Skip to main content

Home/ ACSE Discussion/ Group items matching "ars" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Struts 2 Tutorial - 0 views

  •  
    Are you looking for struts tutorial? We provides you a complete reading material on struts and core java Questions and answers which can easily Solve and understandable.
1More

Original Apple II Prince of Persia source code published by creator - 0 views

  •  
    The source code of the classic Apple II game Prince of Persia has been published on GitHub by Jordan Mechner, the original author. The game, which was first published by Broderbund in 1989, was developed in 6502 assembly. With the help of Apple II enthusiast Tony Diaz, the code was recovered recently from a 22-year old floppy disk.
1More

Research Blog: Joining forces to support computer science majors - 0 views

  •  
    Google discusses the trends in CS education and the job market. I am interested in the revised CS AP pilot program they are running.

Equity and CS Education - 0 views

started by grant hutchison on 11 Jul 12 no follow-up yet
1More

Top ten password cracking techniques | Security | Features | PC Pro - 2 views

  •  
    Think your passwords are secure? Think again If you want to ensure your password, and the data it protects, is as secure against hackers as possible then be sure to read The Ultimate Guide to Passwords in the upcoming issue of PC Pro, on sale next week.
1More

Linux computer the size of a thumb drive now available for preorder - 0 views

  •  
    FXI is preparing to launch the Cotton Candy, a tiny computer that looks like a USB thumb drive. The device, which can run either Ubuntu or Android 4.0, has a dual-core 1.2GHz ARM Cortex-A9 CPU, 1GB of RAM, and a Mali 400MP GPU that allows it to decode high-definition video.
1More

The History of Computers 1938 to 2010 [Infographic] - 0 views

  •  
    What a long, strange trip it's been!  How The Giant computers transformed from to modern technology. Yes, I am talking about The History of Computer which started it's journey in 1940s Complex number Calculater to iPad 2010. But there are so many of us who love to see the statistics. Here, we have found an infographic in which you can see the massive size of Computer History in numbers
1More

The 9 Types of Computer Viruses To Watch Out For & What They Do - 0 views

  •  
    I've included every type of computer virus in this article that I felt was relevant, but this isn't a list of every type of virus known to man. Also, I did not include any worms or trojans, two common threats that are similar to viruses but technically not the same. If there is a specific type of virus that you feel was missed and is important, let us know in the comments.
1More

How many Microsoft employees does it take to change a lightbulb? - Fabulous Adventures ... - 0 views

  •  
    I'd always tell these people the same thing -- if it is only five lines of code then go write your own ActiveX object! Because yes, you are absolutely right -- it would take me approximately five minutes to add that feature to the VBScript runtime library. But how many Microsoft employees does it actually take to change a lightbulb?
1More

Java Basics: GUI: Lesson 1 - Introduction - 0 views

  • Giving up control - Event-driven programming. The GUI programming style is referred to as event-driven programming. In this style of programming you set up the graphical user interface and initialize things. It appears that the program just stops and sits there doing nothing! There is no input loop; your program isn't trying to read from the user. You, the programmer, have to learn to give up control in two ways. Your program gives control to the GUI system, and you only get control back to when your listeners are called. At an even higher level, your program has given control to the user. It's the user who selects which of your methods to call by their choice of buttons to click on, menu items to select, etc. Listeners. When the user clicks a button (or uses another GUI component), an event is sent to listener method. Your job as a programmer is to write a listener method for each component. It's the user, not the programmer, who has control, indirectly choosing methods in your program to execute by interacting with graphical user interface components.
1More

6 weird malware tricks hackers use to bypass security - 0 views

  •  
    6 weird malware tricks hackers use to bypass security Security experts presenting in the upcoming SecTor conference reveal six new tactics that cyber criminals are employing to circumvent security and avoid detection.
1More

INFOGRAPHIC : Software Piracy - The Untold Tales - 0 views

  •  
    Piracy and illegal file sharing is a curse for any developer and software company.  As soon as the new version of a popular piece of software hits the streets, it is pretty much being pirated before you can say "o-arrr!".  Same with games, music and movies.  For every person who buys something legally, there's probably 10 who are taking the risk of stealing it.
1More

Hacker story - 0 views

  •  
    This recent story is a good example of impact and dangers of social media websites and "free" email services like Gmail. The impact and consequences for this case are also clearly explained (up to 121 years in jail is significant !!).
1More

Before Netscape: the forgotten Web browsers of the early 1990s - 1 views

  •  
    "Here is a tour of World Wide Web viewing applications, before they became famous. "
« First ‹ Previous 181 - 197 of 197
Showing 20 items per page