Skip to main content

Home/ Diigo Community/ Group items tagged distributed computing

Rss Feed Group items tagged

Graham Perrin

Diigo screen savers, Xgrid and BOINC: distributing the load - 78 views

Subject: distributed computing, Diigo services load/performance @ Diigo, a question: Could distributed computing, as outlined in this topic, have a positive effect on load/performance of...

screen saver distributed computing performance suggestion gpd4

mosharraf15

USB Block Free Download- Best USB Drives, External Drives, CDs, DVDs Locker - 0 views

  •  
    Protect Your PC Form USB Dangerous Content USB Block helps to lock your USB drives, External drives, CDs, DVDs etc to set a password which you want to access. This prevents illegal copy, leakage and duplication of your private files and folders.

    The security software protect all viruses and malware by not letting malicious USB Drives, CDs and DVDs access your PC without your permission that submit password. The program also blocks unauthorized network computers; non-system drives, keeping malicious activity as far away from your computers as possible. If you use your computer at home or have several PCs in your office, installing USB Block on every computer is your ticket to safe computing.

    USB Block Features: Simple, easy to use interface Data leak prevention software that protects your data Protection any illegal copy and distribution Block all types of unauthorized storage devices like USB drives, external drives, CDs, DVDs etc Block any USB drives, external drives, FireWire, Enhanced mini-USB, Host Controller Interface (HCI), HP-IL, Com, LPT, IrDA, USB on-the-go, U3, EHCI, RAID Controller, Host adapter, Serial Cable (use with data transfer), Serial ATA, ACCESS.bus and any storage device Block SD Cards, MMCs, Memory Sticks, Digital Cameras, Memory Cell Phones, iPods, Blackberry, Android and Other Mobile Phones. Block any disc that uses the disk hub, bay, combo or CD/DVD drive and allots a drive letter, for example; CD-R, CD-RW, CD-RAM, DVD-R, DVD-RW, DVD-RAM, HD-R, HD-RW, HD-RAM, Blu Ray-R, Blu Ray-RW, Blu Ray-RAM, Floppy Disk A, Floppy Disk B and Zip Drives. Block My Network Places, Map Network drives, Ethernet, Wi-Fi and Bluetooth Networks or any other drive that user access via Run command, IP, DOS or Windows Explorer Block Non-system drives like IDE, SATA, ATA, FATA, Parallel ATA, SCSI, SASI, RAID and all other releva
aderking

The Art of Seamless Communication: Discover the Power of Fiber Optic Splice Closures - 1 views

      I. Introduction   A. Importance of seamless communication in modern society Efficient Exchange of Information: Seamless communication ensures the swift and efficient exc...

Fibiermint

started by aderking on 23 Jul 23 no follow-up yet
David Swift

WMS India | Mobile Computers | Barcode Readers - 0 views

  •  
    Barcode Solutions for Logistics to automate warehouses. This system is enabling companies to identify, move & track goods in real time as they move from manufacturing floor to distribution center to retail store
  • ...1 more comment...
  •  
    Barcode Solutions for Logistics to automate warehouses. This system is enabling companies to identify, move & track goods in real time as they move from manufacturing floor to distribution center to retail store
  •  
    Barcode Solutions for Logistics to automate warehouses. This system is enabling companies to identify, move & track goods in real time as they move from manufacturing floor to distribution center to retail store
  •  
    Barcode Solutions for Logistics to automate warehouses. This system is enabling companies to identify, move & track goods in real time as they move from manufacturiung floor to distribution center to retail store.
Marco Antonio Jonack

How is Diigo backed up? - 207 views

Thank you Joel..... As I offered previously.... Please feel free to log into my account and search for the following bookmark: "Mel's ...

disaster recovery backups

Kenzie David

70-412 Windows Server 2012.pdf - 0 views

  •  
    Take this exam and get a free Second Shot to pass. Sign in to see if you are already eligible. Exam 70-412 Windows Server Published: September 17, 2012 Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil) Audiences: IT professionals Technology: Windows Server 2012 R2 Credit toward certification: MCP, MCSA, MCSE Configuring Advanced Windows Server 2012 Services $150.00 USD* Not in United States? To redeem your free retake, or to see if you are eligible, please sign in. Review Second Shot terms and conditions. Schedule exam This exam may be available in your country for online proctored delivery. Learn more. Convince your boss Connect with us on @MSLearning * Secondary and higher education students are eligible for special academic pricing. See Exam policies and FAQ for details. Pricing does not reflect any promotional offers or reduced pricing for Microsoft IT Academy program members, Microsoft Certified Trainers, and Microsoft Partner Network program members. Pricing is subject to change without notice. Pricing does not include applicable taxes. Please confirm exact pricing with the exam provider before registering to take an exam. Skills measured This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams. Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text. Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of
a2zdefender

Why is it risky to use public wifi? - 0 views

shared by a2zdefender on 12 Jan 21 - No Cached
  •  
    Imagine this. It's a Sunday afternoon, you are hanging with your friends at a cafe, and catching the free wifi to complete the task that you couldn't quite get to during your busy week. Sounds familiar? Did you know public wifi comes with risk? Malicious attacks through public wifi can result in your data being stolen, whether it's a social media account, email, or credit card information.  What is public wifi? Public wifi is available in high-traffic areas, such as airports, shopping malls, cafes, hotels, and resorts. It enables users to access the free internet and often need no login credentials. The public wifi is widespread and common that people frequently connect to them without thinking twice. However, warnings and efforts to educate still make many people browse and download applications.  What are the risks? There is a tremendous amount of risk associated with public wifi. While business owners may believe they are providing an engaging experience to their customers by offering free wifi, an attacker takes advantage of this free service by interesting himself between the victim's communication and hotspot to steal and modify the data.  Man-in-the-Middle Attacks  Man-in-the-middle attacks are the most common and the oldest forms of eavesdropping in which an attacker intercepts the communication between the two parties to steal login credentials, personal information, or financial details. This could be through interfering with the public wifi network because it is easy to crack. This attack exploits the real-time processing of transactions, conversation, and personal information.  Unencrypted Network  Encryption implies that the information passing between the two parties is fully secured and unable to access the third party. Open wifi are unencrypted, that means, anyone can see the data you send. When you connect to the public wifi at the coffee shop, don't do your online banking or anything sensitive. The open nature of the public
Maggie Tsai

Composing Spaces » Blog Archive » preparing writers for the future of informa... - 1 views

  • I clicked on it and found a step-by-step guide by Andre ‘Serling’ Segers at ign.com. After reading the Basics, I clicked on Walkthrough, which contains detailed instructions with screen shots for each step of the game. I went to my Diigo toolbar and clicked "bookmark." I entered the following tags: zelda, wii, guide, and video-games. I then printed out the guide to Part 1 and went back to my living room to play. After I completed Part 1 I went back to my computer where I saw that the Diigo widget in my Netvibes ecosystem had a link to the Zelda guide. I clicked on the link, found Part 2, printed it, and continued playing. Here is the complete process, repeated.
  • each of the online tools-each of the Web 2.0 technologies-I used during this process is as much a semiotic domain as Zelda itself. They are filled with, to borrow from Gee’s list, written language, images, equations, symbols, sounds, gestures, graphs, and artifacts. Consider, for example, the upper left section of the Netvibes RSS reader that I use-and asked students to use:
  • ...10 more annotations...
  • how to use them within the context of a particular action: finding, retrieving, storing, and re-accessing a certain bit of information
  • Only recently, with the pervasiveness of social bookmarking software (such as Del.icio.us and Diigo) and the ubiquity of RSS feed readers (such as Google Reader and Netvibes), have technologies been available for all internet users to compose their own dynamic storage spaces in multiple interconnected online locations.
  • These dynamic storage spaces each contain what Jay David Bolter (2001) calls writing spaces-online and in-print areas where texts are written, read, and manipulated. Web 2.0 technologies are replete with multiple writing spaces, each of which has its own properties, assumptions, and functions
  • If we can see these spaces as semiotic domains, then we must also see them as spaces for literacy-a literacy that is a function of the space’s own characteristics.
  • [T]echnological literacy . . . refers not only to what is often called "computer literacy," that is, people’s functional understanding of what computers are and how they are used, or their basic familiarity with the mechanical skills of keyboarding, storing information, and retrieving it. Rather, technological literacy refers to a complex set of socially and culturally situated values, practices, and skills involved in operating linguistically within the context of electronic environments, including reading, writing, and communicating. The term further refers to the linking of technology and literacy at fundamental levels of conception and social practice. In this context, technological literacy refers to social and cultural contexts for discourse and communication, as well as the social and linguistic products and practices of communication and the ways in which electronic communication environments have become essential parts of our cultural understanding of what it means to be literate.
  • I teach a portion of a team-taught course called Introduction to Writing Arts that is now required for all Writing Arts majors. In groups of 20 students rotate through three four-week modules, each of which is taught by a different faculty member. My module is called Technologies and the Future of Writing. Students are asked to consider the relationships among technology, writing, and the construction of electronic spaces through readings in four main topic areas: origins of internet technologies, writing spaces, ownership and identities, and the future of writing.
  • how can we prepare students for the kinds of social and collaborative writing that Web 2.0 and Web 3.0 technologies will demand in the coming years? How can we encourage students to create environments where they will begin to see new online writing spaces as genres with their own conventions, grammars, and linguistics? How can we help students-future writers-understand that the technologies they use are not value neutral, that they exist within a complex, distributed relationship between humans and machines? And how can that new-found understanding become the basis for skills that students will need as they continue their careers and as lifelong learners?
  • so much of writing is pre-writing-research, cataloguing, organizing, note-taking, and so forth-I chose to consider the latter question by introducing students to contemporary communication tools that can enable more robust activities at the pre-writings stage.
  • I wanted students to begin to see how ideas-their ideas-can and do flow between multiple spaces. More importantly, I wanted them to see how the spaces themselves influenced the flow of ideas and the ideas themselves.
  • The four spaces that I chose create a reflexive flow of ideas. For example, from their RSS feed reader they find a web page that is interesting or will be useful to them in some way. They bookmark the page. They blog about it. The ideas in the blog become the basis for a larger discussion in a formal paper, which they store in their server space (which we were using as a kind of portfolio). In the paper they cite the blog where they first learned of the ideas. The bookmarked page dynamically appears in the social bookmark widget in their RSS reader so they can find it again. The cycle continues, feeding ideas, building information, compounding knowledge in praxis.
    Graham Perrin

    case-sensitive tags - any chance of it happening? - 383 views

    > tag case will be preserved while displaying, but ignored for search Seems to work well for the majority of use cases. Thanks :)

    discussion tag case CamelCase case-sensitive help suggestion

    Graham Perrin

    THANKS! Apologies for the flood. Improvements noted :) - 196 views

    It's a few months since I said a big thank-you to Diigo, for providing such a great service! This (long bank holiday) weekend I have been unusually busy on Diigo and other fronts, mainly because I...

    thanks gpd4 thank you

    johans7

    why am I being charged for it again through Amazon Prime? - 4 views

    Amazon Advanced Search is a powerful tool that greatly improves your product search experience. It allows users to use a wide range of additional filters to better tailor search results to their ne...

    brainstorm amazon inconsistency educator

    tvisha1234

    Database management stays on track. - 0 views

    Writing down and revisiting for reference were the norm of yesteryears. With the inception of computers, pen and paper have almost become folklore. Most of the data computing is done through an exc...

    Database Management Database Development database Mongodb Database management Mongo Db database development

    started by tvisha1234 on 21 Jun 16 no follow-up yet
    tvisha1234

    Database management stays on track. - 0 views

    Writing down and revisiting for reference were the norm of yesteryears. With the inception of computers, pen and paper have almost become folklore. Most of the data computing is done through an exc...

    Database Management Database Development database Mongodb Database management Mongo Db database development

    started by tvisha1234 on 21 Jun 16 no follow-up yet
    tvisha1234

    Database management - enjoy the difference. - 0 views

    •  
      We offer a full-cycle database management services to our clients of distinct industry verticals and provide them a high performance and cost effective database solutions. Our database designers continuously configure, analyze, create and implement the industry best-practices for your existing databases. Our installations and configurations made for your database are kept in mind to cater the future storage needs of high volume data
    1 - 14 of 14
    Showing 20 items per page