Skip to main content

Home/ Groups/ ACSE Discussion
Doug Peterson

bl.ocks.org - 999346 - Dynamic Node-Link Tree (D3) - 0 views

  •  
    This is an example of building a tree layout using the Reingold-Tilford "tidy" algorithm, as described in "Tidier Drawings of Trees". As each new element is added to the graph, it animates in, starting at the previous position of the parent node. Thus, the existing nodes and the new node transition smoothly to their new positions. The animation stops when 500 nodes have been added to the tree.
Doug Peterson

Web Security: Why You Should Always Use HTTPS - 0 views

  •  
    The next time you visit a cafe to sip coffee and surf on some free Wi-Fi, try an experiment: Log in to some of your usual sites. Then, with a smile, hand the keyboard over to a stranger. Now walk away for 20 minutes. Remember to pick up your laptop before you leave.
Doug Peterson

Akshell - 0 views

  •  
    JavaScript is the language of Akshell. Modern web apps usually have a rich AJAX interface created using one of the popular client-side JavaScript libraries; in Akshell you employ it for the server side too. This makes your app more integral and robust; you can even share some code between the client and server sides, e.g., the code of form validation.
Doug Peterson

Computer Viruses and Threats - Explained by Common Craft - Common Craft - Our Product i... - 0 views

  •  
    This video explains the how computer viruses, worms and trojans work and what you can do to protect yourself.
Doug Peterson

Microsoft Introduces Windows 8: One OS for Desktops, Laptops, and Tablets | PCWorld - 0 views

  •  
    Windows 8 is on its way, and it'll be a departure from the Windows we know and love today. That was the message Microsoft sent Wednesday afternoon at the annual D: All Things Digital Conference, taking place near Los Angeles.
Peter Beens

Tutorials \ Processing.org - 0 views

  •  
    I'm really starting to like what I see in Processing. I think this language will be suitable for the full range of students, from the beginners in ICS2O or ICS3x, to the robotics programmers in TEJ4M (via Arduino). Note that it can create standalone applets or applications, which is appealing to the students. 
Doug Peterson

Log.io - Real-time log monitoring in your browser - 0 views

  •  
    Your infrastructure has hundreds of log files spread across dozens of machines. For monitoring deployments and troubleshooting, you need to instantly see composite streams of log messages in a single user interface.
Doug Peterson

Your next job: Mobile app developer? | Mobile | Macworld - 0 views

  •  
    As market demand surges for apps to run on iOS, Android and whatever operating system will power the next wave of smart devices, companies are facing a dearth of mobile development talent. For IT professionals with programming skills, that gap represents a fresh opportunity to embark on a career makeover.
Doug Peterson

News of the World phone-hacking scandal - live updates | Media | guardian.co.uk - 0 views

  •  
    Andy Coulson, David Cameron's former director of communications was arrested today, shortly after a press conference in which the prime minister took "full responsibility" for his appointment but refused to apologise for it.
Peter Beens

Binary search algorithm - Wikipedia, the free encyclopedia - 0 views

  •  
    In computer science, a binary search or half-interval search algorithm locates the position of an item in a sorted array
Peter Beens

Linear search - Wikipedia, the free encyclopedia - 0 views

  •  
    In computer science, linear search or sequential search is a method for finding a particular value in a list, that consists of checking every one of its elements, one at a time and in sequence, until the desired one is found.
Peter McAsh

WIRED - Digital Detectives Deciphered stuxnet - 0 views

  •  
    Long article.
Peter Beens

How to Set Up a File-Syncing Dropbox Clone You Control - 0 views

  •  
    File syncing is a godsend when you work on multiple computers or devices and want to make sure you have the most up-to-date files wherever you log in. While online services like Dropbox may be the most convenient options, there are plenty of reasons you may want to "roll your own cloud" and sync your files to your own web server or just on your local network. 
Doug Peterson

Video: Japanese Robot Talks Like A Human | TechCrunch - 0 views

  •  
    We're one step closer to the Robocalypse: a research team at Japan's Kagawa University has developed a robot that's able to "speak" like a human being. While talking robots are not new by any means, this model isn't using software but a set of mechanical, human-like vocal organs, for example artificial vocal chords or a tongue and lips that are made of silicone
Doug Peterson

CodeLesson - The C# Programming Language - 0 views

  •  
    This course provides an introduction to programming in C#. It is suitable for experienced programmers interested in learning C# and the .NET framework as well as those who are new to coding.
Doug Peterson

Stuxnet: Anatomy of a Computer Virus on Vimeo - 0 views

  •  
    An infographic dissecting the nature and ramifications of Stuxnet, the first weapon made entirely out of code. This was produced for Australian TV program HungryBeast on Australia's ABC1
Doug Peterson

The top 10 hackers of all time | TechRepublic - 0 views

  •  
    Hacking is not a recent invention. In fact, it has been around since the 1930s, although not always associated with computers. Here's a rundown of some of the most noteworthy hackers in history.
Doug Peterson

Computer Viruses and the Internet « Welcome to a Bloggin' Education - 0 views

  •  
    I have spent a lot of time throughout the years researching and collecting facts and stimulus materials on the topic of Computer Viruses. Recently when I was watching my regular TED talk on my phone I watched this talk by Mikko Hypponen. I found it fascinating for the way in which he not only explores and shows some of the history of viruses but also talks of the social and ethical implications of the contemporary viruses being releases. He explores the use of viruses from a cyber-crime and organised-crime perspective.
« First ‹ Previous 381 - 400 Next › Last »
Showing 20 items per page