Search Results

Search found 9822 results on 393 pages for 'hottest articles'.

Page 117/393 | < Previous Page | 113 114 115 116 117 118 119 120 121 122 123 124  | Next Page >

  • Dropdowns revisited

    For my DIBI presentationI need a dropdown menu (in order to compare it on desktop and mobile), so I wrote one.Point is, it took me thirty lines of JavaScript, nine of which only contain a closing },and three of which deal with the fact that bloody Firefox still doesn’t support contains().Net amount of lines: 18. Can somebody please remind me why we all used to think dropdownsare so extremely complicated? I can’t for the life of me figure it out.window.onload = function () { document.getElementById('dropdown').onmouseover...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Visual Basic 2010 is here!

    It was a very exciting time this week, with the launch of Visual Studio 2010 and .NET 4. On April 12th, 5 launch events took place around the world in Beijing, Kuala Lumpur, Bangalore, London and Las Vegas. The video from Bob Muglias VS 2010 Launch keynote is now available on-demand. The agenda for day was VS 2010 sessions, including Windows Development, SharePoint and Office, Dev & Test Collaboration, and Project Management. Follow the Visual Studio 2010 Launch tag on Channel9 for more There...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Does Using ASP Or PHP Affect Your SEO Strategies?

    We most often hear web developers as well as website design development companies asking in forums and developer boards about use of ASP, PHP & other scripting language and its possible negative effects on search engine optimization and effective SEO strategies for the website. There are many server side based scripting languages such as ASP, PHP, Cold Fusion, Python, and Pearl; among which PHP & ASP are more common.

    Read the article

  • How To Get JavaScript IntelliSense With DevExpress Client-Side Objects - v2010 vol 1

    Check out this how-to guide that helps you get IntelliSense support for DevExpress client-side objects in Visual Studio. Add IntelliSense Support Follow these 3 easy steps to add IntelliSense support to your project: 1) Install the latest DXperience v2010.1 release. (Currently, the DXperience v2010.1 beta is available to DXperience subscription license holders). 2) Click the Add Existing Item in your project menu. Then add the ASPxScriptIntelliSense.js file to your project which should be located...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Questions to Know the Real SEO Experts

    Since the dawn of the internet, companies have eventually been making the shift from the physical world over to the virtual world, and being able to rank in a search engine is now the main factor that will determine if your business is a success. In the internet marketing universe, you probably are wondering how to know the real marketing experts from fake ones.

    Read the article

  • MSXML4.0 SP2 is going out-of-support in April. 2010

    This is a friendly reminder that MSXML4.0 SP2 is going out-of-support on 4/13/2010. Applications using MSXML4.0 should be either migrated to MSXML6.0 or upgraded to MSXML 4.0 SP3. For more information about the Microsoft Support Lifecycle Policy, please visit the  Microsoft Lifecycle Website. You may ask why MSXML6.0 is being mentioned here and what relationship exists between two versions. Please read below for historical context: MSXML4.0 was released to the web in April 2001 to provide...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Website Performance Evaluation

    A website performance evaluation begins with a review of key indicators. The key indicators offer a snapshot of the websites overall performance and a high-level view of areas that need improvement.

    Read the article

  • Understanding the Value of a DMOZ Submission

    The Open Directory Project (DMOZ) data powers the core directory services for many of the Internet's most influencial search engines and portals. However, Matt Cutts once said: "if you can't get into Dmoz, I wouldn't necessarily worry about it. There are a lot of other great places to get links across the web."

    Read the article

  • What is SEO? Just Keyword and Backinks

    This is basic and exact definition of SEO according to our research and understanding search engine optimization and web promotion field. We all know what SEO stands for of course - Search Engine Optimization. This is the creativity of making your website more readers friendly, relevant to the interest of search engine users and hence ranking better in the search engine results.

    Read the article

  • Top 5 SEO Mistakes That You Do

    Search Engine Optimization (SEO) is an upcoming field which is helping develops and grow business like never before. With the onset of the internet age, more and more companies are going online with their products and services.

    Read the article

  • Developing Your Website

    Deciding that you need a website, whether it's a revamp of an existing site, or a completely new one, is the easy bit! Getting your website right is much more challenging - but with a few valuable marketing techniques up your sleeve, the process is much more straightforward. Most often forgotten is that your website is an important part of your marketing mix and given that its potential target audience, on the web, is huge - it's critical to get it right.

    Read the article

  • Small Business SEO Blueprint

    The popularity of small business SEO continues to rise with small businesses getting more involved in e-commerce. This is no longer an industry that is exclusive to big businesses. Smaller businesses are able to grow without concerns about conventional marketing techniques.

    Read the article

  • How to Create a Skin Object from an OWS Configuration - 2 Videos

    In this video tutorial we walk you through how to create and place Open Web Studio skin objects directly into your DotNetNuke skin.We cover how to create an OWS menu and feedback form and how to convert those modules into DNN Skin Objects.The videos contain:Video 1 - Building the New OWS Configuration and Creating the Menu SystemVideo 2 - Placing the OWS Skin Object within the Skin File and Creating a Feedback Skin ObjectHow to Create a Skin Object from an OWS Configuration - 2 Videos Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • How To Win Prizes at VS2010 Launch

    Every attendee who comes to the DevExpress booth will win a prize. Read on now to find out exactly what you need to do to win. Everyone Wins! Every registered attendee who comes to the DevExpress booth will win a prize. How? 1. You'll need to register at a special URL on the DevExpress website before you come to the booth. The special URL will be available at our DevConnections booth #119. 2. Once registered, youll get an entry code. Bring your entry code to the DevExpress booth #119...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • MEF (Microsoft Extensibility Framework) made simple (ish)

    Microsoft Extensibility Framework or MEF is one of the great features in Silverlight, designed around making Silverlight applications more extensible generally and provides a much more complete story for the separation of concerns. MEF then begs the question 'Why we care?' and 'What can MEF really do?' and we will address that here.Let us talk about a real world example for a moment.Say you are a vertical selling corporation of some kind, meaning that you sell to companies that do similar things....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Data Source Security Part 1

    - by Steve Felts
    I’ve written a couple of articles on how to store data source security credentials using the Oracle wallet.  I plan to write a few articles on the various types of security available to WebLogic Server (WLS) data sources.  There are more options than you might think! There have been several enhancements in this area in WLS 10.3.6.  There are a couple of more enhancements planned for release WLS 12.1.2 that I will include here for completeness.  This isn’t intended as a teaser.  If you call your Oracle support person, you can get them now as minor patches to WLS 10.3.6.   The current security documentation is scattered in a few places, has a few incorrect statements, and is missing a few topics.  It also seems that the knowledge of how to apply some of these features isn’t written down.  The goal of these articles is to talk about WLS data source security in a unified way and to introduce some approaches to using the available features.  Introduction to WebLogic Data Source Security Options By default, you define a single database user and password for a data source.  You can store it in the data source descriptor or make use of the Oracle wallet.  This is a very simple and efficient approach to security.  All of the connections in the connection pool are owned by this user and there is no special processing when a connection is given out.  That is, it’s a homogeneous connection pool and any request can get any connection from a security perspective (there are other aspects like affinity).  Regardless of the end user of the application, all connections in the pool use the same security credentials to access the DBMS.   No additional information is needed when you get a connection because it’s all available from the data source descriptor (or wallet). java.sql.Connection conn =  mydatasource.getConnection(); Note: You can enter the password as a name-value pair in the Properties field (this not permitted for production environments) or you can enter it in the Password field of the data source descriptor. The value in the Password field overrides any password value defined in the Properties passed to the JDBC Driver when creating physical database connections. It is recommended that you use the Password attribute in place of the password property in the properties string because the Password value is encrypted in the configuration file (stored as the password-encrypted attribute in the jdbc-driver-params tag in the module file) and is hidden in the administration console.  The Properties and Password fields are located on the administration console Data Source creation wizard or Data Source Configuration tab. The JDBC API can also be used to programmatically specify a database user name and password as in the following.  java.sql.Connection conn = mydatasource.getConnection(“user”, “password”); According to the JDBC specification, it’s supposed to take a database user and associated password but different vendors implement this differently.  WLS, by default, treats this as an application server user and password.  The pair is authenticated to see if it’s a valid user and that user is used for WLS security permission checks.  By default, the user is then mapped to a database user and password using the data source credential mapper, so this API sort of follows the specification but database credentials are one-step removed from the application code.  More details and the rationale are described later. While the default approach is simple, it does mean that only one database user is doing all of the work.  You can’t figure out who actually did the update and you can’t restrict SQL operations by who is running the operation, at least at the database level.   Any type of per-user logic will need to be in the application code instead of having the database do it.  There are various WLS data source features that can be configured to provide some per-user information about the operations to the database. WebLogic Data Source Security Options This table describes the features available for WebLogic data sources to configure database security credentials and a brief description.  It also captures information about the compatibility of these features with one another. Feature Description Can be used with Can’t be used with User authentication (default) Default getConnection(user, password) behavior – validate the input and use the user/password in the descriptor. Set client identifier Proxy Session, Identity pooling, Use database credentials Use database credentials Instead of using the credential mapper, use the supplied user and password directly. Set client identifier, Proxy session, Identity pooling User authentication, Multi Data Source Set Client Identifier Set a client identifier property associated with the connection (Oracle and DB2 only). Everything Proxy Session Set a light-weight proxy user associated with the connection (Oracle-only). Set client identifier, Use database credentials Identity pooling, User authentication Identity pooling Heterogeneous pool of connections owned by specified users. Set client identifier, Use database credentials Proxy session, User authentication, Labeling, Multi-datasource, Active GridLink Note that all of these features are available with both XA and non-XA drivers. Currently, the Proxy Session and Use Database Credentials options are on the Oracle tab of the Data Source Configuration tab of the administration console (even though the Use Database Credentials feature is not just for Oracle databases – oops).  The rest of the features are on the Identity tab of the Data Source Configuration tab in the administration console (plan on seeing them all in one place in the future). The subsequent articles will describe these features in more detail.  Keep referring back to this table to see the big picture.

    Read the article

  • How to Sell SEO to The SEO Challenged?

    When a company tries to sell something in the market, it is very necessary to adopt the customer centric approach so that a connection can be developed. One should never think that their customers are well aware of the complexities and process and will understand everything they convey.

    Read the article

  • SEO Training - How to Get the Basics Right

    I guess it's time to cut the crud and get down to the real meat of what this SEO stuff is about. Time for someone to explain how to do it yourself in a way that won't have you going around in circles thinking it's all a bit of a dark art. This, then, is that article and I am that person who will tell you in nice easy terms how to get your site all 'SEO' friendly in a simple way. No jargon allowed - it's for newbies only!

    Read the article

< Previous Page | 113 114 115 116 117 118 119 120 121 122 123 124  | Next Page >