Skip to main content

Home/ ACSE Discussion/ Group items tagged network

Rss Feed Group items tagged

Doug Peterson

How Facebook fixed the site: they turned it off and on again. Literally | Technology | ... - 0 views

  •  
    How Facebook fixed the site: they turned it off and on again. Literally An unusual database problem at the giant social networking site could only be cured by taking the sort of action you normally take with a misbehaving PC
Doug Peterson

This is What a Tweet Looks Like - 0 views

  •  
    Think a tweet is just 140 characters of text? Think again. To developers building tools on top of the Twitter platform, they know tweets contain far more information than just whatever brief, passing thought you felt the urge to share with your friends via the microblogging network. A tweet is filled with metadata - information about when it was sent, by who, using what Twitter application and so on.
Doug Peterson

Facebook Attracts More Phishing Attacks Than Google and IRS - 0 views

  •  
    New research from Kaspersky Lab shows that the number of phishing attacks on social networks has increased in the first quarter of 2010, especially at Facebook, the fourth most popular online target.
Doug Peterson

With friends like these ... Tom Hodgkinson on the politics of the people behind Faceboo... - 0 views

  •  
    Facebook has 59 million users - and 2 million new ones join each week. But you won't catch Tom Hodgkinson volunteering his personal information - not now that he knows the politics of the people behind the social networking site
Doug Peterson

Programming, Development Skills in Demand - IT Management from eWeek - 0 views

  •  
    Job opportunities for technology professionals are fluctuating in the United States, but programming and development skills are hot across the country--especially in Java/J2EE. In New York City, IT managers and networking analysts have also seen a sharp increase in demand.
Doug Peterson

Welcome - IBM Programming Contest Central - 0 views

  •  
    The goal of IBM Programming Contest Central is to promote Computer Science and Information Technology opportunities to high school students. We encourage high school students, high schools and post-secondary institutions to use the resources provided in order to host their own programming contests. We also want to build a community of high school Computer Science teachers by providing the chance to network and share resources with each other.
Doug Peterson

600,000+ compromised account logins every day on Facebook, official figures reveal | Na... - 0 views

  •  
    New official statistics revealed by the social networking giant reveal that 0.06% of the more than billion logins that they have each day are compromised. Put another way, that's more than 600,000 per day - or, if you really like to make your mind melt, one every 14 milliseconds.
Peter Beens

Download Qt, the cross-platform application framework | Qt Developer Network - 0 views

  •  
    The Qt SDK includes the tools you need to build desktop, embedded and mobile applications with Qt from a single install. This is the recommended way to get started with Qt.
Peter Beens

Use command line parameters with Remote Desktop Connection - 1 views

  •  
    Instead of starting Remote Desktop Connection from the Start menu, you can start it from the search box in this version of Windows, from the Run dialog box, or from a command line. With these methods, you can use additional command line parameters to control how Remote Desktop Connection looks or behaves.
Peter Beens

A Simple Guide to All That Teachers Need to Know about Digital Citizenship - 1 views

  •  
    Digital citizenship is a key component of the technology and media literacy. We should not only teach our students how to be  good citizens in the real physical world  but how they can be good netizens of the online world  as well.
tech vedic

Top 5 enterprise security threats - 0 views

  •  
    Nowadays, the list of security concerns is getting bigger and bigger. All enterprises have five types of security threats. Here in this tutorial, let's uncover these top five security threats of enterprises.
tech vedic

E-Commerce Security Tips - 0 views

  •  
    With every innovation of e-commerce, consumers are exposed to new security risks. Talking about U.S. e-commerce sales, it is expected to grow about 12 percent in 2013. Thus, making transactions safe online is a quite difficult job now. In this tutorial, we are introducing five fundamental security tips which you should keep in mind for embracing this dynamic industry.
tech vedic

How to fix your biggest Internet security risk? - 0 views

  •  
    Threats related to Java programming language are increasing day by day. It also reminds about the old whack-a-mole arcade game. With the vulnerable version of Java, your computer becomes prone to malware or other threats.
tech vedic

How to Setup Wi-Fi On Your Raspberry Pi via the Command Line? - 0 views

  •  
    In case, you are a Raspberry Pi enthusiast then you should configure your Raspberry Pi for remote access. With this tutorial, you can remotely connect to your Pi as well as activate a Wi-Fi add-on dongle.
tech vedic

Four Free Tools that every Administrator should Know About - 0 views

  •  
    There are certain tools which an administrator should know. Thus, cover up this tutorial to come across these tools.
tech vedic

Hackers use bogus Chrome, Firefox extensions to pilfer social media accounts - 0 views

  •  
    Hacking cases are increasing day by day. There are several tricks played by hackers to steal your personal information online.
« First ‹ Previous 41 - 60 of 67 Next ›
Showing 20 items per page