Skip to main content

Home/ ACSE Discussion/ Group items tagged authorization

Rss Feed Group items tagged

Peter Beens

There Is More To Computing Than Computer Science - Computer Science Teacher - Thoughts ... - 1 views

  •  
    Last week Doug Peterson pointed me to an article called "Let's not call it computer science if we really mean computer programming." My initial reaction was "Let's not call it computer programming if we really mean software engineering."  Really the author was talking more about the difference between CS and SE than much else.The ACM has a great Computing Careers web site which lists a number of computing fields and degrees. I recommend this series to teachers and guidance councilors all the time. They list five different degree paths:
  •  
    Last week Doug Peterson pointed me to an article called "Let's not call it computer science if we really mean computer programming." My initial reaction was "Let's not call it computer programming if we really mean software engineering."  Really the author was talking more about the difference between CS and SE than much else.The ACM has a great Computing Careers web site which lists a number of computing fields and degrees. I recommend this series to teachers and guidance councilors all the time. They list five different degree paths:
Doug Peterson

ICE Distance Education Portal - 2 views

  •  
    "This material is based upon work supported by the National Science Foundation under Grant No. 0940932. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation."
tech vedic

How to know that my computer is virus or malware infected? - 0 views

  •  
    Malware, as you know is a class of malicious software such as spyware, adware, or viruses that compromise with the system's performance and security. And in majority of cases they infiltrate through general Internet activities --- browsing, surfing, and downloading, or executing programs or files. Hence, most of the virus or malware defense methods are based on encouraging secure Internet access. Though, virus or malware authors are using astute development techniques, keeping a keen eye on the behavior of your machine, can be helpful in winning the battle of computer security. Following are a few notable symptoms, which can be perceived as an indication of virus or malware attack:
tech vedic

How to secure files from other users on external disks? - 0 views

  •  
    External hard-disk or USB drive attached to a system running on OSX is vulnerable, as it could be accessed through other user-profiles easily. Apart from that, if the network file sharing feature is enabled, the external storage device could be accessed by anyone having the authority to get logged into the network. Thus, no matter you encrypted the drive or particular files or not, any unauthorized user can access your data, steal records and make changes into that. What to do? Techvedic, being a leader in tech support, offers you practical and effective solution.
Doug Peterson

Original Apple II Prince of Persia source code published by creator - 0 views

  •  
    The source code of the classic Apple II game Prince of Persia has been published on GitHub by Jordan Mechner, the original author. The game, which was first published by Broderbund in 1989, was developed in 6502 assembly. With the help of Apple II enthusiast Tony Diaz, the code was recovered recently from a 22-year old floppy disk.
Doug Peterson

Overview of Authorization Options | dev.twitter.com - 0 views

  •  
    Twitter supports a few authentication methods and with the shift from basic authentication to OAuth you may be wondering which method you should be using. When choosing which authentication method to use you should understand the way that method will affect your users experience and the way you write your application.
1 - 6 of 6
Showing 20 items per page