• Shortcuts : 'n' next unread feed - 'p' previous unread feed • Styles : 1 2

» Publishers, Monetize your RSS feeds with FeedShow:  More infos  (Show/Hide Ads)


Date: Thursday, 20 Mar 2014 12:00

Para cada calibração deve ser requerido do Laboratório que executou este serviço, a emissão do respectivo certificado que deve ser validado aquando da sua recepção. Antes de validar o certificado de calibração, deve validar o laboratório que emitiu o certificado, confirmando se este possui competências reconhecidas e acreditadas para realizar essa calibração em específico. O […]

The post Procedimento para validar certificados de calibração de EMM appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Metrologia, Calibração, Certificado, E..."
Comments Send by mail Print  Save  Delicious 
Date: Thursday, 20 Mar 2014 10:45

Simulador da DECO, esclarece se deve pedir avaliação do imóvel para correção do IMI. Atualizar coeficientes pode permitir poupar mais de 100 euros em 2015!

The post Saiba se deve pedir uma avaliação do imóvel para atualização do IMI appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Negócios e Dinheiro, Avaliação, DECO ..."
Comments Send by mail Print  Save  Delicious 
Date: Wednesday, 19 Mar 2014 19:36

Quando um instrumento de medição é utilizado pela primeira vez, é necessário proceder à sua calibração, a fim de confirmar que ele cumpre as especificações metrológicas exigidas para o correcto desempenho do serviço em causa. A periodicidade de calibração inicial deverá ser, então, fixada em função de diversos factores, tais como o tipo de instrumento, […]

The post Períodos iniciais de calibração de instrumentos de medição appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Metrologia, EMM, Equipamento de Mediçã..."
Comments Send by mail Print  Save  Delicious 
Date: Thursday, 06 Feb 2014 16:22

Com a publicação destes diplomas o Governo finaliza a regulamentação do Sistema de Certificação Energética de Edifícios, que integra Regulamento de Desempenho Energético dos Edifícios de Habitação e Regulamento de Desempenho Energético dos Edifícios de Comércio e Serviços. NOVO SISTEMA DE CERTIFICAÇÃO ENERGÉTICA DOS EDIFÍCIOS Entrou em vigor, no dia 1 de Dezembro, o novo […]

The post Procedimentos, coimas e legislação na Certificação Energética de Edifícios appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Edifícios"
Comments Send by mail Print  Save  Delicious 
Date: Thursday, 23 Jan 2014 16:55

O que torna a barreira do som “visível” é um fenómeno chamado de expansão adiabática. Quando a aeronave ultrapassa a barreira do som ela deixa um vácuo atrás de si, o ar em redor deste vácuo sofre uma expansão brusca (adiabática) e arrefece condensando as gotículas de água presentes no ar. Forma-se uma nuvem de […]

The post Quebrar a Barreira do Som appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Curiosidades"
Comments Send by mail Print  Save  Delicious 
Date: Thursday, 23 Jan 2014 04:55

Uma vítima de um acidente de trânsito ocorrido na Bulgária foi salva pela sua enorme prótese de silicone nos seios, que serviu como airbag e absorveu o impacto da colisão. Elena Marinova, 24 anos, envolveu-se numa choque frontal com outro veículo no norte da cidade de Ruse. De acordo com o site Ananova, enquanto o […]

The post Silicone nos seios salva mulher num acidente appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Humor"
Comments Send by mail Print  Save  Delicious 
Date: Tuesday, 21 Jan 2014 16:55

José Sampaio, o homem que pela força da vida virou o curandeiro que cura “ursulas”, “hepatitazás”…. O tipo é pior que o Deus me livre!!!

The post Curandeiro de Viseu! appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Humor, Viseu"
Comments Send by mail Print  Save  Delicious 
Date: Monday, 20 Jan 2014 16:56

Existem dois modos de utilizar a rede wireless ZON@FON sem custos na sua utilização, a mais simples é para quem for cliente ZON, através do registo em zon.pt/myzon, a alternativa (para quem não é cliente ZON), é a aquisição de um router Fonera, que após registo permite aceder à rede ZON@FON. Contudo, se for um […]

The post Fon@Zon Wireless Gratuita FON_ZON_FREE_INTERNET appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Internet, FON, FON_ZON_FREE_INTERNET, Wi..."
Comments Send by mail Print  Save  Delicious 
Date: Sunday, 19 Jan 2014 23:38

1. A responsabilidade da gestão dos resíduos é do respectivo produtor, que deverá evitar e reduzir a sua produção, o seu carácter nocivo, promover a reutilização de bens e só quando tal não for possível proceder à sua reciclagem ou ainda a outras formas de valorização. A eliminação definitiva de resíduos, nomeadamente a sua deposição […]

The post Avisos importantes em matéria de contra-ordenações ambientais appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Qualidade e Ambiente, Ambiente"
Comments Send by mail Print  Save  Delicious 
Date: Sunday, 19 Jan 2014 16:55

De certeza que já lhe aconteceu querer abrir um ficheiro com uma extensão esquisita mas não saber que programa utilizar...

The post Lista de extensões, saiba que programa abre cada ficheiro appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Software, Truques e Dicas, Extensões, F..."
Comments Send by mail Print  Save  Delicious 
Date: Sunday, 19 Jan 2014 04:55

segurança, protecção, anti-virus, spam, virus, software, programa, rede, network, security

The post Computer Security Software appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Software, FTP, Manual, Segurança"
Comments Send by mail Print  Save  Delicious 
Date: Saturday, 18 Jan 2014 16:55

Descarregue gratuitamente as suas resistas favoritas. Tirando o pormenor de estar num idioma um tanto difícil, este site é fantástico, é tudo de borla (grátis mesmo), e não requer qualquer tipo de registo. É só escolher o que quer e descarregar um ficheiro em formato .pdf . Fica aqui uma lista resumida das revistas disponíveis: American Cinematographer […]

The post Revistas Online . Free Magazines e-Books appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "e-Books, Inovação, Internet, American,..."
Comments Send by mail Print  Save  Delicious 
Date: Saturday, 18 Jan 2014 04:54

movies, coming, soon, upcoming, trailer, trailers, release, dates, dvd, dvds, video, videos, films, box, office, previews, reviews, cinema, academy awards, movie reviews, reviews, movies, movie insider, movieinsider, movie forum, previews, themovieinsider, critic, critics, movie trailers, trailers, trailer, movie, movie trailer, teasers, teaser, clips, clip, previews, tv spots, tv spot, movies, coming, soon, upcoming, release, dates, dvd, dvds, video, videos, films, box, office, preview, reviews, cinema

The post Quais os Bons Filmes para 2007? appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Cinema e Televisão, Curiosidades, Jogos..."
Comments Send by mail Print  Save  Delicious 
Date: Thursday, 16 Jan 2014 16:55

Este vídeo faz parte do filme realizado por Michael Moore, o “Columbine Shooting“ Dobrado em espanhol

The post História dos EUA by Michael Moore appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Curiosidades, Humor, EUA, Video, youtube"
Comments Send by mail Print  Save  Delicious 
Date: Wednesday, 15 Jan 2014 16:55

Colecção de software muito, mas mesmo muito completa! Vale pena dar uma vista de olhos… aqui e também aqui… Se gostou da ideia, vá aparecendo que vão sendo colocadas novidades nesta entrada… FTP Sites    Colecção Software – Freeware e Free Software  Relaxe um pouco – Free Flash Online Games

The post Software Collection [1] – FTP appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Engenharia, Internet, Collection, FTP, S..."
Comments Send by mail Print  Save  Delicious 
Date: Wednesday, 15 Jan 2014 04:55

Computer Programming Art of Assembly language [pdf,tgz] Art of Assembly language (High Level Assembler) [pdf] Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)] Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz] C++ Programming style [txt] Multithreaded Programming Guide (Sun Microsystems) [pdf] POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf] pthreads and Solaris threads: A comparison of two user level threads APIs (Sun Microsystems) [ps,pdf] Thinking in Java, 2nd Edition [online(frames,no frames)] Thinking in Java, 2nd Edition, Example Codes [online,tgz] Intel Architecture optimizations [pdf] HTML 4.0 Reference [online] Data Display Debugger (DDD) 3.3.1 Manual [online] Writing Multithreaded Code in Solaris [pdf] Intel Architecture Optimization Manual [pdf] Intel Architecture Software Developer's Manual, Volume 1, Basic Architecture [pdf] Intel Architecture Software Developer's Manual, Volume 2, Instruction Set Reference [pdf] Intel Architecture Software Developer's Manual, Volume 3, System Programming [pdf] Performance of Various Computers Using Standard Linear Equations Software [pdf] The SPARC Architecture Manual, Version 8 [pdf] The SPARC Architecture Manual, Version 9 [pdf] UltraSPARC I-II User's Manual [pdf] UltraSPARC IIi User's Manual [pdf] microSPARC IIep User's Manual [pdf] SuperSPARC II Addendum [pdf] Alpha Architecture Handbook, Version 4 [pdf] System V Application Binary Interface, Edition 4.1 [pdf] System V Application Binary Interface, Intel386 Architecture Processor Supplement, Edition 4 [pdf] MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf] The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20, Version 3 [pdf] The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.00, Version 1 [pdf] ANSI/ISO C++ Professional Programmer's Handbook [pdf] VHDL VHDL CookBook by Peter J. Ashenden [pdf] Analog and Mixed-Signal Modeling using VHDL-AMS [pdf] European Space Agency (ESA) VHDL Modelling Guidelines [pdf] US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)] Operating systems Introduction to OS [pdf] Process scheduling [pdf] Resource management and deadlocks [pdf] I/O Management [pdf] Filesystem [pdf] Memory management [pdf] Interprocess communication [pdf] System security [pdf] Cryptography A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)] Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)] Cryptography - The myths [pdf] A Cryptograpgic Compendium [link] Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf] Security protocols overview by RSA Laboratories [pdf] Security Pitfalls in Cryptography [pdf] Stream ciphers [pdf] Understanding Public Key Infrastructure [pdf] Trust Models and Management in Public-Key Infrastuctured [pdf] Why Cryptography is Harder than it looks [pdf] Cryptanalytic Attacks on Pseudorandom Number Generators [pdf] CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)] RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)] Smartcard security [pdf] Digital Signatures, Certificates and Electronic Commerce [pdf] Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf] Implementation Experience with AES Candidate Algorithms [pdf] Performance Analysis of AES candidates on the 6805 CPU core [pdf] UK Government Organisations Involved in Communications and Information Systems Security [pdf] The block cipher Square [pdf] Attacks on Cryptoprocessor Transaction Sets [pdf] Initial Cryptanalysis of the RSA SecurID Algorithm [pdf] Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf] Preliminary Cryptanalysis of Reduced-Round Serpent [pdf] Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf] Compliance Defects in Public-Key Cryptography [pdf] Architectural considerations for cryptanalytic hardware [pdf] WEP Fix using RC4 Fast Packet Keying [pdf] RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf] Block Ciphers [pdf] Stream Ciphers [pdf] C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf] Universal Hashing and Multiple Authentication [pdf] Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf] The simple ideal cipher system [pdf] An FPGA Implementation of the Linear Cruptanalysis [pdf] The math behind the RSA cipher [txt] RSA hardware implementation [pdf] High-Speed RSA implementation [pdf] Are 'Strong' Primes Needed for RSA? [pdf] RSAES-OAEP Encryption scheme [pdf] Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf] Are 'Strong' Primed Needed for RSA? [pdf] Why Textbook ElGamal and RSA Encryption are Insecure [pdf] The DES algorithm [txt] The RC5 encryption algorithm [pdf] On The Security of the RC5 Encryption Algorithm [pdf] The ESP RC5-CBC Transform [txt] The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt] The RC6 block cipher [pdf] RC6 as the AES [pdf] The security of RC6 block cipher [pdf] Statistical testing of RC6 block cipher [pdf] Blowfish algorithm in plain English [txt] Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)] Twofish: A 128-bit Block Cipher [pdf] Upper bounds on differential characteristics in Twofish [pdf] Impossible differentials in Twofish [pdf] A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf] Further observations on the Key Schedule of Twofish [pdf] Empirical verification of Twofish key uniqueness properties [pdf] Key separation in Twofish [pdf] Improved Twofish implementations [pdf] Implementation of the Twofish Cipher using FPGA devices [pdf] Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)] The Rijndael Block Cipher [pdf] A Specification of Rijndael, the AES Algorithm [pdf] Efficient Implementation of the Rijndael S-box [pdf] The Elliptic Curve Cryptosystem [pdf] Elliptic Curce Cryptosystems [pdf] Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf] The Elliptic Curve Cryptosystem for Smart Cards [pdf] The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf] Recommendation on Elliptic Curve Cryptosystems [pdf] Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf] Security Program Stack vulnerability [txt] Non-executable Program Stack vulnerability [txt] Strange Attractors and TCP/IP Sequence Number Analysis [link] Rainbow book series [link] Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf] Attacks on and Countermeasures for USB Hardware Token Devices [pdf] UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf] Countermeasures against Buffer Overflow Attacks [pdf] Integrating Flexible Support for Security Policies into the Linux Operating System [pdf] Flaw in NTRU Signature Scheme (NSS) [pdf] Meeting Critical Security Objectived with Security-Enhanced Linux [pdf] Secure Programming with Linux and Unix [pdf] Reverse Compilation Techniques [pdf] What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf] Stack Smashing Vulnerabilities in the UNIX Operation System [pdf] Networking Networking concepts [pdf] Introduction to Internet Protocols [txt] Network planning and design [pdf] Queuing analysis [pdf] Parallel FTP performance in a High-Bandwidth High-Latency WAN [pdf] Compete WAP Security [pdf] Cryptographic Authentication fo Real-Time Network Protocols [pdf] Temporary Committee on the ECHELON Interception System Report (Working Document) [pdf] IP Multicast Configuration [pdf] Can Shortest-path Routing and TCP Maximize Utility [pdf] A new TCP congestion control with empty queues and scalable stability [pdf] FAST Kernel: Backgroung Theory and Experimental Results [pdf] Robustness and the Internet: Design and evolution [pdf] Robust congestion control for the Internet [pdf] A Mathematical Framework for Designing a Low-Loss, Low-Delay Internet [pdf] On the stability of networks operating TCP-like congestion control [pdf] Ultrascale Network Protocols for Computing and Science in the 21st Century [pdf] Computer Clusters High Performance Computing and Beowulf Clusters [pdf] Web Search for a Planet: The Google Cluster Architecture [pdf] Bluetooth Specification of the Bluetooth System v1.1 22-02-2001 (Core) [pdf] Specification of the Bluetooth System v1.1 22-02-2001 (Profiles) [pdf] SyncML Over Bluetooth [pdf] Bluetooth Network Encapsulation Protocol (BNEP) Specification [pdf] Bluetooth Extended Service Deiscovery Profile (ESDP) for Universal Plug and Play (UPnP) [pdf] Personal Area Networking (PAN) Profile [pdf] Bluetooth Security White Paper [pdf] Security Comparison: Bluetooth vs 802.11 [pdf] Mathematics SOS Mathematics [link] Mathematics archives [link] Dave's math tables [link] On-line Encyclopedia of Integer Sequences [link] Notes on Fermat's Last Theorem by A. J. Van Der Poorten [pdf(1,2,3,4,5,6,7,8)] p-adic Chaos and Random Number Generation [pdf] Introduction to Probability Theory [pdf] Calculus - One-Variable Calculus, with an Introduction to Linear Algebra [pdf] Introduction to Methods of Applied Mathematics or Advances Mathematical Methods for Scientists and Engineers [pdf] Tables of Integrals and other Mathematical data [pdf] Random Generators and Normal Numbers [pdf] Ramanujan's Notebooks [pdf(pdf,pdf)] Prime Percolation [pdf] Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation [pdf] Perturbation Theory of Dynamical Systems [pdf] On Fourier and Zeta(s) [pdf] Newton's Formula and the Continued Fraction Expansion of sqrt(d) [pdf] Linear Algebra [pdf] Linear Algebra - Answers [pdf] New Representations for the Madelung Constant [pdf] Sums of Squares, Cubes, and Higher Powers [pdf] Computing A Glimpse of Randomness [pdf] Computing the Generating Function of a Series Given its First Few Terms [pdf] Asymptotic Behavior of Excitable Cellular Automata [pdf] An Efficient Algorithm for Computing the Ith Letter of phi^n(a).pdf [pdf] Algebraic Topology [pdf] A Proof of a Conjecture of Knuth [pdf] A Practical Version of the Generalized Lagrange Algorithm [pdf] Engineering Theoretical Computer Science cheat sheet [pdf] A mathematical theory of Communication [pdf] A Primer on Asynchronous Modem Communication [pdf] Dictionary of Algorithms, Data Structured, and Problems [link] Computing dictionary [link] Acronym lookup engine [link] StudyWeb search engine [link] UNIX Unix is a Four Letter Word, and Vi is a Two Letter Abbreviation [pdf] Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX [pdf] UNIX [pdf] Intermediate Unix Training [pdf] VI lovers [link] Unix Programming Tools [pdf] Unix history timeline (1969-2000) [pdf] Executable and Linkable Format (ELF) [txt] A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux [online] Guide to Unix IPC [link] The Linux Kernel API [pdf] Unreliable guide to Linux kernel locking [pdf] Unreliable guide to hacking the Linux kernel [pdf] Linux 2.4 NAT Howto [pdf] Linux advanced routing Howto [pdf] Linux Netfilter hacking Howto [pdf] Samba 2.2 [online] Samba TNG [online] USENIX Token-Mediated Certification and Electronic Commerce [pdf] The Linux BIOS [pdf] LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf] Miscelaneous CVS Manual [online] The Ultimate Memory Guide [pdf] The RAM Guy's Tech Notes [link] Sun-Tzu The Art of Warfare [online] Ko Ko Ko [avi] ISO Images Slackware Splackware FreeBSD Solaris

The post e-Books sobre Informática [1] appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "e-Books, Hardware, Internet, Software, T..."
Comments Send by mail Print  Save  Delicious 
Date: Tuesday, 14 Jan 2014 16:54

Dirigido por Davis Guggenheim, mais conhecido pelo ficcional seriado de TV '24 Horas', o documentário traz dados científicos alarmantes, sugerindo o fim da civilização. Al Gore mostra de forma didática, mas envolvente como o aquecimento global, confirmado com as excepcionais subidas de temperatura, já está afetando todo o mundo. Isso inclui o degelo das calotas polares, as secas prolongadas e a elevação do nível do mar. A tragédia do furacão Katrina, que devastou Nova Orleans em agosto do ano passado, seria apenas uma amostra do que pode acontecer no futuro.

The post Uma Verdade Inconveniente – An Inconvenient Truth appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Cinema e Televisão"
Comments Send by mail Print  Save  Delicious 
Date: Tuesday, 14 Jan 2014 04:55

Já está disponível o eMusic, uma nova plataforma de venda de música que acaba de ser lançada em simultâneo nos 25 países da União Europeia.  A meta do eMusic é assumir-se como a primeira alternativa ao iTunes no mercado europeu, indo mais longe, o eMusic não limita a reprodução das suas faixas aos dispositivos iPod, as suas […]

The post eMUSIC – 25 faixas gratuitas para começar e… 0.23€/faixa no futuro appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Internet, Jogos Online, Europeia, Músic..."
Comments Send by mail Print  Save  Delicious 
Date: Monday, 13 Jan 2014 16:54

http://checkout.google.com/ Google Checkout, o novo sistema de pagamentos online da empresa. O novo Google Checkout, conhecido anteriormente pelo nome de código Gbuy, permite aos utilizadores realizar o pagamento de produtos ou serviços online sem revelar os dados do cartão de crédito directamente à loja a que estão a comprar o produto ou serviço. Os vendedores […]

The post Google Checkout appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Internet, checkout google, Código, Goog..."
Comments Send by mail Print  Save  Delicious 
Date: Monday, 13 Jan 2014 04:55

Resolvi falar aqui um pouco deste tema depois de ler uma brochura que me esclareceu algumas dúvidas sobre a matéria. Só para terem uma noção da importância da visão, 80 a 85% de toda a informação que recebemos é-nos fornecida através da visão. CONSELHOS DE VISÃO  Para desfrutar de uma saúde visual melhor  Conselhos para estudar […]

The post Cuide dos seus olhos, valem 85% da sua vida appeared first on enGENIUM 2.0.

Author: "Helder Costa" Tags: "Curiosidades, computador"
Comments Send by mail Print  Save  Delicious 
Next page
» You can also retrieve older items : Read
» © All content and copyrights belong to their respective authors.«
» © FeedShow - Online RSS Feeds Reader