Skip to main content

Home/ ACSE Discussion/ Group items tagged computational

Rss Feed Group items tagged

Peter Beens

Neil Postman: Five Things We Need to Know About Technological Change - Wikiversity - 0 views

  •  
    First, that we always pay a price for technology; the greater the technology, the greater the price Second, that there are always winners and losers, and that the winners always try to persuade the losers that they are really winners Third, that there is embedded in every great technology an epistemological, political or social prejudice. Sometimes that bias is greatly to our advantage. Sometimes it is not. The printing press annihilated the oral tradition; telegraphy annihilated space; television has humiliated the word; the computer, perhaps, will degrade community life. And so on. Fourth, technological change is not additive; it is ecological, which means, it changes everything and is, therefore, too important to be left entirely in the hands of Bill Gates. And fifth, technology tends to become mythic; that is, perceived as part of the natural order of things, and therefore tends to control more of our lives than is good for us. .... When a technology become mythic, it is always dangerous because it is then accepted as it is, and is therefore not easily susceptible to modification or control.
Doug Peterson

60+ educational resources for teaching yourself anything. - 2 views

  •  
    This collection of links and applications highlights just the tip of the iceberg of educational resources that are available on the web. If you are interested in teaching yourself a new skill or learning a new topic indepth in your spare time, hopefully some of these will be of use. ** Collection of Computer Science courses **
Peter Beens

Turn an Old Computer into a Networked Backup, Streaming, or Torrenting Machine with Ubuntu - 0 views

  •  
    You've heard the word "server" thrown around a lot, but usually in the context of web sites or big companies that have a lot of data to store. In reality, a server can be just as useful in your home. In this guide, we'll walk through how to create your own server at home that you can put in the closet and leave on 24/7, ready to do any streaming, downloading, or backup you might need at a moment's notice.
tech vedic

How to know that my computer is virus or malware infected? - 0 views

  •  
    Advantages: Keeps system running smooth Protection against Internet frauds
tech vedic

How to do smarter file searches in Windows 8? - 0 views

  •  
    For searching your important files and documents, Windows 8 dynamic search option immediately displays and filters results. But, for documents located outside Libraries you can use File Explorer formerly known as Windows Explorer.
tech vedic

Regain your PC's administrator rights, even if you don't have the password - 0 views

  •  
    Forgot the password of your Windows PC administrator level account? This hampers your work a lot. This tutorial can give access to it.
tech vedic

How to family-proof your PC - 0 views

  •  
    It is important to safeguard your PC against malicious software. You need to resist dodgy downloads, suspicious pop-up and ads.
tech vedic

Your-tablet- is-it-secure - 0 views

  •  
    Nowadays, mobile computing devices let you access the web smoothly. But, at the same time it is also bringing several online threats for your device.
Doug Peterson

What Is...every file format in the world - A through E - 0 views

  •  
    Almost Every file format in the world!
Doug Peterson

Miss Blomeyer's Website - 0 views

  •  
    Exploring Computer Science Assignments with Scratch
Doug Peterson

http://www.lukew.com/touch/TouchGestureGuide.pdf - 0 views

  •  
    Touch reference guide - for designers and users - all of the tapping and other gestures for computer manipulations
Doug Peterson

How to crash the Internet | ZDNet - 0 views

  •  
    In a report from New Scientist, Max Schuchard a computer science graduate student and his buddies claim they've found a way to launch DDoS attacks on Border Gateway Protocol (BGP) network routers that could crash the Internet.
Doug Peterson

7 Hottest Hacker Chicks in Internet History | Top 10 Lists & Much More at Ranker - 0 views

  •  
    These 7 computer freaks are a security breach we'd totally let happen. To us. As men. Hacker chicks have got to be the internet's greatest product. Their mix of intelligence, geekiness and sex appeal is a code nobody wants to crack, and the fact that they play with fire makes them that much hotter. So here are the hottest hacker chicks in internet history along with their stories, what they're good at and a few pics of what they look like.
Doug Peterson

Computer Science Teachers Association - Brochures, Posters, Videos - 0 views

  •  
    Brochures, Posters, Videos
Doug Peterson

Networking software saves schools money on PCs - Technology & Science - CBC News - 0 views

  •  
    Underfunded schools in Canada and other countries are using a new, inexpensive, Canadian-made networking software to provide computer access to more students for less money.
Doug Peterson

The Zombie Network: Beware 'Free Public WiFi' : NPR - 0 views

  •  
    It's in your airports, your coffee shops and your libraries: "Free Public WiFi." Despite its enticing name, the network, available in thousands of locations across the United States, does not actually provide access to the Internet. But like a virus, it has spread - and may even be lurking on your computer right now.
Doug Peterson

SSL Search : - Web Search Help - 0 views

  •  
    With Google search over SSL, you can have an end-to-end encrypted search solution between your computer and Google. This secured channel helps protect your search terms and your search results pages from being intercepted by a third party. This provides you with a more secure and private search experience.
Doug Peterson

How Secure Is My Password? - 0 views

  •  
    Determine how long it would take a computer to hack your password
Doug Peterson

Non-Myths About Programming - Computer Science Teacher - Thoughts and Information from ... - 0 views

  •  
    Non-Myths About Programming
Peter McAsh

China's Electronic Waste Village - 0 views

  •  
    The city of Guiyu is home to 5,500 businesses devoted to processing discarded electronics, known as e-waste. According to local websites, the region dismantles 1.5 million pounds of junked computers, cell phones and other devices a year.
« First ‹ Previous 161 - 180 of 296 Next › Last »
Showing 20 items per page