Todos nós temos as nossas próprias máquinas do tempo, Aleksander. As que nos levam ao passado são as nossas lembranças e as que nos levam ao futuro são nossos sonhos.Filmes
Confira os últimos posts de meu e as últimas notícias que agitaram o mundo da TI
- Últimas do Blog
- Últimas Notícias
- Instalando o Docker no WSL2, usando o Debian
- Instalando Apache + PHP 8 + MariaDB no Debain 12 (Servidor LAMP) – WSL
- A Importância de uma Graduação na área de TI
- Você conhece Apex Legends?
- O que é a Inteligência Artificial (IA)?
- Como Gerar Chaves SSH para o GitHub: Trabalhando com o PhpStorm
- Instalando o PostgreSQL no WSL (Ubuntu)
- O que são Data Analytics, Big Data e Data Science
- O que é Machine Learning (Aprendizado de Máquina)
- Inteligência Artificial? O que é isso?
- Nintendo is demanding a refund for tariffs it paid in the US, but don't expect to see the refund passed on to you
- How to watch Big Brother Manzsi season 6 online from anywhere [clone]
- ‘We must do more to protect our credentials’: Password security has barely changed since 2015 — and that's a big problem for everyone
- ‘He is a once-in-a-thousand-years kind of person’: Tim Cook explains how the Steve Jobs reality distortion field convinced him to join Apple
- 'For many years, Europe has relied on American software and therefore created a certain risk of dependency': European alternative to Microsoft Office launches — but will this open source champion be good enough to topple Word and Google Docs?
- Here's a record-low price for the Google Pixel Watch 4 — 'a great smart companion' that we scored 4.5 stars
- 'There can be no justification': Chinese automaker apologizes to Land Rover after another big copycat controversy
- Apple’s latest MacBook Pro surges ahead for battery life — but with one disappointing surprise
- The best-selling Hatch Restore 3 can help you survive daylight saving — and it's currently on sale at Amazon
- ‘American Power will finally stand up in cyberspace’: Trump unveils new cyber strategy he says will “deploy the full suite of US government defensive and offensive cyber operations”