Search Results

Search found 24043 results on 962 pages for 'private methods'.

Page 268/962 | < Previous Page | 264 265 266 267 268 269 270 271 272 273 274 275  | Next Page >

  • New Trends in Search Engine Optimization

    In order to deal with the search engines getting smarter by the day the SEO experts are trying to find new ways to make their websites search engine friendly. However the basic methods of writing good content and keyword optimization still stand as the main attraction of the search engines.

    Read the article

  • Should I use SVG for icons? [on hold]

    - by Nick Maddren
    I'm just wondering what is the preferred practice for adding icons? I see quite a bit of hype over SVG images however having a bit of trouble understanding how they are implemented as every article I read seems out of date. I need icons for simple lists, the icons need to be one solid color. I feel as if using png's was so 2008 haha, would you recommend the use of SVG images or are developers using other methods to display icons now?

    Read the article

  • What's is the point of PImpl pattern while we can use interface for same purpose in C++?

    - by ZijingWu
    I see a lot of source code which using PIMPL idiom in C++. I assume Its purposes are hidden the private data/type/implementation, so it can resolve dependence, and then reduce compile time and header include issue. But interface class in C++ also have this capability, it can also used to hidden data/type and implementation. And to hidden let the caller just see the interface when create object, we can add an factory method in it declaration in interface header. The comparison is: Cost: The interface way cost is lower, because you doesn't even need to repeat the public wrapper function implementation void Bar::doWork() { return m_impl->doWork(); }, you just need to define the signature in the interface. Well understand: The interface technology is more well understand by every C++ developer. Performance: Interface way performance not worse than PIMPL idiom, both an extra memory access. I assume the performance is same. Following is the pseudocode code to illustrate my question: // Forward declaration can help you avoid include BarImpl header, and those included in BarImpl header. class BarImpl; class Bar { public: // public functions void doWork(); private: // You doesn't need to compile Bar.cpp after change the implementation in BarImpl.cpp BarImpl* m_impl; }; The same purpose can be implement using interface: // Bar.h class IBar { public: virtual ~IBar(){} // public functions virtual void doWork() = 0; }; // to only expose the interface instead of class name to caller IBar* createObject(); So what's the point of PIMPL?

    Read the article

  • Apply SEO Techniques to Boost Up Your Online Business

    SEO Search Engine Optimization is a set of methods that is used to get your website ready as per the rules and regulations of search engines like Google, Yahoo and MSN. These search engines plays the role of big players when one think about getting nice and targeted traffic to his/her site. We have seen lots of online and offline surveys out there have declared that these three Search Engines provides 80% online traffic to a website.

    Read the article

  • "Default approach" when creating a class from scratch: getters for everything, or limited access?

    - by Prog
    Until recently I always had getters (and sometimes setters but not always) for all the fields in my class. It was my 'default': very automatic and I never doubted it. However recently some discussions on this site made me realize maybe it's not the best approach. When you create a class, you often don't know exactly how it's going to be used in the future by other classes. So in that sense, it's good to have getters and setter for all of the fields in the class. So other classes could use it in the future any way they want. Allowing this flexibility doesn't require you to over engineer anything, only to provide getters. However some would say it's better to limit the access to a class, and only allow access to certain fields, while other fields stay completely private. What is your 'default' approach when building a class from scratch? Do you make getters for all the fields? Or do you always choose selectively which fields to expose through a getter and which to keep completely private?

    Read the article

  • What's your approach to reading and comprehending technical books? [on hold]

    - by Carl Edwards
    I've taken it upon myself to learn a couple of new programming languages and frameworks and aside from sheer practice I usually start by learning from an O'Reilly book or other technical "bibles". While most have been very helpful I'd like to know the steps or methods others use to best comprehend what's taught. Not to say that I'm struggling through the readings, it would be extremely helpful to know how a seasoned professional approaches new or existing material to build upon his or her foundation of knowledge.

    Read the article

  • Is there any way to move the launcher in ubuntu 12.04 LTS?

    - by asker
    I'm am fairly new to Ubuntu and am finding it absolutely wonderful except for one thing, which is the inability to move the launcher. I am used to using windows, and though I hated it, I would like the ability to move the launcher to the bottom, both because I find it more convenient and familiar. I've surfed around and found some methods for Ubuntu 11.10, but nothing for 12.04, so any help would be appreciated. Thank you all for your help!

    Read the article

  • Using a certificate in Thunderbird

    - by harper
    I have my certifcate issued by "TC Trustcenter" in a CER file. Thunderbird 3.0 needs it as a PFX files. So I installed the CER certificate with the Internet options in the Control Panel. Thereafter I exported the certificate including the "private key" and "all certificates in the certification path" to a PFX file. After importing this certificate with Thunderbird I still cannot decrypt the mail sent to the mail address of the certificate. What else must I do to use the private key? The certificate is valid since I decrypted the mail already on another computer using Outlook. I verified the certificate serial number to ensure that I use the same certificate.

    Read the article

  • What is a good algorithm to distribute items with specific requirements?

    - by user66160
    I have to programmatically distribute a set of items to some entities, but there are rules both on the items and on the entities like so: Item one: 100 units, only entities from Foo Item two: 200 units, no restrictions Item three: 100 units, only entities that have Bar Entity one: Only items that have Baz Entity one hundred: No items that have Fubar I only need to be pointed in the right direction, I'll research and learn the suggested methods.

    Read the article

  • Design Better, Rich Internet Applications

    As you know, Rich Internet Applications are web-based software programs that behave and operate like a desktop application. These may be delivered through a site-specific browser, a browser plug-in, or through other methods; they are especially useful for massively-multiplayer online role-playing games (MMORPGs). RIA training can be especially useful in learning the tools that are used for designing and developing these increasingly-necessary additions to Internet Web Sites.

    Read the article

  • Is it a good practice to code in English? [closed]

    - by Milox
    Possible Duplicate: Do people in non-English-speaking countries code in English? I have a development comming that is intended to be sold across Latin America (Spanish speakers), but I've heard from some partners that is a good practice to always code in English, I mean just code (methods, classes, pages names, etc), labels on GUI are going to be all in Spanish... Code will be edited in the future by developer of companies across Latin America and just maybe some from outside. What do you think?, any experience with this?

    Read the article

  • How to move the rigidbody at the position of the mouse on release

    - by Edvin
    I'm making a "Can Knockdown" game and I need the rigidbody to move where the player released the mouse(OnMouseUp). Momentarily the Ball moves OnMouseUp because of rigidbody.AddForce(force * factor); and It moves toward the mousePosition but doesn't end up where the mousePosition is. Here's what I have so far in the script. var factor = 20.0; var minSwipeDistY : float; private var startTime : float; private var startPos : Vector3; function OnMouseDown(){ startTime = Time.time; startPos = Input.mousePosition; startPos.z = transform.position.z - Camera.main.transform.position.z; startPos = Camera.main.ScreenToWorldPoint(startPos); } function OnMouseUp(){ var endPos = Input.mousePosition; endPos.z = transform.position.z - Camera.main.transform.position.z; endPos = Camera.main.ScreenToWorldPoint(endPos); var force = endPos - startPos; force.z = force.magnitude; force /= (Time.time - startTime); rigidbody.AddForce(force * factor); }

    Read the article

  • O'Reilly deal of the day 25/June/2012 - The Art of SEO, 2nd Edition

    - by TATWORTH
    Today's deal of the day from O'Reilly at http://shop.oreilly.com/product/0636920019091.do?code=DEAL is The Art of SEO, 2nd Edition"Four acknowledged experts in search engine optimization share guidelines and innovative techniques that will help you plan and execute a comprehensive SEO strategy. This second edition brings you up to date on recent changes in search engine behavior—such as new ranking methods involving user engagement and social media—with an array of effective tactics, from basic to advanced." You should note that this is the second edition published March 2012

    Read the article

  • SEO Marketing - You Must Avoid These Fatal Errors

    Search engine optimization is one of the main cornerstones of internet marketing for many online affiliates and retailers. It is among the list of the most sought after methods for getting traffic. Almost every individual or company, who is doing some sort of selling or associate promotion, is a least considering SEO in order to get more exposure for their website.

    Read the article

  • Does connecting to the default host via public IP from within its subnet cause any issues?

    - by username
    I'm setting up a small office network with a single public IP (let's say it's 69.16.230.117). I've configured NAT on the router with incoming traffic forwarded to the server (say the server has a private IP of 192.168.0.2). Is it okay to configure the client machines on the same subnet to access the server via the router's public IP (69.16.230.117)? In practice it's never caused me problems, but I've heard, here and there, that it is a bad idea, and one should use the private IP (192.168.0.2). Does connecting to the default host via public IP from within its subnet cause any issues? Please refrain from writing "never! it breaks the intranet!" ;-)

    Read the article

  • Preparing Your Website For a Pre-Launch

    Have you ever launched your own website before and received no traffic or any visitors to it in the first few weeks? I know I have, and it was disappointing. I want to share with you some simple steps to avoid the same mistakes I made when I first started. Also these steps are not hard to implement and does require a bit of effort on your part. I know once you have tried these proven methods you will never launch a website without this.

    Read the article

  • Can Apache be configured to specify more than one docroot per virtualhost?

    - by syn4k
    I have a vhost which specifies <VirtualHost *:80> DocumentRoot "/private/var/www/html/cms/sites/" ServerName localhost.com </VirtualHost> I would like to know if localhost.com can also point to /private/var/www/html/wordpress/. This seems like a no brainer but Apache is like black magic; these things are always possible. Anyway, I already know that I could specify a new ServerName entry and set a new docroot. The problem is, both directories need to be available as roots. If I need to provide more info, I will gladly do so.

    Read the article

  • Protobuf design patterns

    - by Monster Truck
    I am evaluating Google Protocol Buffers for a Java based service (but am expecting language agnostic patterns). I have two questions: The first is a broad general question: What patterns are we seeing people use? Said patterns being related to class organization (e.g., messages per .proto file, packaging, and distribution) and message definition (e.g., repeated fields vs. repeated encapsulated fields*) etc. There is very little information of this sort on the Google Protobuf Help pages and public blogs while there is a ton of information for established protocols such as XML. I also have specific questions over the following two different patterns: Represent messages in .proto files, package them as a separate jar, and ship it to target consumers of the service --which is basically the default approach I guess. Do the same but also include hand crafted wrappers (not sub-classes!) around each message that implement a contract supporting at least these two methods (T is the wrapper class, V is the message class (using generics but simplified syntax for brevity): public V toProtobufMessage() { V.Builder builder = V.newBuilder(); for (Item item : getItemList()) { builder.addItem(item); } return builder.setAmountPayable(getAmountPayable()). setShippingAddress(getShippingAddress()). build(); } public static T fromProtobufMessage(V message_) { return new T(message_.getShippingAddress(), message_.getItemList(), message_.getAmountPayable()); } One advantage I see with (2) is that I can hide away the complexities introduced by V.newBuilder().addField().build() and add some meaningful methods such as isOpenForTrade() or isAddressInFreeDeliveryZone() etc. in my wrappers. The second advantage I see with (2) is that my clients deal with immutable objects (something I can enforce in the wrapper class). One disadvantage I see with (2) is that I duplicate code and have to sync up my wrapper classes with .proto files. Does anyone have better techniques or further critiques on any of the two approaches? *By encapsulating a repeated field I mean messages such as this one: message ItemList { repeated item = 1; } message CustomerInvoice { required ShippingAddress address = 1; required ItemList = 2; required double amountPayable = 3; } instead of messages such as this one: message CustomerInvoice { required ShippingAddress address = 1; repeated Item item = 2; required double amountPayable = 3; } I like the latter but am happy to hear arguments against it.

    Read the article

  • Affordable SEO Service is the Best Option

    Affordable SEO service is the key to a prosperous online marketing business. There are many ways of doing internet marketing but a few most popular methods that seem to be on the rise include Search Engine Optimization, better known as SEO, Pay Per Click or PPC, Website lead Generations, Google AdSense, online newsletters and online magazines. SEO-service is on the rise in the contemporary world.

    Read the article

  • Backup restore issue

    - by rrahman_bd
    I have a windows server 2008 with exchange database full backup. Now for testing purpose i want to restore that full server to a VM. I have copied the whole backup to VM01 and took it to Private Network. And now i want to take backup from VM01 and restore it to VM02. Both are at private network. I was able to find VM02 test backup by searching in VM1. But the copyed restore file is not showing in the window !!! Is there any policy so that i can not restore except from the original location?

    Read the article

  • How to Find Good Link Partners

    People in the SEO world know that Google calculates the search engine ranking through the highest number of quality backlinks. Webmasters make use of different SEO methods to acquire backlinks legally. Finding good link partners is one of the SEO techniques.

    Read the article

  • An Overview of the SQL Server xml Data Type

    XML is, it seems, everywhere. SQL Server has ever-improving functionality that helps us peek into, shred, store, manipulate and otherwise utilize XML. This article covers XML variables, XML columns, typed vs. untyped XML, and the xml data type methods.

    Read the article

< Previous Page | 264 265 266 267 268 269 270 271 272 273 274 275  | Next Page >