Bosky and Menot are two friends who participated in GSF Hacks Prelims on HackerEarth, and both of them easily qualified for the on-site round. Bosky wants to team up with Menot for the on-site round but Menot has a date with his girlfriend the same day. Bosky thus plans to spoil Menot’s date and trigger their breakup.
Menot and his girlfriend both use a chat application developed by Bosky. Bosky can read all the messages sent using his app, so he first wants to know whether they have postponed or preponed their date or not. To confirm the same Bosky has decided to search for all the days they have discussed about in past week and see which of the day is decided for the date. GSF Hacks is on 19th and 20th, if they are going on a date on some other day Bosky can attend GSF Hacks with his friend, otherwise he will have to come up with some other idea. Bosky knows that when his friend and his [friend’s] girlfriend have to choose a day, the girlfriend's choice is given twice more weightage than Menot's.
In the news all over its talking about how to protect yourself in case you were the victim of the data breach of Equifax. The bigger question for us should be how was the system hacked and how do Equifax know if you were the one hacked? 143 million records can't be hacked in few minutes. It has to be a long process to be getting hold of such huge number of records. Isn't it ever more scary to realize that Equifax security couldn't even figure out how to stop the slow hack?
Last news I read said that Equifax is blaming this on third party vendor patch problem. There might be a patch problem in any software - but where was your security detection when the files of records were being accessed? If you know which files of records were accessed then why can you not just compile a list of the names and notify the people who were affected? Equifax is needing last 6 digits of SSN and last name to tell people if they were affected. But the fact of matter is Equifax holds our data - they know our full SSN, home address, date of birth, driver license info- then how hard is it to let those people know and not keep people guessing or getting vague answer from equifaxsecurity.com.
The only reason I can think is to save the postal fee of 143 million letters.
Is your kid a STEM super star? Along with technology education TymeMachine also encourages and motivates students to fall in love with science, math and technology. There are many students that I came across are very smart and I absolutely love talking to them. So I am thinking to showcase one kid every week in TymeMachine STEM Super Star section. Age group is 6 to 13.
If you believe your kid is a STEM Star, please and you are interested to showcase them then Please send me their name, how old are they, which grade they are studying and which school do they go to. Also send a picture of them engaged with STEM.
We will schedule interview date with you.
Send your response at firstname.lastname@example.org
An estimated 74% of Americans over the age of 18 use social networking websites. 24% of teens go online “almost constantly,” facilitated by the widespread availability of smartphones.
Facebook, Instagram, and Snapchat are the most popular , and 71 percent of teens say they use more than one social media site. A survey of over 600 teens from 2012 found that nearly all shared their real name and photos of themselves , and most shared their school name, birthdate, and the city or town where they lived. Another 2015 Pew report - PDF on the role of technology in teen romantic relationships notes that half of teens say they’ve used Facebook or other social networking sites to express romantic interest in someone, and many use these sites to display their romantic relationships.
It is the duty of teachers and parents to educate kids about the social media.
Maria Sciaroni is an up and coming freelance writer who has previously taught as a high school English teacher. She has written several research articles through her University training and is searching for a way to develop her writing skills online. You can find Maria on LinkedIn at this address https://linkedin.com/in/maria-sciaroni-98b9a5141
New “toys” come out every day. From a new model of a toy truck to the newest iPhone, toys are all the rage, literally. Technology toys can be defined and categorized in several ways. Technology itself spans from using a mechanical pencil to building a computer system. With these definitions in mind, “Technology Toys” spans its perspective from the so-called simple to the newest technology still being created and, often, destroyed again only to be overcome by something even greater.
A Georgetown University study reveals that occupations in STEM fields are the second-fastest growing in the nation. (Health occupations are first.) This raises the obvious question: Are we producing enough STEM workers to staff the workforce of expanding STEM industries?
Currently our K-12 students are talented enough in math and science to fill our rapidly growing need for STEM workers. However, more than 75% of those talented students do not enter STEM majors in college.
Human User Interface is a complicated topic which dwells between the balance of design and usability. Some website are great looking but very hard to use. Then some websites may not look great but very user friendly like craigslist. How do you strike a balance between the two?
Blog In Box is a new tool for Raspberry Pi from Automattic, the development company behind WordPress.com.
It is a graphical interface that builds an installer image for the Raspberry Pi. This software turns your Raspberry Pi into a blogging platform, that serves up a website (similar to WordPress).
However, Blog In a Box takes full advantage of the Raspberry Pi hardware. You can automatically capture photographs from the Pi Camera or access data from the SenseHAT.
In this video you will learn how to setup a raspberry pi with a wordpress blog with an all in one tool called Blog In A Box! Grab your own Raspberry Pi 3 Kit here: http://amzn.to/2m0SW8r