Date Range
Date Range
Date Range
I would like to announce the availability of OpenTeacher.
September 27, 2008 by k. At last, I am done at the Universiteit van Amsterdam. In my last project for the semester, an enormous programming. And also re-submitted a paper that got lost in email, nearly.
Lots of people have asked us how it is working with Lulu. However, that path is not without potholes. The Value of Divination, or Just Do Something.
Two Tricks for Tracking Down Typos. By Michelle Weber on October 7, 2014. By Michelle Weber on July 8, 2014.
Is by now a very important piece of my Emacs life. It allows me to get postings to lots of mailing lists using NNTP, i. , using Gnus, i.
En av munkene smilte, men sa ingenting. Laquo;Hva er det du ler av? Raquo; spurte læreren. Jeg har lenge ønsket å lese dette diktet, men av uvisse grunner har jeg aldri lyktes å finne det; Inntil nå! When one is.
Wednesday, March 19, 2014.
How to build GIMP 2. 5 using MinGW in Windows 32-bits. Maybe this post can help people trying to compile GIMP and help developers to improve GIMP building process in Windows.
Thursday, July 16, 2009. The proponents of cloud computing, particularly at Google, would like us to believe that cloud computing is safe. The biggest strength of cloud computing is its ability to turn any internet connected device into your personal computer. Its main selling point is you can access your files from anywhere. There are other issues which I believe to be of lesser importance and will refrain from disc.
This temporary landing page will be replaced when you publish your site.
Everything is possible on an unhampered market. Blogging On Hold For Now. My time to blog has run out for now, unfortunately. Utopianism, Anarchism and the Government. Corporations Abusing the Market, Part 2.
8220; In this talk we discuss the latest advances in academic research and how that could imperil the trust we place in two critical algorithms, RSA and Diffie-Hellman. Below is my Defcon talk. This is a more personal topic on the ethics of our industry, and I hope you find it useful. Posted from the Rio Hotel, Las Vegas, NV.
When you have a large and complex environment, it can get tedious to validate the configuration of all the applications within it and find erroneous configuration. When you use GEM Automation and its centralized configuration feature, it now becomes easier to assess the validity of that environment. If you have any ques.