37 private links
TMSU is a tool for tagging your files. It provides a simple command-line tool for applying tags and a virtual filesystem so that you can get a tag-based view of your files from within any other program.
TMSU does not alter your files in any way: they remain unchanged on disk, or on the network, wherever you put them. TMSU maintains its own database and you simply gain an additional view, which you can mount, based upon the tags you set up. The only commitment required is your time and there's absolutely no lock-in.
Microsoft started the war against Linux at least as far back as 1996. It has been going on for 15 years or more:
http://groups.google.com/group/comp.os.linux.advocacy/msg/67a9771825742ab0
Microsoft doesn't even deny any of the tactics below. In fact, they have defended these activities in court hearings and commission hearings as "typical of the PC industry", because they control the PC industry.
Nous déménageons des pianos depuis 30 ans
En plus de notre grande expérience en déménagement de pianos, notre patron, qui est également un déménageur, est un accordeur de piano qualifié. Nous pouvons déménager tous les types et grandeurs de pianos. Nous faisons également l'entreposage et la réparation de pianos.
he IntelliSkin™ is a protective sleeve for the Apple iPad Mini featuring GDS® Technology. The IntelliSkin™ will bring drop protection to your device and features an integrated connector which is molded directly into the skin.
IPFire is the professional and hardened Linux firewall distribution that is secure, easy to operate and coming with great functionality so that it is ready for enterprises, authorities, and anybody else.
Cryptographic hash functions like SHA-1 are a cryptographer’s swiss army knife. You’ll find that hashes play a role in browser security, managing code repositories, or even just detecting duplicate files in storage. Hash functions compress large amounts of data into a small message digest. As a cryptographic requirement for wide-spread use, finding two messages that lead to the same digest should be computationally infeasible. Over time however, this requirement can fail due to attacks on the mathematical underpinnings of hash functions or to increases in computational power. Today, more than 20 years after of SHA-1 was first introduced, we are announcing the first practical technique for generating a collision. This represents the culmination of two years of research that sprung from a collaboration between the CWI Institute in Amsterdam and Google. We’ve summarized how we went about generating a collision below. As a proof of the attack, we are releasing two PDFs that have identical SHA-1 hashes but different content.
PCs built with Intel® vPro™ Technology include many features and capabilities, some of which must be “turned on” in the BIOS. A good starting point is to take an inventory to determine if your PCs support Intel vPro Technology. After you have the inventory in hand, you will be able to plan how you are going to use each technology and come up with an action plan for activating the technology.
Before iridiumbrowser, we had to decide if we wanted to have cutting edge technologies like sandboxed processes, WebRTC, WebUSB … , or if we wanted to use a browser that respects our privacy. So we decided to use the power of free software and build a browser that can do both. We analysed the code of Chromium and stripped out the functionality which exposes data to others in a way we don‘t like.
Our ambition is to get builds for Debian, Ubuntu, openSUSE, fedora, Windows and OS-X a couple of days after a new release of Chromium.
To achieve this, we need help from individuals and organisations, who have the same intention. Currently there are weeks between a new release of Iridium and Chromium.
Please take this into consideration for your personal usage of the browser as you might be at risk when surfing unknown and potentially dangerous websites!
We feel, that as an application browser or as browser for trusted websites, this is acceptable.
This page describes my experiences with the HTC One S, a handy little Android phone I have on a loan by a friend. It's a neat device because it's small and I can wipe it with Cyanogenmod (CM) to have more control over the machine, including running more free software on it and removing the stock proprietary google apps shipped with the phone. It also happens that CM has more recent versions of Android for the phone, which only runs Android 4.1, an unsupported release.
Home router is necessary to connect you to the Internet but it is idle most of the time, just eating electricity. Why not use it for more tasks? With powerful hardware, Turris Omnia can handle gigabit traffic and still be able to do much more. You can use it as a home server, NAS, printserver and it even has a virtual server built-in.
Titre : L'intégration des iPad en classe d'ILSS
Animation : Sylvie Rouleau
Description :
Présentation de quelques projets d'écriture et de développement de la littératie sur le iPad vécus en classe d'ILSS à l'école secondaire Cavelier-De LaSalle
Type d’atelier : J’explore et je crée
Préalables : Aucun
Titre : Aides technologiques et TDAH : des outils pour soutenir l’attention et la réussite
Animation : Jean Chouinard
Description :
Présentation de différentes fonctions d’aide technologique de type logiciel portable ou applications tablette tactile pouvant être exploitées par l’élève TDAH pour soutenir son attention dans différentes tâches d’écriture, de lecture ou de gestion et d’organisation et ultimement sa réussite scolaire et éducative.
Type d’atelier : J’écoute et j’apprends : conférence / présentation
Préalables : Aucun
Titre : Sources fiables… tout n’est plus noir ou blanc
Animation : André Roux
Description :
Apprendre à développer un regard critique pour être capable de s’informer de façon éclairée.
Type d’atelier : J’écoute et j’apprends : conférence / présentation
Préalables : Aucun