Daedalus and icarus (reflexive and intensive pronouns)June Sue
Daedalus and Icarus written by Nick Pontikis- a story that was used as the springboard for the lesson "Reflexive Pronoun and Intensive Pronoun"
#DaedalusandIcarus #NickPontikis
The essential rules of netiquette by HalinaSelf-employed
The golden rule your parents and your kindergarten teacher taught you was pretty simple: Do unto others as you'd have others do unto you. Imagine how you'd feel if you were in the other person's shoes. Stand up for yourself, but try not to hurt people's feelings.
In cyberspace, we state this in an even more basic manner: Remember the human.
Daedalus and icarus (reflexive and intensive pronouns)June Sue
Daedalus and Icarus written by Nick Pontikis- a story that was used as the springboard for the lesson "Reflexive Pronoun and Intensive Pronoun"
#DaedalusandIcarus #NickPontikis
The essential rules of netiquette by HalinaSelf-employed
The golden rule your parents and your kindergarten teacher taught you was pretty simple: Do unto others as you'd have others do unto you. Imagine how you'd feel if you were in the other person's shoes. Stand up for yourself, but try not to hurt people's feelings.
In cyberspace, we state this in an even more basic manner: Remember the human.
CodeWeek - Explaining how to Code to 12 yr old kidsMike Miello
All around Europe, kids are learning to code understand how technology that we use everyday works. Coding provides an alternative approach to solving problems, exploring ideas and having fun.
As part of CodeWeek, I presented at the International School of Amsterdam. The kids were about 12 years old.
I talked about my experience making websites and how by knowing a little bit of code, how it's possible to have fun with any website.
A website can be built. And it can also be destroyed! ...well not really. But the kids really liked that word.
My personal findings: The kids are into Maroon 5, Will.I.Am and Lil Wayne. Boys and girls both love the word hacking. And everyone is texting at 12...I couldn't believe it!
CodeWeek is an initiative was launched by Neelie Kroes' Young Advisors with the support from DG Connect at the European Commission. Sounds fancier than it really is. We're just a bunch of young people with a dream of a world where all sort of crazy ideas are given a chance to change the world. But it's not really about us. (Source: http://codeweek.eu/about/)
Cloud makelaar Cloud trends - the impact of cloudPeter Witsenburg
What will become the next wave after Cloud computing?
Overview of the current Cloud Trends and the next wave within the ICT sector. The real business impact of Cloud computing and our vision for the coming 5 years. Cloud will definitly become the next technology wave that will connect everything with everyone.
Everybody is in to the Cloud, but who owns YOUR Data?
Who is protecting your Intellectual Property Right (IPR) and how can you prevent to loosing all your valuable data?
Digitale data zijn cruciaal voor de werking en het voorbestaan van uw organisatie. En meer van deze data, toepassingen en infrastructuur verhuizen naar de cloud. Ul eert hoe u anno 2015 de uptime van uw IT (en dus ook van uw bedrijf) kan optimaliseren. Uiteraard speelt de cloud hier een belangrijke rol. We laten u zien hoe cloud diensten in relatie kunnen staan tot de continuïteit van uw bedrijfsvoering en welke waarborgen zij eventueel kunnen garanderen.
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...Maurice Dawson
After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among governments, and how it can affect the freedom, democracy and/or peace. Research has been carried out for the creation of the necessary tools for the countermeasures to all this surveillance. One of the more powerful tools is the Tails system as a complement of The Onion Router (TOR). Even though there are limitations and flaws, the progress has been significant and we are moving in the right direction.
PowerPoint template for Narrative Brand ConsultancyKatie Rhead
PowerPoint template created for hellonarrative.com
Clean, modern and sophisticated design in keeping with the style of their website. Custom icons created for the 3 main services to add a little personality and quirkiness to the deck. http://bonniecreative.com/
The Creative Activist Toolkit is a series of PDF booklets designed to help today’s youth impact the world through creativity and social entrepreneurship. Produced by the Global Youth Fund and the Creative Visions Foundation, the toolkit chapters are offered free to download. Email us if you would like to contribute a chapter. This chapter is a PowerPoint template that helps young changemakers create an effective presentation to show funders.
Topics covered are:
-What is Onion Routing?
-What is Tor onion routing?
-How is Tor different from other proxies?
-How Tor works?
-Advantages of Tor
-Disadvantages of Tor
-Tor .onion domains
-Deep web v/s Dark web
-Dark web
-The Hidden Wiki
Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy
Tails or The Amnesic Incognito Live System is a security-focused Debian-based Linux distribution aimed at preservingprivacy and anonymity
All its outgoing connections are forced to go through Tor,[4] and direct (non-anonymous) connections are blocked
The system is designed to be booted as a live DVD or live USB, and will leave no trace (digital footprint) on the machine unless explicitly told to do so. The Tor Project has provided most of the financial support for its development
it is the latest operating system,
An Introduction to pair programming methodsFrank Sons
Pair programming sounds simple, but there are a lot of different methods on how to do it, a lot of mistakes that can be made and it’s not always easy to get started. With this talk, I want to give an introduction to the different ways of pair programming, talk about some myths – and facts – and give you some ideas on how to get started. After this talk, you will know the difference between strong and traditional styles of pair programming and why most people do pair thinking rather than pair programming.
Evolving as a professional software developerAnton Kirillov
This is second edition of my keynote "On Being a Professional Software Developer" with slide comments (in Russian) which contain main ideas of the keynote.
I hope the slides could be used as a standalone reading material.
Presented to "Austin on Rails" May 28, 2013. Describes what technical writers bring to your development team. Also explains what you can do to document your development effort.
I am a passionate reader of topics on new trends and best practices in software development. In my spare time, i like to read essays, listen podcasts, view webinars and examine source code of other developers, in order to learn from them.
Every time I find a quote that proves motivating for me and other developers, I try to save it, and then share it with my friends and classmates.
This work is a collection of twenty quotations that have impacted positively on my work style and way of thinking. The order they are published do not due to any selection criteria, it's just the order they were read and filed.
LESSON 1: INTRODUCTION TO PYTHON, VARIABLES, DNA CODING, AI
Introduction to Python, how to download (Python 3), Create your own Chat Bot. Introducing variables, sequence, programs, Alan Turing and Artificial Intelligence. Big ideas to discuss: DNA Coding and Intelligent design. Create apps which include the use of random number and item generation. Suggested videos on ‘Introducing Python’ and History of Computing. Learn about Mathematical and comparison operators and the importance of indentation in Python. Includes a suggested videos, ‘Big ideas’ discussion, and HW/research projects section.
Slides from Chris Anderson's (formally of WIRED) talk about his book Makers: The New Industrial Revolution.
Taken from http://cba.mit.edu/events/11.08.FAB7/Anderson.ppt
A workshop about the "dark side" of iOS, Objective-C and Xcode. Discussion about private API, why Apple doesn't want you to use it and how they enforce that. What information can you extract from a compiled binary? Let's take a look at the possibilities of reverse engineering including demos and showcases.
Building an Open Source iOS app: lessons learnedWojciech Koszek
Building an Open Source iOS app: lessons learned
Dec 12, 2016, Hacker Dojo (Santa Clara), 6pm
In this talk I'm going to talk about lessons learned from building Sensorama (http://www.sensorama.org), an Open Source sensor platform for data science. The main theme of the talk will be Open Source: what is great about it, what is bad and how you must become a part of the Open Source community to really move quickly and benefit from it. For this project, I did both the code and the design, so you'll have a chance to see how solo-developer deals with time/feature constraints, which tools I've used and what my approach towards development in this mode is. In other words: I'll tell you what I did to stay sane. If the iOS development were a walk in a dark city park, this talk may turn out to be your flashlight. If you like it, star it at GitHub: https://github.com/wkoszek/sensorama-ios
Agenda
https://www.meetup.com/svmobiledev/events/235836893/
Materials
https://github.com/wkoszek/talks/tree/master/svmobiledev2016
Some links from the slides
Fake it till you make it presentation https://developer.apple.com/videos/play/wwdc2014/223
Designing for Future Hardware https://developer.apple.com/videos/play/wwdc2015/801/
References
WWW: http://www.sensorama.org
GitHub (code): https://github.com/wkoszek/sensorama-ios
GitHub (artwork): https://github.com/wkoszek/sensorama-artwork
Author
WWW: http://www.koszek.com
Twitter: https://twitter.com/wkoszek
LinkedIn: https://www.linkedin.com/in/wkoszek/
Email: wojciech (at) koszek.com
Charles Du: Introduction to Mobile UX Designmdevtalk
mDT#4 29. 9. 2016
Learn how to shape a rough app idea into a thoughtful, intuitive design. Find out how successful mobile apps are designed and user-tested. Charles will share design examples from his past work including the NASA app and the Ticketmaster app. This talk will focus on UX design so no coding experience is needed.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
8. SHARD “A database shard is a horizontal partition of data in a database or search
engine. Each individual partition is referred to as a shard or database shard.”
(via Wikipedia)
14. SEED “When referring to computer programming, security, or software a random
seed is a number or other value that has been generated by software using
one or more values. For example, hardware information, time, or date are
different examples of values that can be used to help generate a random
value used by a program or encryption.”
(via Computer Hope)
17. PYTHON “Python is an interpreted, interactive, object-oriented programming language
that was first developed by Guido van Rossum and released in 1991.”
(via Computer Hope)
20. SPAGHETTI CODE
“Slang used to describe a program’s source code that is difficult to read or
follow by a human because of how the original programmer wrote the code.”
(via Computer Hope)
23. DJANGO “Django is a web application framework from the Django Software Foundation
which aims to make the creation of database-driven websites easier.”
(via Computer Hope)
29. YODA CONDITIONS
“Yoda conditions (also called Yoda notation) is a programming style where the two
parts of an expression are reversed from the typical order in a conditional statement.”
(via Wikipedia)
32. DYNAMIC DUMP
“A dynamic dump is the process performed by a programmer that terminates
a program before it has properly closed in order to obtain a list of operating
commands and memory functions that are active at the time of termination.”
(via Computer Hope)