Search Results

Search found 45013 results on 1801 pages for 'example'.

Page 304/1801 | < Previous Page | 300 301 302 303 304 305 306 307 308 309 310 311  | Next Page >

  • Are Intel and Motorola moving towards a MIPS/RISC model? [closed]

    - by Nick Rosencrantz
    Is it true what I read that Intel and Motorola are moving from CISC to a programming model more like RISC/MIPS? Why? From the famous book "Computer Architecture" by Hennessay which usually is recommended around here: Recent implementations of the x86 architecture actually translate x86 instruction into simple operation that look like MIPS instuctions.... Page 335. What does this mean specifically? Can you show me an example?

    Read the article

  • Is having sensitive data in a PHP script secure? [closed]

    - by tkbx
    Possible Duplicate: What attributes of PHP make it insecure? I've heard that PHP is somewhat secure because Apache won't allow the download of raw PHP. Is this reliable, though? For example, if you wanted to password protect something, but didn't want to create a database, would something like $pass = "123454321"; be safe? Bottom line, is it safe to assume that nobody has access to the actual .php file?

    Read the article

  • The Top 4 Link Building Techniques

    Over the last several years, "social bookmarking" has become very popular. Digg.com is the best example of a social bookmarking site. You can submit a link to a webpage and others can vote on it, with the idea that the cream rises to the top and all of the most important stories are shown on the homepage.

    Read the article

  • Did Bjarne Stroustrup create the terms constructor/destructor when talking about objects?

    - by user104971
    I was watching this keynote and Bjarne Stroustrup (Creator of C++) claims that he hadn't yet invented the words constructor and destructor yet when he was giving an example of RAII. http://www.youtube.com/watch?v=IYBLXBJr0HU I know the concept of construction and destruction has been around a lot longer (even in C, a function that allocates and returns a struct and then a function that frees it etc.), but was Bjarne really the first to invent the terms?

    Read the article

  • A walkthrough to Application State

    This artcile discuss about the Application Level events,Application state with a simple example...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Can a whitespace regex character be used to perform a javascript injection? [migrated]

    - by webose
    if I want to validate the input of a <textarea>, and want it to contain, for example, only numerical values, but even want to give users the possibility to insert new lines, I can selected wanted characters with a javascript regex that includes even the whitespace characters. /[0-9\s]/ The question is: do a whitecharacter can be used to perform injections, XSS,even if I think this last option is impossible, or any other type of attack ? thanks

    Read the article

  • CheckBox Web Control Basics in ASP.NET 3.5

    In this second part of a series on basic ways to gather user input in ASP.NET 3.5 we ll cover checkbox web controls. Checkboxes are an appropriate choice in situations where a radio button won t work -- where you want to let a user select more than one choice among a group of options for example.... Download a Free Trial of Windows 7 Reduce Management Costs and Improve Productivity with Windows 7

    Read the article

  • Close button closes application behind the actual one. What is the problem?

    - by user34878
    Occasionally when I hit the close button ('x' on the left) instead of closing the application I am looking at, it closes another application. A very common example situation: I am using Firefox, and then I open the Trash directory (because Unity sux and make me click the trash icon in the auto-hide menu every time). Then I click in the close button and the trash do not go away, but Firefox does. How can I work around this problem?

    Read the article

  • Drag and Drop-How to get the url's title?, Name? Description? (2 replies)

    I made a .Hta file that contains some drag and drop (primitive coding, alas). (see full .hta code at bottom of this posting) The .hta returns the url of links that are dragged and dropped onto it. But there's info it doesn't return that I need, and I don't know the right term to describe what I need that I'm not getting. To explain by example, if I open a window to this url: http://dotcommunities....

    Read the article

  • Flipping text is good for SEO?

    - by MariaZ
    My client's name company has a flipped letter on its name, so for example "PEOPLE" the P is flipped, I managed to flip the P with 2 span tags, but now I am thinking to do this for SEO reasons is not good, because of the SPANS. I have the feeling the search engines might not underestand a flipped P, and it is better just use a normal name. What do you think? thanks, the flip html is <span class="flip"><span>P</span></span>

    Read the article

  • Upgrading from a previous version of Ubuntu [closed]

    - by Jason Digg
    Possible Duplicate: Will there be data loss for upgrade? Can we upgrade a previous version of ubuntu to the latest version without losing data ? (For example, will I be able to upgrade the 10.10 version to 11.04, which is due to be released in April of 2011?) I mean, there is a new version coming out every 6 months, so it will be convenient if we are able to upgrade without losing on the data .

    Read the article

  • Native PHP vs exec()

    - by resting
    Just wondering, assuming no security issues, that is, you're in total control of the command passed to exec(), is there a difference (in terms of speed or standards) between using exec() vs native PHP? Example just to name a few use cases: Using the DirectoryIterator vs exec(ls -1, $output), to list all files. List 100 files from the 99th file onwards (that is, file 100 to 199) Count total number of files in directory.

    Read the article

  • AutoMapper

    AutoMapper is an object-object mapper which allows you to solve issues with mapping the same properties from one object of one type to another object of another type. For example, mapping a heavy entity Customer object to the CustomerDTO could be done with AutoMapper automatically.

    Read the article

  • SEO Companies Selling a Range of Products

    By launching your web browser and having a glance at the websites and homepages of the leading SEO companies over the net, you would find a lot of packages as well as custom products which have been prepared for a variety of web purposes and it is essential to know what packages are to be chosen and purchased which would lead to some successful and great online results. As an example, when your site is relatively new and you have just registered a domain name a couple of weeks ago, buying some link building bundles could be recommended since...

    Read the article

  • Whar parts of functionality should be refactored into a directive? [AngularJS]

    - by Sprottenwels
    I am creating an application from legacy code using AngularJS. I wonder what parts of my code should be moved into a directive. For example, i had thought of moving a table which is used multiple times across the application into a directive. The tables alter from headings and size. Is it worth the effort or even a good practice to turn such things into their own directives or should i create each table in a unique way?

    Read the article

  • How a Good SEO Company Can Benefit Your Online Marketing Campaign

    The key benefit of integrating SEO into your marketing plan is to increase natural targeted traffic to your website. This is done by optimising your site for the keywords you want to be listed for, for example, you want to be number one on Google for the key phrase "widgets", then you would optimise your site or page around this term. As SEO offers a great return on investment, it is often considered to be more beneficial in the long term than any other form of marketing.

    Read the article

  • Conditional checks against a list

    - by AnnaSexyChick
    I was wondering how computers do this. The most logical way I can think is that they are iterating trough all elements of the list until they find one that matches the condition :) For example if you call function_exists(), PHP should iterate trough all defined functions until it meets the one that matches the name you're looking for. Is this true that this is the only way? If it is, it sounds like it's not very efficient :s

    Read the article

  • How to safely upgrade from an older Ubuntu version to a newer one?

    - by NikTh
    How can I safely upgrade an Ubuntu installation from one release to another? What should I do before upgrading to ensure it goes smoothly, and is there any clean-up I need to do afterwards? In particular, do I need to do anything special if I am using packages from PPAs, if I have a graphics card that needs drivers, or if I'm running a custom Linux kernel? This is a general question , but as example we take Ubuntu 12.04 and Ubuntu 12.10

    Read the article

  • Canonicalization (On Page Optimization of Duplicate Contents)

    In this article we have discussed about the process of canonicalization that was officially announced by search engines last year to optimize website to avoid indexing of duplicate contents. Further we have discussed a scenario with a real life example in which canonicalization can be helpful and then we have seen its syntax and usage.

    Read the article

  • Concept: Interpretive Spells [closed]

    - by Deathly
    The goal is to be able to create complex spells, that can manipulate the game's environment in non-preprogrammed ways, and to make the program understand spells. For example: $@ $=Big @=Fire You can probably understand what this one means. The player types, writes, or selects symbols. Of course, a spell can be only a few characters, or more sophisticated spells could potentially be hundreds or thousands of symbols long. How could something like this be accomplished?

    Read the article

  • How detailed should your report/invoice be for hourly work? [on hold]

    - by Marcus Cavanaugh
    When working on development projects (like an iPhone app for a client), how detailed should your reports be when providing an invoice? In other words, how specific should you be regarding the particular development tasks you were working on at a given time? Just as helpful would be a short example of what one of your invoices looks like, with sample times and tasks that you would typically include.

    Read the article

< Previous Page | 300 301 302 303 304 305 306 307 308 309 310 311  | Next Page >