\', SouthernWolf.net, \' - \', The portal for cognating wolves™, \'
  Login or Register
 • Home • Downloads • Your Account • Forums • 
Site Menu
null.gif Home
null.gif MembersShow/Hide content
null.gif NewsShow/Hide content
null.gif DownloadsShow/Hide content
null.gif ContentShow/Hide content
null.gif SiteShow/Hide content
null.gif DrugsShow/Hide content
null.gif Physics
null.gif Nature
null.gif Poetry
null.gif Chess
null.gif Website
null.gif Internet
null.gif Tanakh
 
Site Info
Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 8,432,585
  • Today: 453
Server InfoServer Info
  • Oct 17, 2019
  • 06:42 pm EDT
 
 
NukeSentinel™
This is the list of NukeSentinel(tm) banned IP addresses.

  • 178.137.85.*
    • Abuse-Referer
  • 94.103.9.*
    • Abuse-Script
  • 46.119.122.*
    • Abuse-Referer
  • 46.118.158.*
    • Abuse-Referer
  • 141.98.80.*
    • Abuse-Script
  • 178.137.87.*
    • Abuse-Referer
  • 196.247.225.*
    • Abuse-Script
  • 193.36.239.*
    • Abuse-Script
  • 107.158.218.*
    • Abuse-Script
  • 96.9.251.*
    • Abuse-Script
  • 50.2.38.*
    • Abuse-Script
  • 45.82.198.*
    • Abuse-Script
  • 141.98.81.*
    • Abuse-Script
  • 185.89.100.*
    • Abuse-Harvest
  • 185.220.101.*
    • Abuse-Script
  • 171.25.193.*
    • Abuse-Script
  • 51.38.162.*
    • Abuse-Script
  • 144.197.232.*
    • Abuse-Script
  • 45.227.255.*
    • Abuse-Script
  • 1.234.31.*
    • Abuse-Filter

 
Trophy

Thank you, Navy SEALs

 
NukeSentinel™
You have been warned!
We have caught 1939 shameful hackers.

 
SouthernWolf.net: Computers

Search on This Topic:   
[ Go to Home | Select a New Topic ]


Page 3 of 15 (89 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | > | >> ]   

Solid state Swiss Army Knife can save digital lives Score: More about Printer Friendly Send to a Friend Save as PDF Read More... 
Computers

Expatica

Victorinox has pulled from its technology pocket a version of its vaunted Swiss Army knife equipped with a solid state drive capable of holding all of the digital data in a person's life.

A USB drive capable of holding as much as a terabyte of data is folded into a Swiss Army Knife being shown-off at the Consumer Electronics Show that officially opened its doors on Tuesday in Las Vegas.

"It fits in the palm of my hand," Victorinox spokeswoman Renee Hourigan said as she cupped in her palm a one-terabyte drive sheathed in the Switzerland-based company's iconic red casing.

"You can transfer everything to this and then throw your computer's external hard drive out the window," she quipped.

The terabyte-capacity version will be released globally by August and be priced at $3,000 (US), according to Victorinox.

Comments
Posted by Southern on Monday, February 06, 2012 @ 15:35:14 EST (964 reads)

Thinnest silicon-chip wires refuse to go quantum Score: More about Printer Friendly Send to a Friend Save as PDF Read More... 
Computers

Anil Ananthaswamy

nano quantum wires

Saving Moore's law? (Image: Bent Weber)

Not everything is weird at the nanoscale. Wires so small you'd expect them to obey the strange laws of quantum mechanics have instead displayed the same electrical properties as ordinary electrical interconnects.

The finding bodes well for conventional computers, because these tiny, conductive wires could make chips smaller. It could be bad news, though, for the super-fast quantum computers that are hoped to come next.

So far, conventional computers have followed Moore's law: the density of transistors that a conventional integrated-circuit chip can hold doubles approximately every two years, yielding ever-better performance out of ever-smaller devices.

However, it's getting harder to build smaller interconnects to wire up the devices on the silicon chip. As the width of metal wires drops to few tens of nanometres, their resistivity soars because electrons start interacting with nearby surfaces, dissipating more heat and lowering efficiency.

Phosphorous infusion

Also, as wires get down to nanometre scales, quantum behaviour usually dominates. For instance, the entire wire can exist in a superposition of states because of a property called quantum coherence. The wave behaviour of electrons in the wire might then cause them to interfere with each other, disrupting the electrical properties you would expect to see at larger scales.

Comments
Posted by Southern on Thursday, February 02, 2012 @ 00:19:50 EST (900 reads)

Programming Without Coding Technology (PWCT) Score: More about Printer Friendly Send to a Friend Save as PDF 
Computers

A specialist innovative technology for computer programming

Project Description

What?

Software development tool designed for computer users to give them the ability to create any software they need without previous knowledge of computer programming where the user will start to learn how to program and will understand the programming concepts using this tool step by step and without the need to write code by hand at all where the programming done through general purpose visual programming languages.

Why?

Unlike other visual programming languages, PWCT is not limited and target also professional and mainstream programmers by giving them more productivity than traditional text-based programming languages.

How?

Programming Without Coding Technology is a Free-Open Source Visual Programming Languages Framework to create new General Purpose Visual Programming Languages (VPLs) that are a practical alternative to Text based Programming Languages (TPLs).

PWCT comes with four general purpose visual programming languages (HarbourPWCT, PythonPWCT, C#PWCT, and SupernovaPWCT).

DoubleSvsoop: SourceForge

Comments
Posted by Southern on Saturday, January 07, 2012 @ 00:03:56 EST (3808 reads)

Introduction to Computer Programming Score: More about Printer Friendly Send to a Friend Save as PDF 
Computers

Watch it on Academic Earth

Course Description

Programming Methodology is the largest of the introductory programming courses and is one of the largest courses at Stanford. Topics focus on the introduction to the engineering of computer applications emphasizing modern software engineering principles: object-oriented design, decomposition, encapsulation, abstraction, and testing.

Programming Methodology teaches the widely-used Java programming language along with good software engineering principles. Emphasis is on good programming style and the built-in facilities of the Java language. The course is explicitly designed to appeal to humanists and social scientists as well as hard-core techies. In fact, most Programming Methodology graduates end up majoring outside of the School of Engineering.

AcademicEarth: Computer Science I: Programming Methodology

Comments
Posted by Southern on Monday, November 21, 2011 @ 23:49:52 EST (769 reads)

10 Search Engines to Explore the Invisible Web Score: More about Printer Friendly Send to a Friend Save as PDF 
Computers

Saikat Basu

No, it’s not Spiderman’s latest web slinging tool but something that’s more real world. Like the World Wide Web.

The Invisible Web refers to the part of the WWW that’s not indexed by the search engines. Most of us think that that search powerhouses like Google and Bing are like the Great Oracle”¦they see everything. Unfortunately, they can’t because they aren’t divine at all; they are just web spiders who index pages by following one hyperlink after the other.

But there are some places where a spider cannot enter. Take library databases which need a password for access. Or even pages that belong to private networks of organizations. Dynamically generated web pages in response to a query are often left un-indexed by search engine spiders.

Search engine technology has progressed by leaps and bounds. Today, we have real time search and the capability to index Flash based and PDF content. Even then, there remain large swathes of the web which a general search engine cannot penetrate. The term, Deep Net, Deep Web or Invisible Web lingers on.

To get a more precise idea of the nature of this “˜Dark Continent’ involving the invisible and web search engines, read what Wikipedia has to say about the Deep Web. The figures are attention grabbers ““ the size of the open web is 167 terabytes. The Invisible Web is estimated at 91,000 terabytes. Check this out – the Library of Congress, in 1997, was figured to have close to 3,000 terabytes!

How do we get to this mother load of information?

That’s what this post is all about. Let’s get to know a few resources which will be our deep diving vessel for the Invisible Web. Some of these are invisible web search engines with specifically indexed information.

more: MakeUseOf

Comments
Posted by Southern on Tuesday, November 08, 2011 @ 15:20:44 EST (765 reads)

A Showcase of Workstations that’ll Make You Jealous Score: More about Printer Friendly Send to a Friend Save as PDF 
Computers

Henry Jones

Whether you’re a designer, developer, animator, or blogger, your workstation plays a major role in how you get things done. Some of us like a neat, clean, and inspiring workspace, while others require a crazy over-the-top hardware configuration.

In this article, we’ve compiled a showcase of photos that will give you workstation envy. The thing about workstations is that even if you have a nice one, seeing another awesome setup can make you a bit jealous.

workstation

 

workstation



more: WebDesignLedger

 

Comments
Posted by Southern on Tuesday, November 08, 2011 @ 15:16:21 EST (735 reads)



Page 3 of 15 (89 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | > | >> ]   

Topics
Soetoro
 
 
Forums

Papa Mike Creations is BACK!
Energy equals velocity
Black Vortices
Environment
Starships
Microbes
Inverses
Only Down
Question
Hmmm

 
Babes

© ThemeFreaks
 
GCalendar
<< October 2019 >>

S M T W T F S
    12345
6789101112
13141516171819
20212223242526
2728293031   

11/15
• Southern's birthda...
 
bookmark site

Bookmark Us
Bookmark Us

Set as Homepage
Set as Homepage


 
Support RavenNuke™
RavenNuke(tm) v2.40.01
 
Proverbs
1:9, For they shall be an ornament of grace unto thy head, and chains about thy neck.
 
R.O.P.: R.I.P.

Thousands of Deadly Islamic Terror Attacks Since 9/11


Islam spreads like a virus....
more: Islam violence



List of Islamic Terror Attacks For the Past 2 Months
 
Support Our Troops
Support Our Troops


© ThemeFreaks
 
Honey Pot
Bots in the pot!
We have [247] bots in the pot!

 
 
Page Generation: 0.89 Seconds

:: fisubice phpbb2 style by Daz :: PHP-Nuke theme by www.nukemods.com ::
:: fisubice Theme Recoded To 100% W3C CSS & HTML 4.01 Transitional & XHTML 1.0 Transitional Compliance by RavenNuke™ TEAM ::

:: W3C CSS Compliance Validation :: W3C HTML 4.01 Transitional Compliance Validation :: W3C XHTML 1.0 Transitional Compliance Validation ::