Skip to main content

Home/ ACSE Discussion/ Group items matching "connection" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Doug Peterson

Mozilla - Webmaker - mozilla.org - 1 views

  •  
    Mozilla Webmaker wants to help you make something amazing on the web. With TOOLS, PROJECTS and EVENTS that help you create, learn and connect. Our goal: move millions of people from using the web to actively making the web. Creating a new generation of webmakers, and a more web literate world.
Doug Peterson

Five Uses For A USB Stick You Didn't Know About - 2 views

  •  
    "We've all used USB sticks to transport files between computers and back up our files, but there are other cool things you can do with a USB stick. You can use one to lock and unlock your computer - just like in the movies. You can also use a USB flash drive to quickly connect to a wireless network on all your PCs, increase your computer's performance, or even run a web server - directly from the USB stick itself."
Peter Beens

Arduino - Windows - 0 views

  •  
    This document explains how to connect your Arduino board to the computer and upload your first sketch.
Peter Beens

Algorithms, 4th Edition by Robert Sedgewick and Kevin Wayne - 0 views

  •  
    Textbook. The textbook Algorithms, 4th Edition by Robert Sedgewick and Kevin Wayne [ Amazon · Pearson · InformIT ] surveys the most important algorithms and data structures in use today. The textbook is organized into six chapters: Chapter 1: Fundamentals introduces a scientific and engineering basis for comparing algorithms and making predictions. It also includes our programming model. Chapter 2: Sorting considers several classic sorting algorithms, including insertion sort, mergesort, and quicksort. It also includes a binary heap implementation of a priority queue. Chapter 3: Searching describes several classic symbol table implementations, including binary search trees, red-black trees, and hash tables. Chapter 4: Graphs surveys the most important graph processing problems, including depth-first search, breadth-first search, minimum spanning trees, and shortest paths. Chapter 5: Strings investigates specialized algorithms for string processing, including radix sorting, substring search, tries, regular expressions, and data compression. Chapter 6: Context highlights connections to systems programming, scientific computing, commercial applications, operations research, and intractability.
Doug Peterson

Coding Horror: Should All Web Traffic Be Encrypted? - 0 views

  •  
    The prevalence of free, open WiFi has made it rather easy for a WiFi eavesdropper to steal your identity cookie for the websites you visit while you're connected to that WiFi access point. This is something I talked about in Breaking the Web's Cookie Jar. It's difficult to fix without making major changes to the web's infrastructure
Peter Beens

Setup - App Inventor for Android - 0 views

  •  
    App Inventor runs through a Web browser. If you're using a phone, you work with the phone connected to your computer by a USB cord. Your app will emerge on the phone bit by bit as you work. If you don't have a phone, there's a phone emulator included with the App Inventor setup package that you can use instead. When you're done building, you can "package" your finished app to produce an "application package" (Android apk file) that can be shared around and installed on any Android phone, just like any other Android app.
tech vedic

Transfer files to another Mac using Screen Sharing - 0 views

  •  
    You can easily transfer files between Macs through USB drive or a conventional file-sharing services via network connections. Also, these days' synchronization services like BitTorrent Sync, Dropbox, and Google Drive are highly used. Nowadays, you can use Mac Screen Sharing services to transfer files.
Doug Peterson

The History of Programming Languages Infographic - 1 views

  •  
    The History of Programming Languages Infographic http://t.co/bCg9BUNUny In a world of increasing inter-connectivity, programming languages form the foundation. Did you know that the first programming language is over 100 years old and was written by a woman, Ada Lovelace? Join as us we delve into the history, evolution, and prevalance of programming languages over the years. In addition to outlining the history of languages and how each is traditionally used, you'll find information on what type of vulnerabilities are most common in programs developed in each language and which flaws are most typically fixed once discovered.
Doug Peterson

40 People Who Changed the Internet - 0 views

  •  
    The world has become tightly connected since the internet. The web itself has replaced the practice of reading newspaper. Most of us now communicate through e-mails instead of paper and pen. We now watch networks or movies online, it has even become a wide business venture, so much so we can now make purchase and pay our bills through the internet. The web has also transformed friendships through various social media.
Doug Peterson

What's the Difference Between 3G and 4G? - Life Scoop - 0 views

  •  
    If you've ever researched a smartphone purchase, the terms 3G and 4G have probably shown up on your radar at some point. Both refer to a connection method for mobile devices and a "generation" of mobile technology.
Doug Peterson

UNHOSTED - Freedom from web 2.0's monopoly platforms - 0 views

  •  
    A website is a specific web app, hosted on a specific server farm. There is a limited number of big centralized websites, that we all connect to. This is not how the web was intended to be.
Doug Peterson

How to Stay Safe on Public Wi-Fi Networks - 0 views

  •  
    Just because most wireless routers have a firewall to protect you from the internet doesn't mean you're protected from others connected to the same network.
Doug Peterson

Secure web browsing cracked by BEAST | Naked Security - 0 views

  •  
    A pair of researchers have unveiled a serious new attack on web browser security. The researchers used this week's Ekoparty security conference in Buenos Aires to unveil a new tool that attacks TLS and SSL, the cryptographic protocols used to establish secure web connections.
Doug Peterson

CS Connections from the University of Michigan - 1 views

  •  
    Do you need resources to introduce your high school students to the field of computer science? Would you like to more fully integrate principles of computing and computational thinking into your classroom? The University of Michigan's CS4HS workshop is designed to support the activities of computer science teachers and to establish a dialog about the focus and requirements of collegiate CS programs, so that high school students can be better prepared for a future in computer science.
‹ Previous 21 - 36 of 36
Showing 20 items per page