Search Results

Search found 24931 results on 998 pages for 'information visualization'.

Page 249/998 | < Previous Page | 245 246 247 248 249 250 251 252 253 254 255 256  | Next Page >

  • Security Seminar in Colchester Vermont Wed March 31st

    Kapersky Lab, a computer security company, will be presenting a  1/2 day seminar next week in colchester SECURING BEYOND COMPLIANCE WITH ENCRYPTION & MALWARE PROTECTION March 31 8am to 12:00pm at the Hampton Inn - Colchester VT More information and to register: http://www.npi.net/seminars/...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • In Order to Be Recognized Professionally a SEO Certification is Required

    One can now obtain a host of information as well as education on SEO which includes certification assessments worldwide. SEO certification is the first certification developed by professionals for those wanting to study SEO professionally. Certification ensures that an individual has met all the requirements and standards needed to be recognized by the public sector.

    Read the article

  • Multiple Input Validation vulnerabilities in kerberos

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-1528 Improper Input Validation vulnerability 7.8 Kerberos Solaris 11.1 11.1 CVE-2011-1529 Improper Input Validation vulnerability 7.8 CVE-2011-4151 Improper Input Validation vulnerability 7.8 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Run your own XHTML validator

    - by TATWORTH
    Whilst the W3C do provide an excellent service for manually checking your web pages, there are times when an alternative is required. There is for example a web service at http://validator.w3.org/docs/api.html  This can be for programmatically checking your pages (provided you make no more than 1 call per second). The W3C do provide all the source code needed to run your own validation service. Get the full details at: ·         Installation and development information for the W3C Markup Validator   http://validator.w3.org/docs/devel.html ·         Source Availability http://validator.w3.org/source/

    Read the article

  • Eager to Learn more about MySQL?(Week 40)

    - by rituchhibber
    Are you a SQL programmer eager to know more?Oracle University is pleased to announce the availability of a new course in Training on Demand format : MySQL Performance Tuning.Why wait to get the training you need? Learn Oracle from Oracle today. Check out the demo to see how it works.Take a look at the new Training on Demand  MySQL Certification Packages.Please note: your OPN discount is applied to the standard price shown on the website.For more information, assistance and bookings contact your local Oracle University Service Desk.

    Read the article

  • Two Basic Steps to Enhance Your Web Presence and Brand Recognition

    If you are a confident business person, you must believe that your product is the best a client can get. To present this information to prospective clients, you will need assistance to direct web traffic of users seeking your product to your website where you will have the opportunity to convince them that buying from you will not be a mistake. Most business people stop at stage one because they fail to attract the right clients, they are said to have practically no web presence.

    Read the article

  • Are there architecture smells?

    - by C. Ross
    There are tons of resources on the web referring to and listing code smells. However, I've never seen information on architectural smells. Is this defined somewhere, and is there a list available? Has any formal research been done into architecture defects, and their impact on project speed, defects, and the like? Edit: I wasn't really looking for a list in the answers, but documentation (on the web or in a book) about architecture smells.

    Read the article

  • Declaring variables in SQL

    - by Tim Hibbard
    I would like to blog more about the problems I encounter on a daily basis.  I find that taking 10 minutes or so to write a simple solution to my problems helps me retain that information. I always forget the specific syntax to declaring variables in T-SQL.  declare @startdate datetime; declare @enddate datetime;   set @startdate = '04/01/2010'; set @enddate = '04/30/2010';   select count(id) from triphistory where tripdate between @startdate and @enddate

    Read the article

  • Webcast - Building Agile BI or Discovery Applications with Oracle Endeca

    - by Grant Schofield
    On 18th of April we are hosting a live webcast where we will be demonstrating the step by step process of how to create an Agile BI application with Oracle Endeca Information Discovery. Many partners understand the positioning and the message, but are curious to understand what the tool looks like, and what it is like to work with it. Please join myself and Wim Villano by registering at the following link.  Register for webcast here:

    Read the article

  • What is occurring in the world of server-side technologies in regards to the mobile app boom?

    - by Akromyk
    With mobile technologies becoming increasingly popular what is happening on the server-side with most of these apps when they need to communicate with a back end? I'm used to the world of technology from 10 years ago when most resources were accessed by requesting a dynamic web page that behind the seen used a server-side language to get the information it needed from a relational database. Is this still the case, and if not, what are the big changes?

    Read the article

  • CVE-2011-2524 Directory traversal vulnerability in libsoup

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-2524 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability 5.0 libsoup Solaris 11 11/11 SRU 11.4 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Database Insider - April 2012 issue

    - by Javier Puerta
    INFORMATION INDEPTH NEWSLETTER Database Insider Edition The  April issue of the Database Insider newsletter is now available.Includes, among many other: Oracle Advanced Analytics for Big Data Best Practices for Workload Management of a Data Warehouse on Oracle Exadata Best Practices for Implementing a Data Warehouse on Oracle Exadata

    Read the article

  • Connect to wifi ubuntu 14.04 (new ubuntu user)

    - by user289168
    I have recently changed my operating system from windows 8 to ubuntu 14.04, when trying to connect to the network via wifi the system just keeps asking for my password over and over without connecting. The connectivity through an Ethernet cable is perfectly fine however and my wifi worked fine through windows 8, I have very little ubuntu knowledge so i apologise if the right information is not shown in this question. Just wondering if there was any known problems or if anyone has seen this before? Thanks in advance for any help, Tom

    Read the article

  • Using Site Explorer to Improve Yahoo Search Results

    It is the information generated within Yahoo Site Explorer, and the interpretation of that valuable data, that provides the necessary direction; to improve your Yahoo search results. As with any tool, Site Explorer must be used properly and effectively; to be beneficial.

    Read the article

  • Multiple vulnerabilities in Pidgin

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2214 Resource Management Errors vulnerability 3.5 Pidgin Solaris 10 SPARC : 147992-04 , x86 : 147993-04 Solaris 11 11/11 SRU 10.5 CVE-2012-2318 Improper Input Validation vulnerability 5.0 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Multiple vulnerabilities in OpenSSL

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2110 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 7.5 OpenSSL Solaris 10 SPARC: 147159-05 147707-06 X86: 146672-07 CVE-2012-2131 Numeric Errors vulnerability 7.5 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Multiple vulnerabilities in OpenSSL

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2110 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 7.5 OpenSSL Solaris 11 Contact Support Solaris 10 SPARC: 147159-05 147707-06 X86: 146672-07 CVE-2012-2131 Numeric Errors vulnerability 7.5 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Why it is Important to Hire an SEO Company For Your Internet Business

    The World Wide Web is not only limited to sharing information; in fact, the Internet is now being used by profit-based organizations or businesses to help increase their potential for success and productivity. Though it is true that the Web offers plenty of untapped market for your business to delve into, you have to keep in mind that competition are also in abundance that will pull you down.

    Read the article

  • Oracle University (Week 13)

    - by swalker
    Get ready for Fusion Applications Implementations Oracle University has scheduled the first implementation courses. To view see: Italy France The Netherlands: UK If you can’t travel to these countries, why don’t you try a Live Virtual Class? All courses can be booked via the websites. For more information, assistance in booking and scheduling requests contact your local Oracle University Service Desk. Manténgase conectado a Oracle University: LinkedIn OracleMix Twitter Facebook Google+

    Read the article

  • How hard is to be the anonymous owner of a website?

    - by silla
    I'd like to create a website with a very radical political message. It won't be unethical (encouraging violence, etc) but I feel the points I plan to list in it will definitely make me a lot of enemies. How hard would it be to protect my identity from anyone finding out who I am? I know domains always have a $10/year option for privatizing your registration information but is there any other protection I should think about having? Thanks!

    Read the article

  • Protobuf design patterns

    - by Monster Truck
    I am evaluating Google Protocol Buffers for a Java based service (but am expecting language agnostic patterns). I have two questions: The first is a broad general question: What patterns are we seeing people use? Said patterns being related to class organization (e.g., messages per .proto file, packaging, and distribution) and message definition (e.g., repeated fields vs. repeated encapsulated fields*) etc. There is very little information of this sort on the Google Protobuf Help pages and public blogs while there is a ton of information for established protocols such as XML. I also have specific questions over the following two different patterns: Represent messages in .proto files, package them as a separate jar, and ship it to target consumers of the service --which is basically the default approach I guess. Do the same but also include hand crafted wrappers (not sub-classes!) around each message that implement a contract supporting at least these two methods (T is the wrapper class, V is the message class (using generics but simplified syntax for brevity): public V toProtobufMessage() { V.Builder builder = V.newBuilder(); for (Item item : getItemList()) { builder.addItem(item); } return builder.setAmountPayable(getAmountPayable()). setShippingAddress(getShippingAddress()). build(); } public static T fromProtobufMessage(V message_) { return new T(message_.getShippingAddress(), message_.getItemList(), message_.getAmountPayable()); } One advantage I see with (2) is that I can hide away the complexities introduced by V.newBuilder().addField().build() and add some meaningful methods such as isOpenForTrade() or isAddressInFreeDeliveryZone() etc. in my wrappers. The second advantage I see with (2) is that my clients deal with immutable objects (something I can enforce in the wrapper class). One disadvantage I see with (2) is that I duplicate code and have to sync up my wrapper classes with .proto files. Does anyone have better techniques or further critiques on any of the two approaches? *By encapsulating a repeated field I mean messages such as this one: message ItemList { repeated item = 1; } message CustomerInvoice { required ShippingAddress address = 1; required ItemList = 2; required double amountPayable = 3; } instead of messages such as this one: message CustomerInvoice { required ShippingAddress address = 1; repeated Item item = 2; required double amountPayable = 3; } I like the latter but am happy to hear arguments against it.

    Read the article

  • La croissance du marché de l'open source devrait-elle alarmer les éditeurs de logiciels propriétaires ? En France le marché pèse 2,5 milliards d'Euro

    La montée en popularité de l'open source devrait-elle alarmer les éditeurs de logiciels propriétaires ? En France le marché pèse 2,5 milliards Depuis quelque temps déjà l'open source fait couler beaucoup d'encre dans l'actualité technologique. En France par exemple l'open source a déjà investi tous les grands domaines du système d'information des administrations : environnements serveurs, domaines applicatifs, outils d'ingénierie, solutions de réseaux et sécurité. Des services publiques comme...

    Read the article

< Previous Page | 245 246 247 248 249 250 251 252 253 254 255 256  | Next Page >