background preloader

IITs and IISc elearning Courses in Engineering and Science under NPTEL

IITs and IISc elearning Courses in Engineering and Science under NPTEL

http://nptel.ac.in/

Related:  Pesquisar

WECIQ 2012 » Workshop-School in Quantum Computation and Information » Quantum Algorithms In quantum computing , a quantum algorithm is an algorithm which runs on a realistic model of quantum computation , the most commonly used model being the quantum circuit model of computation. [1] [2] A classical (or non-quantum) algorithm is a finite sequence of instructions, or a step-by-step procedure for solving a problem, where each step or instruction can be performed on a classical computer . Similarly, a quantum algorithm is a step-by-step procedure, where each of the steps can be performed on a quantum computer . Although all classical algorithms can also be performed on a quantum computer, the term quantum algorithm is usually used for those algorithms which seem inherently quantum, or use some essential feature of quantum computation such as quantum superposition or quantum entanglement . All problems which can be solved on a quantum computer can be solved on a classical computer.

HackerspaceWiki Hackerspaces are community-operated physical places, where people can meet and work on their projects. This website is for Anyone and Everyone who wants to share their hackerspace stories and questions with the global hackerspaces community. Regular Events Call-in - Call-ins provide an opportunity for existing hackerspaces to provide an update and highlight upcoming events, and new/planned hackerspaces can ask questions. First Sunday each month. Online Education UPDATE: we're doing a live, updated MOOC of this course at stanford-online July-2014 (not this Coursera version). See here: CS101 teaches the essential ideas of Computer Science for a zero-prior-experience audience.

The 2013 Bit9 Cybersecurity Study Help Determine the Impact of Today's Advanced Cyber Attacks For survey results, please view the 2013 Cyber Security Study report. To review further survey analysis, please register for the webinar. From the board room to the data center, global organizations are increasingly aware of the damage that can be caused by today's most sophisticated cyber attacks, including the advanced persistent threat, targeted attacks and malware. But how equipped are these organizations to detect and defend against cyber attacks before they take root in endpoints and servers?

USB / DC / Solar Lithium Ion/Polymer charger [v1.0] ID: 390 - $24.95 NOTE: This product is only designed for use with solar panels sold at the Adafruit store. We cannot guarantee this will work with solar panels purchased elsewhere. Please purchase this kit and panels from Adafruit to ensure optimized functionality! Make your projects to go green this summer with our specialized USB/Solar Lithium Ion Polymer Battery charger! This charger is a very unique design, perfect for outdoor projects, or DIY iPod chargers. We've spent over a year testing and tinkering with this charger to come up with a plug and play solution to charging batteries with the sun and we're really pleased with what we ended up with.

‘Internet of things’ is set to come An “internet of things”, an idea long considered by computer scientists in which everyday objects have individual online profiles, will come to life this autumn at 20 Oxfam charity shops. Technology developed by a UK university consortium allows information such as geographical location, stories about previous owners, video clips and tweets to be combined to form a “social network for objects”, Andy Hudson-Smith of University College London told the British Science Festival in Bradford on Wednesday. Mr Hudson-Smith, who leads the Tales of Things research project, said computer scientists had been discussing an “internet of things” for 15 years, but the idea was only now beginning to bear fruit. The project, funded by a £1.5m grant from the Engineering and Physical Sciences Research Council, labels objects with RFID (radio frequency identification) tags or QR (quick response) codes – the square printed barcodes that are increasingly being taken up in commerce and industry.

TI eZ430-Chronos - 868 MHz Mit dem EZ430-Chronos hat TI ein am Handgelenk tragbares Wireless-Entwicklungssystem mit dem CC430F6137 Controller auf den Markt gebracht. Vollständige Beschreibung in Englisch: The eZ430-Chronos is a highly integrated, wearable wireless development system based for the CC430 in a sports watch. It may be used as a reference platform for watch systems, a personal display for personal area networks, or as a wireless sensor node for remote data collection. Based on the CC430F6137 <1 GHz RF SoC, the eZ430-Chronos is a complete CC430-based development system contained in a watch. This tool features a 96 segment LCD display and provides an integrated pressure sensor and 3-axis accelerometer for motion sensitive control.

NSA Codenames 1 January 2014 NSA Codenames Date: Wed, 1 Jan 2014 16:03:04 -0800 (PST) From: xxxxxx[at]efn.org To: cryptome <cryptome[at]earthlink.net> Subject: List of NSA/GCHQ codemanes affiliated with hacking and bugging. I have compiled a list of codenames used by the NSA/GCHQ that hare affiliated with hacking and bugging.

Related:  Cursos OnlineAcademic Video LecturesFormação para a equipe