mercredi 26 décembre 2012

Robot Master

Wired News (08/06/12) Christina Bonnington

Carnegie Mellon University professor Manuela Veloso has spent her career developing autonomous collaborative robots (CoBots).  The CoBots run a combination of C++, Python, and Java, and consist of a camera and laptop on a wheeled base, while a Microsoft Kinect is used for navigation and obstacle avoidance.  Users assign tasks to the CoBot via a Web interface, and once the task is completed, the CoBot can either return to its home base or move on to the next assigned task.  Veloso eventually wants to develop CoBots that can perform daily human tasks alongside their human masters.  "I decided that ... these robots ... need a symbiotic relationship with humans, and they need to proactively ask for help when they need help," Veloso says.  Her research is focused on symbiotic autonomy, in which robots move through the world by themselves, but if they come across uncertainties about their location, or if what they are doing surpasses the threshold of their capabilities, they stop and ask humans for help.  "The reason why I came up with symbiotic autonomy was exactly because I started looking at these robots performing tasks and services for humans as part of a team," Veloso says.

vendredi 14 décembre 2012

A full e-commerce tutorial for J2EE with netbeans

Authenticate web applications BASIC, DIGEST, FORM, and CLIENT-CERT

Securing Web Applications

Web applications are created by application developers who give, sell, or otherwise transfer the application to an application deployer for installation into a runtime environment. Application developers communicate how to set up security for the deployed application by using annotations or deployment descriptors. This information is passed on to the deployer, who uses it to define method permissions for security roles, set up user authentication, and set up the appropriate transport mechanism. If the application developer doesn’t define security requirements, the deployer will have to determine the security requirements independently.

Some elements necessary for security in a web application cannot be specified as annotations for all types of web applications. This post point to links to give you a start for how to secure web applications using annotations wherever possible.

samedi 8 décembre 2012

In Challenge, College Students Pitch Tech Ideas

From ACM TechNews:
In Challenge, College Students Pitch Tech Ideas
(12/06/12) Michael Endler

The College Challenge, a competition cosponsored by the Syracuse University's School of Information Studies and Major League Baseball Advanced Media, offers participants a chance to solve some of's real-world tech challenges, and an opportunity to pitch solutions to MLB representatives. The challenge encourages students from varied backgrounds to participate, serving as a model for helping students find jobs, as well as encouraging technological innovation to flourish in more places. In a previous competition, the winning project presented a way to merge all of the social media documents that a single game might produce, including smartphone photos, tweets, and Facebook status updates, into a single interface. This year's competition, which recently completed its third edition, focused on how could harness the trend of "gamification" to engage fans. The winning project was a novel approach to fantasy baseball with gamification elements and competitive social challenges to share the experience with friends. Syracuse professor Jeffery Rubin, one of the competition's organizers, notes the hackathon is an interdisciplinary challenge. "It's not the most technical project that wins--but the best idea," Rubin says.

View Full Article

jeudi 6 décembre 2012

Introducing EE6

Today we Will introduce EE6 at LJUG Cnam Liban, documents will be available on