background preloader


CSS, HTML5 and Responsive Site Templates

Abstract: This is the first tutorial in a series designed to get you acquainted and comfortable using Excel and its built-in data mash-up and analysis features. These tutorials build and refine an Excel workbook from scratch, build a data model, then create amazing interactive reports using Power View. The tutorials are designed to demonstrate Microsoft Business Intelligence features and capabilities in Excel, PivotTables, Power Pivot, and Power View. Note: This article describes data models in Excel 2013. In these tutorials you learn how to import and explore data in Excel, build and refine a data model using Power Pivot, and create interactive reports with Power View that you can publish, protect, and share. The tutorials in this series are the following: In this tutorial, you start with a blank Excel workbook. The sections in this tutorial are the following: Import data from a database Import data from a spreadsheet Import data using copy and paste Checkpoint and Quiz Save the workbook. Tutorial: Import Data into Excel, and Create a Data Model - Excel Tutorial: Import Data into Excel, and Create a Data Model - Excel
To make managing and analyzing a group of related data easier, you can turn a range of cells into a Microsoft Office Excel table (previously known as an Excel list). A table typically contains related data in a series of worksheet rows and columns that have been formatted as a table. By using the table features, you can then manage the data in the table rows and columns independently from the data in other rows and columns on the worksheet. Note: Excel tables should not be confused with the data tables that are part of a suite of what-if analysis commands. For more information about data tables, see Calculate multiple results with a data table. In this article Learn about the elements of an Excel table Managing data in an Excel table Learn about the elements of an Excel table A table can include the following elements: Header row By default, a table has a header row. Top of Page Managing data in an Excel table Table features that you can use to manage table data Excel Tables Excel Tables
Using Structured References with Excel Tables Structured references make it much easier and more intuitive to work with table data when you are using formulas that reference a table, either portions of a table or the entire table. They are especially useful because table data ranges often change, and the cell references for structured references adjust automatically. This minimizes the need to rewrite formulas as rows and columns are added and deleted in a table, or when external data is refreshed. In this article The Department Sales table example Components of a structured reference Table names and column specifiers Reference operators Special item specifiers Qualifying structured references in calculated columns Examples of using structured references Working with structured references Structured reference syntax rules The Department Sales table example The following is an example, referenced throughout this article, of a table that is based on sales in a department of six employees with the latest sales amounts and commissions. 1. 2. 3. Using Structured References with Excel Tables

All commands |
Commands marked • are bash built-ins Many commands particularly the Core Utils are also available under alternate shells (C shell, Korn shell etc). More bash commands: Linux Command Directory from O'Reilly, GNU CoreUtils.SS64 bash discussion forumLinks to other Sites, books etc An A-Z Index of the Bash command line for Linux An A-Z Index of the Bash command line for Linux
Welcome to
Diagram of complexity classes provided that P≠NP. The existence of problems within NP but outside both P and NP-complete, under that assumption, was established by Ladner's theorem.[1] The P versus NP problem is a major unsolved problem in computer science. Consider the subset sum problem, an example of a problem that is easy to verify, but whose answer may be difficult to compute. An answer to the P = NP question would determine whether problems that can be verified in polynomial time, like the subset-sum problem, can also be solved in polynomial time. Aside from being an important problem in computational theory, a proof either way would have profound implications for mathematics, cryptography, algorithm research, artificial intelligence, game theory, multimedia processing, philosophy, economics and many other fields. Context[edit] In such analysis, a model of the computer for which time must be analyzed is required. Is P equal to NP? NP-complete[edit] Main article: NP-complete P versus NP problem P versus NP problem
Computational complexity theory Computational complexity theory is a branch of the theory of computation in theoretical computer science and mathematics that focuses on classifying computational problems according to their inherent difficulty, and relating those classes to each other. A computational problem is understood to be a task that is in principle amenable to being solved by a computer, which is equivalent to stating that the problem may be solved by mechanical application of mathematical steps, such as an algorithm. A problem is regarded as inherently difficult if its solution requires significant resources, whatever the algorithm used. The theory formalizes this intuition, by introducing mathematical models of computation to study these problems and quantifying the amount of resources needed to solve them, such as time and storage. Closely related fields in theoretical computer science are analysis of algorithms and computability theory. Computational problems[edit] Problem instances[edit] Turing machine[edit] Computational complexity theory
Computational Title: The Mystery of the Binary Author: Viznut Originally published in the [ALT] magazine issue 0x0000 The subcultures of computing are very young. There are no legends nor values that come from the distant past. No ancient mysticism, no generations-old symbols that have deep emotional effects. Even the old and classical things tend to be quite recent. Fortunately, even the past is not static. Stone-age binary counting We are so completely surrounded by decimal numbers that most people believe humans were "built" to count in base ten: "we have ten fingers, you know." Divine binary protocols The human mind has a strange relationship with randomness. The Two Symbols There's a great deal of similarity between the African and Chinese notations for binary combinations: both use vertical piles where a single bit is designated by one or two "somethings", such as sticks, stones or seeds. The Eight Trigrams The Sixteen Tetragrams The 64 Hexagrams The 256 Octagrams References
computer use

Emoticons for Facebook comments
What are iso files, and how do I open them? ISO files are a common disk image distribution format. We'll look at the best ways to open ISO files as well as a couple of ways to create them. I have a file that contains some information. I want to open it, but I apparently don’t have the right program installed on my computer. The file type is .iso. An ISO file is just a disk image. There are three ways to deal with a disk image: Put it on a disk.Make it look like you put it on a disk.Pretend it’s something else. ISOs are a type of archive The easiest way to think of an ISO file is more like a .zip or .cab archive file, only without the compression. An ISO file contains the image of a disk. There’s nothing about the ISO format that actually knows about files, folders, or formats. There are a few ways to deal with ISO files. Burn the ISO file to a disc ISO files are frequently used to distribute CD or DVD images. Using a CD or DVD burning program (like ImgBurn), you can then write that ISO image to an actual disc. Making ISO files Next steps What are iso files, and how do I open them?
How much online video content do you consume? Judging by YouTube’s popularity I’d say a lot, but YouTube isn’t the only site out there with streaming video content. More and more sites are featuring videos every day. Every once in a while you come across a video you would like to save. There are a lot of different services and tools you can use to capture streaming video. A Little About Streaming Video The vast majority of streaming video content on the Internet is in the Flash Video – or FLV – format. FLV files are what we will be looking for with the tools I’m about to show you. KeepVid The first website that can be used to catch streaming video is KeepVid. Then it will display links for you to download the video in 3GP, FLV, or MP4 format. KeepVid also has a bookmarklet that you can drag up to your bookmarks bar. Flash Video Downloader Flash Video Downloader is another website like KeepVid. FVD supports a wide range of websites. File2HD [NO LONGER WORKS] Orbit Downloader Conclusion Capture Streaming Video From Any Website With These 5 Tools Capture Streaming Video From Any Website With These 5 Tools
Computers tablets

Enabling Communications, Anywhere, Anytime: Arduino Yun as a possible Mesh Extender Platform Enabling Communications, Anywhere, Anytime: Arduino Yun as a possible Mesh Extender Platform Regular readers of this blog will know that we have been looking at a variety of hardware options for the Serval Mesh Extender. The Serval Mesh Extender is a device that combines ad-hoc WiFi meshing with long-range license-free UHF packet radio to allow the easy formation of mesh networks spanning useful distances. Typically the UHF packet radio has a range about ten times greater than WiFi. This means that in ordinary suburban and urban areas we get a range of a block or two, and in open rural areas the range can be in the kilometres. We run our award winning Serval Mesh software over the top, providing an easy to use communications system that lets you use your cell phone without cellular coverage, for example, during a disaster, or when you and your friends are near one another outside of the range of your native network. The challenge with the Mesh Extender design is that we haven't had the budget to design our own device from the ground up.
Graphic Applications ACDSee Imgv is a unique and feature rich Image Viewer. It is released as free software with full source code. Imgv is portable and can run on Windows, Linux, BSD, OSX, and other operating systems. Cornice is a cross-platform image viewer written in Python + wxPython + PIL. Adobe After Effects Jahshaka is an editing and effects system. Adobe FrameMaker and QuarkXPress Scribus is an open-source program that brings award-winning professional page layout to Linux/Unix, MacOS X, OS/2 and Windows desktops with a combination of “press-ready” output and new approaches to page layout. KWord is a frame-based word-processing and desktop publishing application. Adobe Illustrator and Corel Draw Xara Xtreme for Linuxis a powerful, general purpose graphics program for Unix platforms including Linux, FreeBSD and (in development) OS-X. Skencil is an interactive vector drawing appliction. Adobe Photoshop and Corel Paint Shop Pro GIMP is the GNU Image Manipulation Program. Autodesk 3ds Max Open Source Alternative to Commercial Software
Smaller, faster, cheaper! Single board computer (SBC) innovations are jumpstarting a whole new wave of DIY devices. If you've been living under a rock for the last couple of years, you can be forgiven for not knowing about the revolution that's been happening in micro-computing, such as the introduction of the Raspberry Pi models, but this emerging trend has the potential to radically change the DIY tech scene. Originally designed to teach computer science and coding skills, these single board computers aren't just for kids or students anymore, as they've evolved into tiny machines capable of handling quite a few common IT tasks at home, such as streaming media or serving as a control hub for other smart devices. The PINE A64 runs its operating system from a removable microSD card, which can easily be swapped out and/or updated, and the unit is designed to run open source platforms such as Android, Ubuntu, or OpenHAB IoT. The mini-computer market just got a lot more crowded with this $15 64-bit entry
Perceptually Uniform Colour Maps Many widely used colour maps have perceptual flat spots that can hide features as large as 10% of your total data range. MATLAB's 'hot' and 'hsv' colour maps suffer from this problem. Use these colour maps instead. For an overview of this work and the theory behind it please visit this page Generation and correction of colour maps cmap.m Colour map generating function. Rendering of images with colour maps applycolourmap.m Applies a colour map to a single channel image to obtain an RGB result. showdivim.m This function is intended for displaying an image with a diverging colour map. Test images sineramp.m Generates a test image consisting of a sine wave superimposed on a ramp function The amplitude of the sine wave is modulated from its full value at the top of the image to 0 at the bottom. Visualization of colour map paths and colour spaces Functions for reading and writing colour maps in various formats Colour conversion convenience functions. Julia Code Peter's Functions for Computer Vision
This is a cool perspective rectification method that I learnt last week. It probably has also a lot of other useful applications in addition to this one. Figure 1. For this method, you will need MATLAB and Corke’s Machine Vision Toolbox (MVTB). I needed also the MATLAB Functions for Multiple View Geometry even though I didn’t notice it in MVTB’s installation instructions but I may have failed to install the toolbox correctly. When you are ready, run the following script in MATLAB. Figure 2. im = imread('input.jpg'); image(im); P = ginput(4)'; X = [min(P(1,:)), min(P(2,:)); max(P(1,:)), min(P(2,:)); max(P(1,:)), max(P(2,:)); min(P(1,:)), max(P(2,:))]'; H = homography(P, X); output = homwarp(H, im); imwrite(output, 'output.jpg'); The most relevant things in these lines are the homography and homwarp functions that came with MVTB. Figure 3. Now it should be easy to crop the image and do the possibly necessary width/height scaling using your favourite image editing program. Perspective rectification – Mikko's Project Corner

These Are What the Google Artificial Intelligence’s Dreams Look Like
Researchers show computers can be hijacked to send data as sound waves A team of security researchers has demonstrated the ability to hijack standard equipment inside computers, printers and millions of other devices in order to send information out of an office through sound waves. The attack program takes control of the physical prongs on general-purpose input/output circuits and vibrates them at a frequency of the researchers’ choosing, which can be audible or not. The vibrations can be picked up with an AM radio antenna a short distance away. For decades, spy agencies and researchers have sought arcane ways of extracting information from keyboards and the like, successfully capturing light, heat and other emanations that allow the receivers to reconstruct content. The new makeshift transmitting antenna, dubbed “Funtenna” by lead researcher Ang Cui of Red Balloon Security, adds another potential channel that likewise be would be hard to detect because no traffic logs would catch data leaving the premises. Reuters
MIT researchers create file system guaranteed not to lose data even if a PC crashes

Mise au point : norme XP P07-150, propriétés, dictionnaire, objets génériques pour le BIM
The Top 8 Free and Open Source Construction Management Software
What happens when you type into your browser and press enter?
Eyes Above The Waves: Disable Your Antivirus Software (Except Microsoft's)
Computer/ Technology

How to Organize Apps on Your iPad
Use This PC Cleaner Software To Keep Windows Running Smoothly
Anti-Distraction Tools: Six Chrome Extensions, Mac, iPhone And PC Apps To Stay Focused And Get Work Done
Computer Science Education

Computer/Controllers Special

computer tech

Elementary Computer Curriculum

Computers, Processing, & Apps

Professionalism & Ethics in Computing

computer visual arts