public marks

PUBLIC MARKS from benoit

20 February 2005

Baccalauréat en ingénierie - génie informatique -École Polytechnique de Montréal

Programme des cours à l'école Polytechnique de Montréal, baccalauréat génie informatique

Programme 1-175-1-0

Programme des cours de l'université de Montréal, niveau Baccalauréat.

The Atom Syndication Format

draft-ietf-atompub-format-05

17 February 2005

fac.etio.us

by 17 others
"It's a thought experiment embodied in software from Siderean, a company that creates faceted classification systems for big-ass enterprises."

Ce qui manque encore à l'informatique Internet - La chronique d'Alain Lefebvre

by 4 others (via)
PHP, l'Open Source, le haut débit... L'informatique Internet fait des progrès mais les Web services basés sur REST, l'interface client riche et le Web sémantique sont les 3 prochaines grandes étapes.

16 February 2005

RDF Gateway

by 1 other
RDF Gateway is a platform for the development and deployment of Semantic Web applications. The Semantic Web is an extension of the current Web that allows computers to understand the meaning of information published on it through the use of a new markup technology called the Resource Description Framework (RDF).

launch ! - Z.I. 2

Longue vie à blogmarks.net donc, nous vous préparons plein de petites surprises pour les semaines qui viennent :)

15 February 2005

Jabber/XMPP

by 1 other
Présentation du protocole XMPP (Jabber).

MySQL Reference Manual :: F Expressions régulières MySQL

by 1 other
A retenir : il faut échapper les caractères spéciaux avec deux antislashs, la première étant consommée par mysql lui-même.

14 February 2005

Installation et utilisation de base de Subversion - Tout Programmer

by 1 other
Deux notions sont particulièrement importantes avec un gestionnaire de versions: les branches et les tags (étiquettes).

13 February 2005

Les tags, cette idée simple que redécouvre le Web

by 7 others
Associer des mots-clés à des photos, des liens ou des informations pour mieux les agréger : une idée loin d'être neuve mais qui voit seulement depuis peu fleurir des services multiples. Flickr, del.icio.us, Technorati ou Metafilter sont en train de relier le Web de la blogosphere et des flux RSS.

OpenSSH

OpenSSH est un ensemble d'outils de connexion réseau utilisés pour accéder à des machines distantes de façon sécurisé.

09 February 2005

Media Control

...Let me begin by counter-posing two different conceptions of democracy. One conception of democracy has it that a democratic society is one in which the public has the means to participate in some meaningful way in the management of their own affairs and the means of information are open and free....

06 February 2005

United States Patent: 6,839,702

(via)
A system highlights search terms in documents distributed over a network. The system generates a search query that includes a search term and, in response to the search query, receives a list of one or more references to documents in the network. The system receives selection of one of the references and retrieves a document that corresponds to the selected reference. The system then highlights the search term in the retrieved document.

XUL Coding Style Guidelines

XUL, pronounced as zool, stands for "XML-based User Interface Language", is a cross platform way of describing user interface.

04 February 2005

Main Page - wiki.mozilla.org

wiki du projet mozilla

Accueil - Extensions.geckozone.org

by 29 others
Cette section du portail Geckozone est une liste (si possible exhaustive) des extensions traduites en français.

03 February 2005

02 February 2005

Javascript md4, md5 and sha1 algorithms

by 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

benoit's TAGS

search:

limit:50 100 200

ad   advertising   ajax   amazon   apache   api   app   apple   architecture   atom   blog   blogmarks   blogmarks.net   book   business   cache   code   conference   data   database   dave winer   del.icio.us   design   desktop   dev   developer   development   distributed systems   facebook   finance   firefox   flash   flickr   format   framework   france   free   fun   google   http   ietf   im   internet   iphone   java   javascript   job   linux   media   microsoft   mobile   mozilla   music   mysql   network   odfconverter   open source   openid   openxml   performance   php   politique   privacy   programming   programming language   protocol   publicité   python   rdf   rest   rfc   rss   ruby   seattle   security   semantic   semantic web   server   social   social graph   société   software   specification   storage   tag   test   twitter   uri   us   video   w3c   web   web services   web2.0   wiki   wikipedia   xml   xul   yahoo   znarf