Skip to main content

Home/ Groups/ ACSE Discussion
1More

CodeLesson - Courses by Tag: Python - 1 views

  •  
    Collection of Python Programming lessons.
1More

Google: The Beginning - WSJ.com - 1 views

  •  
    In November 1999, Douglas Edwards became fledgling Google's first "brand manager," making him employee No. 59. In this excerpt from his new book, "I'm Feeling Lucky," Mr. Edwards gives an inside view of the company's early days, starting with his job interview with co-founder Sergey Brin, then 26 years old.
1More

‪How to choose a strong password - simple tips for better security‬‏ - YouTube - 1 views

  •  
    Sophos's Graham Cluley explains a simple way of creating a complex hard-to-guess password - and how you should never use the same password on different sensitive websites.
1More

Evolution of Computer Languages [Infographic] | Tech the Plunge - 1 views

  •  
    Rackspace has put together a great infographic on the "Evolution of Computer Languages" so you can take a trip down memory lane or learn about it for the first time. If you are interested in more programming choices for kids take a look here.
1More

Gaming in Kodu - 1 views

  •  
    This unit aims to teach students the fundamentals of games programming using Kodu, which is a visual game development environment. Using Kodu students will understand how to build a world and program characters and objects before moving on to designing their own games. Each lesson has a PowerPoint file that outlines the tasks.
1More

New 802.22 Wi-Fi standard has a range of 62 miles | DVICE - 1 views

  •  
    Tired of your Wi-Fi cutting out every time you take your laptop into the bathroom with you? IEEE (also known as the Institute of electronics geeks) has just released a new, official standard for 802.22 Wi-Fi, and this bad boy can cover 12,000 square miles with just one single base station.
1More

Researchers Discover How to Steal Credit Card Data Using Square - 1 views

  •  
    Researchers attending the Black Hat security conference on Thursday demonstrated two ways in which Square - a mobile gadget that enables Android, iPhone, iPad, and iPod touch users to accept credit card payments - can be hacked to steal credit card data, with very little technical hardware required and "no technical skills at all."
1More

Computational Fairy Tales: Posts by Topic - 1 views

  •  
    Computer science concepts as told through fairy tales.
1More

HTML5 Rocks - How Browsers Work: Behind the Scenes of Modern Web Browsers - 1 views

  •  
    "This comprehensive primer on the internal operations of WebKit and Gecko is the result of much research done by Israeli developer Tali Garsiel. Over a few years, she reviewed all the published data about browser internals (see Resources) and spent a lot of time reading web browser source code."
1More

APIs: What is an API in layman terms? - Quora - 1 views

  •  
    What is an API in layman terms? What is an API (with examples please)? Different people describe it in different ways; I'm all confused.
1More

Top 10 Weird-Looking Robots - YouTube - 1 views

  •  
    The Top 10 Weirdest looking robots!
1More

18 Accessible Cloaking Checker Tools | blueblots.com - 1 views

  •  
    Cloaking is a technique wherein different versions of a page are presented to human visitors and search engine crawlers. The content being seen by human visitors which is the actual web page is very different from the content being read by search engine robots crawling the site as it is full of spammy SEP techniques like keyword stuffing.
1More

CodeLesson - Introduction to JavaScript - 1 views

  •  
    Introduction to JavaScript A basic introduction to coding the JavaScript language
1More

14 Epic Tech Fails That Will Live In Infamy [INFOGRAPHIC] - 1 views

  •  
    Most of these products fizzled due to market competition, lack of consumer demand or just plan clunkiness. Others were cool for a time (especially if Leonard Nimoy said so), but were quickly surpassed by other groundbreaking technology.
1More

fogus: 10 Technical Papers Every Programmer Should Read (At Least Twice) - 1 views

  •  
    In this post I will offer some guidance based on my own readings. The papers chosen herein are not intended to act as a C.S. hall of fame, but instead hope to accomplish the following: All papers are freely available online (i.e. not pay-walled) They are technical (at times highly so) They cover a wide-range of topics The form the basis of knowledge that every great programmer should know, and may already
1More

Computer Science Collaboration Project - 1 views

  •  
    Please provide the following information to register for "CSTA: Services and Resources to Engage Youth in Computer Science". CSTA is the Computer Science Teachers Association, a membership organization of 10,000 educators, institutions, and companies dedicated to supporting and promoting the teaching of computer science and other computing disciplines in K-12. This webinar will focus on services that CSTA provides for formal and informal educators and the free resources it provides for helping young people, their families, and their educational community better understand the computing disciplines and the world of opportunities they provide.
1More

Before Netscape: the forgotten Web browsers of the early 1990s - 1 views

  •  
    "Here is a tour of World Wide Web viewing applications, before they became famous. "
1More

Jpoob.jpg (351×720) - 1 views

  •  
    Only in a CS classroom...
1More

Why Johnny Can't Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Ad... - 1 views

  •  
    We present results of a 45-participant laboratory study investigating the usability of tools to limit online behavioral advertising (OBA).We tested nine tools, including tools that block access to advertising websites, tools that set cookies indicating a user's preference to opt out of OBA, and privacy tools that are built directly into web browsers.
« First ‹ Previous 101 - 120 Next › Last »
Showing 20 items per page