The Latest in HTML5 Eric Bidelman ( G+, @ebidel ) Developer Relations Brown Bag ( View this presentation in a nightly build of Chrome, FF, or WebKit. Also, some of this presentation does require Chrome 14+ dev. ) There's a lot this presentation doesn't cover! CSS3 / WebGL / Canvas HTML5 Forms Device Orientation API FileSystem API IndexedDB History API Websockets, Server-Sent Events XHR2 ... OK...then what does it cover? Lesser known gems Smaller APIs for building more powerful web apps One new/sexy API: Web Audio API Things in the pipeline Semantics & Markup <details> / <summary> <details open="open"><summary>Information</summary><p>If your browser supports this element, it should allow you to expand and collapse these details. <form oninput="result.value=a.valueAsNumber + b.valueAsNumber"> 0<input type="range" name="b">100 +<input type="number" name="a"> = <output name="result"></output></form> Semantically highlight parts of your text: Lorem ipsum dolor, adipiscing elit. Speech input
The Cg Tutorial - Chapter 5. Lighting The Cg Tutorial is now available, right here, online. You can purchase a beautifully printed version of this book, and others in the series, at a 30% discount courtesy of InformIT and Addison-Wesley. Please visit our Recent Documents page to see all the latest whitepapers and conference presentations that can help you with your projects. This chapter shows you how to illuminate the objects in your scenes with light sources. We start by building a simplified version of a commonly used lighting model. "Lighting and Lighting Models" explains the importance of lighting and introduces the concept of a lighting model. 5.1 Lighting and Lighting Models So far, all our examples have been straightforward, focusing on the fundamental concepts that you need to start writing programs. Adding a light to a scene causes many variations in shading and creates more interesting images. Together, lighting and an object's material properties determine its appearance. Figure 5-1 Different Lighting Models
Make Human - Un soft pour vous faire des potes en 3D Make Human – Un soft pour vous faire des potes en 3D Si vous aimez faire un peu de 3D, vous allez être content puisque la version 1.0.0 de MakeHuman vient de sortir. Cette application open source tourne sous Windows, Mac et Linux et permet de modéliser très facilement des êtres humains. Sexe, corpulence, vêtements, cheveux, yeux...etc. Tout y est pour faire votre propre clone ou inventer la Lisa de vos rêves. Au lancement, petit truc rigolo, on a un avertissement assez particulier. Ensuite, tout se fait au clic ou presque... Une fois votre modèle prêt, vous pouvez alors l'exporter au format de votre choix dans votre application 3D préférée. Make Human est téléchargeable ici. Source Vous avez aimé cet article ?
Step by step Guide to Crack WinRAR Hi folks, its been a long time since I have posted some thing technical, so I will be writing about the challenge I got at NIT KU, where I cracked WinRAR 3.80 using a disassembler and will tell you the same here. You can crack any version of WinRAR using this method and need not to pay for the registration fee and you can do this all by your self, easily. Furthermore, major software are cracked using the same way,but just get a bit complex in the methodology. This tutorial is intended for those who are new to cracking and disassembling. Disclaimer – By Reading this tutorial You agree that this tutorial is intended for educational purposes only and the author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by some other, creative application of this tutorial. In any case you disagree with the above statement, stop here. The Tools To perform this hack you will be needing - How to Crack ? Now copy the WinRAR.exe file to desktop. Cheers
Gaussian Filtering - Computer Vision Website Header Gaussian Filtering The Gaussian Smoothing Operator performs a weighted average of surrounding pixels based on the Gaussian distribution. It is used to remove Gaussian noise and is a realistic model of defocused lens. How it works The operator generates a template of values that are then applied to groups of pixels in the image. Sigma defines the amount of blurring: High sigma values require significantly more calculations per pixel Code Image processing classes: gaussianFilter.java Noise generation classes: Demo framework: gaussianFiltering.java The pages were designed and developed for educational purposes only, to demonstrate how computer vision techniques work. Links Mark Nixon & Alberto Aguado, 2002, Feature Extraction & Image Processing, Newnes
Filippo Veniero portfolio SQL injection Computer hacking technique A classification of SQL injection attacking vector as of 2010. SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. In a 2012 study, it was observed that the average web application received four attack campaigns per month, and retailers received twice as many attacks as other industries.[2] History[edit] The first public discussions of SQL injection started appearing around 1998;[3] for example, a 1998 article in Phrack Magazine.[4] Form[edit] Classic SQLIBlind or Inference SQL injectionDatabase management system-specific SQLICompounded SQLI SQL injection + insufficient authentication[7]SQL injection + DDoS attacks[8]SQL injection + DNS hijacking[9]SQL injection + XSS[10] Technical implementations[edit]
Circularly symmetric convolution and lens blur « iki.fi/o This article describes approaches for efficient isotropic two-dimensional convolution with disc-like and arbitrary circularly symmetric convolution kernels, and also discusses lens blur effects. Keywords: depth of field, circle of confusion, bokeh, circular blur, lens blur, hexagonal blur, octagonal blur, real-time, DOF Gaussian function approach The circularly symmetric 2-d Gaussian kernel is linearly separable; the convolution can be split into a horizontal convolution followed by a vertical convolution. This makes 2-d Gaussian convolution relatively cheap, computationally, and "Gaussian blur" has become, partially for this reason, a popular operation in image processing. A Gaussian convolution kernel, used in Gaussian blur (black = -maximum value, grey = 0, white = maximum value) To produce circularly symmetric 2-d convolution, the condition that the 1-d kernel function must satisfy is . , meaning that the kernel must have a Gaussian function as its magnitude function. , modulo . . , where