linux, BSD, OSX, and other operating systems. Cornice is a cross-platform image viewer written in Python + wxPython + PIL. Adobe After Effects Jahshaka is an editing and effects system. Adobe FrameMaker and QuarkXPress Scribus is an open-source program that brings award-winning professional page layout to Linux/Unix, MacOS X, OS/2 and Windows desktops with a combination of “press-ready” output and new approaches to page layout. KWord is a frame-based word-processing and desktop publishing application. Adobe Illustrator and Corel Draw Xara Xtreme for Linuxis a powerful, general purpose graphics program for Unix platforms including Linux, FreeBSD and (in development) OS-X. Skencil is an interactive vector drawing appliction. Adobe Photoshop and Corel Paint Shop Pro GIMP is the GNU Image Manipulation Program. Autodesk 3ds Max
Open Source Alternative to Commercial Software
Smaller, faster, cheaper! Single board computer (SBC) innovations are jumpstarting a whole new wave of DIY devices. If you've been living under a rock for the last couple of years, you can be forgiven for not knowing about the revolution that's been happening in micro-computing, such as the introduction of the Raspberry Pi models, but this emerging trend has the potential to radically change the DIY tech scene. Originally designed to teach computer science and coding skills, these single board computers aren't just for kids or students anymore, as they've evolved into tiny machines capable of handling quite a few common IT tasks at home, such as streaming media or serving as a control hub for other smart devices. The PINE A64 runs its operating system from a removable microSD card, which can easily be swapped out and/or updated, and the unit is designed to run open source platforms such as Android, Ubuntu, or OpenHAB IoT.
The mini-computer market just got a lot more crowded with this $15 64-bit entry
Perceptually Uniform Colour Maps Many widely used colour maps have perceptual flat spots that can hide features as large as 10% of your total data range. MATLAB's 'hot' and 'hsv' colour maps suffer from this problem. Use these colour maps instead. For an overview of this work and the theory behind it please visit this page Generation and correction of colour maps cmap.m Colour map generating function. Rendering of images with colour maps applycolourmap.m Applies a colour map to a single channel image to obtain an RGB result. showdivim.m This function is intended for displaying an image with a diverging colour map. Test images sineramp.m Generates a test image consisting of a sine wave superimposed on a ramp function The amplitude of the sine wave is modulated from its full value at the top of the image to 0 at the bottom. Visualization of colour map paths and colour spaces Functions for reading and writing colour maps in various formats Colour conversion convenience functions. Julia Code
Peter's Functions for Computer Vision
This is a cool perspective rectification method that I learnt last week. It probably has also a lot of other useful applications in addition to this one. Figure 1. For this method, you will need MATLAB and Corke’s Machine Vision Toolbox (MVTB). I needed also the MATLAB Functions for Multiple View Geometry even though I didn’t notice it in MVTB’s installation instructions but I may have failed to install the toolbox correctly. When you are ready, run the following script in MATLAB. Figure 2. im = imread('input.jpg'); image(im); P = ginput(4)'; X = [min(P(1,:)), min(P(2,:)); max(P(1,:)), min(P(2,:)); max(P(1,:)), max(P(2,:)); min(P(1,:)), max(P(2,:))]'; H = homography(P, X); output = homwarp(H, im); imwrite(output, 'output.jpg'); The most relevant things in these lines are the homography and homwarp functions that came with MVTB. Figure 3. Now it should be easy to crop the image and do the possibly necessary width/height scaling using your favourite image editing program.
Perspective rectification – Mikko's Project Corner
Table of Contents: Convolutional Neural Networks are very similar to ordinary Neural Networks from the previous chapter: they are made up of neurons that have learnable weights and biases. Each neuron receives some inputs, performs a dot product and optionally follows it with a non-linearity. The whole network still expresses a single differentiable score function: from the raw image pixels on one end to class scores at the other. And they still have a loss function (e.g. SVM/Softmax) on the last (fully-connected) layer and all the tips/tricks we developed for learning regular Neural Networks still apply. So what does change? Architecture Overview Recall: Regular Neural Nets. Regular Neural Nets don’t scale well to full images. 3D volumes of neurons. Left: A regular 3-layer Neural Network. A ConvNet is made up of Layers. Layers used to build ConvNets Example Architecture: Overview. In summary: The activations of an example ConvNet architecture. Convolutional Layer The brain view. Example 1.
CS231n Convolutional Neural Networks for Visual Recognition
Introduction to PC Components
Every graphics card is differentiated by its Graphics Processing Unit (GPU), a chip housing a wide range of different functional components that determine what the graphics card can do. For example, special components are needed inside of a GPU for it to be able to play a game using DirectX 11 and some features are even specific to one brand, like NVIDIA's TXAA, adaptive vertical sync, SLI, and PhysX. There are quite a few different kinds of components inside of a GPU, but things called shader units (also known as. Clock speeds for graphics cards are usually written in MHz, or Megahertz, and 1 MHz is 1,000,000 (one million) cycles per second. The memory type used by graphics cards is different from the sort you'd find sticking out from your motherboard. Regardless of their type, the memory chips found on a graphics card connect to the GPU through a series of pathways.
Corsair RM Series 850 Watt ATX/EPS 80PLUS Gold-Certified Power Supply - CP-9020056-NA RM850: Computers & Accessories
In order to enable dual-channel architecture, you will need to have: Memory controller supporting dual-channel architecture (virtually all current CPUs support dual-channel architecture).Two or an even number of memory modules; each pair of modules must be identical.Install the memory modules in the correct memory sockets on the motherboard that will enable this architecture. First, the memory controller must support the dual-channel architecture. As we discussed earlier, current CPUs have this component embedded, so almost all computers nowadays support this technology. Second, you need to have an even number of memory modules on your system, as each pair of memory modules will be accessed as a single entity. This is a very important point to keep in mind when selecting parts for building a PC. The third point is to install the memory modules in the correct memory sockets on the motherboard. The rules, however, depend on the kind of system you own.
Everything You Need to Know About the Dual-, Triple-, and Quad-Channel Memory Architectures
Overview Throughout the year, scam artists pose as legitimate entities—such as the Internal Revenue Service (IRS), other government agencies, and financial institutions—in an attempt to defraud taxpayers. They employ sophisticated phishing campaigns to lure users to malicious sites or entice them to activate malware in infected email attachments. To protect sensitive data, credentials, and payment information, US-CERT and the IRS recommend taxpayers prepare for heightened risk this tax season and remain vigilant year-round. Remain alert Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. Spot common elements of the phishing lifecycle Understand how the IRS communicates electronically with taxpayers Take action to avoid becoming a victim Watch for any unexplainable charges to your financial accounts. Report suspicious phishing communications Additional Resources
IRS and US-CERT Caution Users: Prepare for Heightened Phishing Risk This Tax Season
The Critical Engineering Manifesto - Tactical Media Files
Touch Develop – Scheme Of Work | Ray Chambers
Online HTML Editor
That One Privacy Site | Detailed VPN Comparison Chart
How to encrypt your entire life in less than an hour
Mise au point : norme XP P07-150, propriétés, dictionnaire, objets génériques pour le BIM
The Top 8 Free and Open Source Construction Management Software
What happens when you type google.com into your browser and press enter?
Eyes Above The Waves: Disable Your Antivirus Software (Except Microsoft's)
Computer Science Education
Professionalism & Ethics in Computing
Computer connections CLIL Lesson