This short discussion of the tiling problem shows a good example of how switching two tiles yields a solution for a small area that can't be generalized to a larger one.
An online magazine editor claims "the web is considered public domain" to justify copying anything she wants and re-publishing it on her site. Astounding.
For the most part, we've grown to perceive of "computing" as being equated with specific familiar "artifacts" such as the "computer", the "program" that's installed on a computer, and the "files" that are stored on that computer's "desktop
Such thinking, he said, was becoming less and less relevant as the way people used computers and what they did changed
Connections rather than computers were more important
To prosper and stay relevant, he said, Microsoft must embrace this change and get to grips with a world that cares about "continuous services" rather than computers
This article briefly touches on many aspects of the Network Effect and the lock-in that can occur because of it. It is interesting that the communities that make some Web 2.0 services so successful are also the cause of their problems.
The purpose of ATHEN is to collect and disseminate best practices in access technology within and for the higher education environment as well as present a collective voice for the professional practice of access technology in higher education.
So, I just used this for my blog: http://tamesequels.blogspot.com, and will shortly be posting a digital literacy lab for this. Basically, if you want to put a blog feed as a widget on another blog, you can customize one for free on this website. It's really easy and it gives you a code at the end of the customization to post. Check out my blog to see one. It's the "My Photography" section, and you'll see how it posts everything from that blog really nicely. A great tool for making your website alive.
If you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?
One of the simplest ways to gain access to your information is through the use of a Brute Force Attack. This is accomplished when a hacker uses a specially written piece of software to attempt to log into a site using your credentials.
And how fast could this be done? Well, that depends on three main things, the length and complexity of your password, the speed of the hacker's computer, and the speed of the hacker's Internet connection.
Now, I could go on for hours and hours more about all sorts of ways to compromise your security and generally make your life miserable - but 95% of those methods begin with compromising your weak password. So, why not just protect yourself from the start and sleep better at night?
The most awesome 450 page presentation ever." That's how the authors call this slide show—and I agree. It is awesome. But knowing that it was made using only Google Docs and no extra software whatsoever, makes it truly unbelievable.