Search Results

Search found 16435 results on 658 pages for 'portable applications'.

Page 367/658 | < Previous Page | 363 364 365 366 367 368 369 370 371 372 373 374  | Next Page >

  • Bunny Inc. Season 2: Find Specialist Partner Resources for Success

    - by kellsey.ruppel
    You may need an additional hand to improve your IT infrastructure, or advice to evolve existing enterprise applications. Or perhaps you’re seeking revolutionary ideas to refresh online presence. Whatever the case, spotting the right partners’ ecosystem will be a central step to grow your business. Don't be a Hare Inc. company by wasting valuable time sourcing relevant expertise, competencies and proven successes on Oracle's product portfolio on your own. Follow Bunny Inc. in the fourth episode of the saga and discover what our worldwide partner community can do for you thanks to the new Oracle Partner Network Specialized program. 

    Read the article

  • License for library developed with commercial program

    - by Overv
    I'm developing a commercial application that largely depends on the functionality of a library that will be developed with it. I'd like to open-source this library, because it offers functionality that is not found elsewhere and can be useful in other applications. However, I will also use it in my own commercial application. I don't want to publish the source of the main application, but it is definitely not a derived work (think of calculator app using GPL licensed library to calculate sine). And if someone else commercially uses the library, I want to require them to publish any changes made. Is the GPL license suitable for this or is LGPL perhaps what I need?

    Read the article

  • Simpler Times

    - by Simon Moon
    Does anyone else out there long for the simpler days where you needed to move a jumper in the jumper block to set your modem card to use IRQ7 so it would not conflict with the interrupts used by other boards in your PC and your modem card came with a 78 page manual telling you everything you would need to know to write your own driver for the board including a full schematic along with the board layout showing every chip, capacitor, and resistor?  Ahhhhh, the simplicity!I am wrestling with UserPnp issues for a USB software licensing dongle that is needed by some third party software in one of our production applications. Of course, every machine in production is virtual, so it could be anything in the chain of the software application library to the device driver running on the VM to the configuration of the simulated USB port to the implementation of the USB connection and transport in the virtual host to the physical electrical connections in the USB port on the hypervisor.If only there were the virtual analog to a set of needle-nose pliers to move a virtual jumper.Come to think of it, I always used to drop those damn things such that they would land in an irretrievable position under the motherboard anyway.

    Read the article

  • Des failles découvertes dans les formats d'archivage, permettant dissimulation et propagation de cod

    Des failles découvertes dans les formats d'archivage, permettant dissimulation et propagation de codes malveillants La semaine dernière, lors de la Black Hat (l'évènement mondial en terme de sécurité informatique, qui a lieu plusieurs fois par an, cette édition s'est déroulée à Barcelone), des chercheurs ont exposé leurs résultats à propos d'une étude concernant les formats d'archivage populaires. Tomislav Pericin, fondateur du projet de protection de programmes RLPack, a découvert comment y cacher des programmes malins indétectables par la majorité des antivirus. Il assure cependant que la majorité des vendeurs d'antivirus ont récemment mis à jour leurs applications afin de détecter les formats d'archive compromis, comme ".ra...

    Read the article

  • D'Objective-C à JavaScript : Microsoft porte les 15.000 lignes de code de "Cut The Rope" et rend disponibles les outils qui l'ont aidé

    JavaScript : Microsoft porte les 15 000 lignes de code « Cut The Rope » Depuis Objective-C et rend disponibles les outils qui l'ont aidé Si Cut the Rope ne vous dit rien, vous pouvez dès à présent aller voir à quoi ressemble ce « best seller » des jeux mobiles. Ses premiers niveaux sont à présent disponibles en applications Web. Si vous le connaissez, vous serez peut-être étonnés d'apprendre que Microsoft vient en effet de porter le code initial (en Objetcive-C) en... JavaScript. Le projet a été mené pour trois raisons : montrer la puissance de ces technologies, promouvoir IE 10 (même si le jeu fonc...

    Read the article

  • Silverlight 4 + RIA Services - Ready for Business: Authentication and Personalization

    To continue our series,  In real business applications our data is often very valuable and as such we need to know who is accessing what data and control certain data access to only users with privilege.  Luckily this is very easy to do with RIA Services.  For example, say we want to let only authenticated users access our data in this example.   That is as easy to accomplish as adding an attribute, see line 2 below.    1: [EnableClientAccess] 2: ...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Hack de la PS3 : Sony aura accès aux données des internautes l'ayant téléchargé ou consulté, une décision de justice très polémique

    Hack de la PS3 : Sony aura accès aux données des internautes L'ayant téléchargé ou consulté, une décision de justice très polémique L'affaire risque de faire grand bruit et de créer une nouvelle frontière (numérique) entre respect de la vie privée et défense des droits d'auteurs. Tout commence avec une procédure de Sony souhaite lutter contre le piratage de sa console de jeux, la PS3. La société japonaise veut ainsi mettre fin, ou en tout cas limiter, le hack qui permet de déverrouiller l'appareil pour y faire tourner ? entre autres applications ? des titres piratés. Seul problème, ce hack et sa méthode sont disponibles ? et même très largement disponibles ? sur Int...

    Read the article

  • Oracle Launches Mobile User Experiences Design Patterns

    - by asantaga
    Mobile design requires a different way of thinking. Use Oracle’s mobile design patterns to design iPhone, Android, or browser-based smartphone applications.  We are sharing our mobile design patterns and their baked-in, scientifically proven usability to enable Oracle customers and partners to build mobile apps quickly. Our design patterns are common solutions that developers can easily apply across all application suite products. Crafted by our insight into Oracle Fusion Middleware, the patterns are designed to work with the mobile technology provided by the Oracle Application Development Framework.  Normal 0 false false false false EN-US JA X-NONE

    Read the article

  • Xamarin abandonne Moonlight, la version Mono de Silverlight, la plateforme a-t-elle encore un avenir ?

    Xamarin abandonne Moonlight la version Mono de Silverlight, la plateforme a-t-elle encore un avenir ? Microsoft supportera la version 5 de Silverlight jusqu'en 2021, et pourrait même développer une version 6. Mais, une implémentation de la plateforme de développement d'applications Web riches ne bénéficiera d'une telle faveur. Xamarin, la startup à l'origine de Mono, l'implémentation Open Source multiplateforme de .NET vient d'annoncer la fin de Moonlight, la version Mono de Silverlight. En dépit d'un manque de ressources, Miguel de Icaza créateur de Mono ne croit plus en Silverlight : « Silverlight n'a pas été beaucoup adopté sur le Web de sorte qu'il devienne la technologie ...

    Read the article

  • Le HTML5, 6 à 10 fois moins rapide sur smartphone, d'après une étude : le standard est-il vraiment adapté pour les jeux mobiles ?

    Le HTML5, entre 6 et 10 fois moins rapide sur smartphones que sur bureau Le standard est-il vraiment adapté pour des jeux mobiles ? Le HTML5 sur mobile n'est pas encore tout à fait adapté pour les applications multi-plateformes complexes. C'est en résumé la conclusion d'une étude menée par la société spaceport.io qui souligne par exemple que le rendu des animations en HTML5 sur Smartphones et tablettes est très largement inférieur à celui sur PC de Bureau. Voilà qui a de quoi faire réfléchir sur la dimension "développer une fois, fonctionne partout" semblable à celle de Java et tant vantée pour la technologie Web comme alternative à des développements natifs. D'après cett...

    Read the article

  • Webcast: Oracle's Vision For The Socially-Enabled Enterprise

    - by Michael Hylton
    Smart companies are developing social media strategies to engage customers, gain brand insights, and transform employee collaboration and recruitment. Oracle is powering this transformation with the most comprehensive enterprise social platform that lets you:     Monitor and engage in social conversations     Collect and analyze social data     Build and grow brands through social media     Integrate enterprise-wide social functionality into a single system     Create rich social applications Join Oracle President Mark Hurd and senior Oracle executives to learn more about Oracle’s vision for the social-enabled enterprise.  Click here to register.

    Read the article

  • Webcast: Oracle's Vision For The Socially-Enabled Enterprise

    - by Michael Hylton
    Smart companies are developing social media strategies to engage customers, gain brand insights, and transform employee collaboration and recruitment. Oracle is powering this transformation with the most comprehensive enterprise social platform that lets you:     Monitor and engage in social conversations     Collect and analyze social data     Build and grow brands through social media     Integrate enterprise-wide social functionality into a single system     Create rich social applications Join Oracle President Mark Hurd and senior Oracle executives to learn more about Oracle’s vision for the social-enabled enterprise.  Click here to register.

    Read the article

  • Java update

    - by JuergenKress
    Oracle has just released Security Alert CVE-2012-4681 to address 3 distinct but related vulnerabilities and one security-in-depth issue affecting Java running in desktop browsers.  These vulnerabilities are: CVE-2012-4681, CVE-2012-1682, CVE-2012-3136, and CVE-2012-0547.  These vulnerabilities are not applicable to standalone Java desktop applications or Java running on servers, i.e. these vulnerabilities do not affect any Oracle server based software." (Read more at https://blogs.oracle.com/security/entry/security_alert_for_cve_20121) Updates are available at http://www.oracle.com/technetwork/java/javase/overview/index.html or Check your Java version online: http://www.java.com/de/download/testjava.jsp WebLogic Partner Community For regular information become a member in the WebLogic Partner Community please visit: http://www.oracle.com/partners/goto/wls-emea ( OPN account required). If you need support with your account please contact the Oracle Partner Business Center. Blog Twitter LinkedIn Mix Forum Wiki Technorati Tags: Java,Java Security,Java update,WebLogic,WebLogic Community,Oracle,OPN,Jürgen Kress

    Read the article

  • Lubuntu 14.04 Problem starting lxsession-default-apps

    - by user278179
    I have one problem, I can't execute lxsession-default-apps on Lubuntu 14.04 because I get because said to me "The database is updating, please wait" If I try to run lxsession-default-apps, I get this error: ** Message: utils.vala:30: config_path_directory: /home/USER/.config/lxsession-default-apps ** Message: desktop-files-backend.vala:171: test config_path: /home/USER/.config/lxsession-default-apps/settings.conf ** Message: desktop-files-backend.vala:237: Scanning folder: /usr/share/applications ** Message: desktop-files-backend.vala:278: Start scanning ** Message: desktop-files-backend.vala:257: Scanning folder: /usr/share/app-install/desktop ** Message: desktop-files-backend.vala:278: Start scanning Error: list_files failed: No such file or directory ** Message: desktop-files-backend.vala:333: Finishing scanning ** Message: desktop-files-backend.vala:189: Signal finish scanning with mode: write ** Message: desktop-files-backend.vala:333: Finishing scanning Any help would be appreciated. Thanks. Regards.

    Read the article

  • Options for Application Registry

    - by Matt Felzani
    I work for a small software company (about 200 people building 8-10 applications) and I was hoping to get some advice on products that might be out there to manage the information of which clients are using which versions of our products? The most fundamental relationship would be that a "product" has "versions" and a given "version" is used by a "client." Uses would be: Determine which clients use which products Determine which clients are on which versions of a product Determine which clients are exposed to which vulnerabilities because of the version they use Determine which clients cannot move to a new version because of a vulnerability in the new version that they may hit Determine which clients should be approached for an upgrade Any thoughts or product reviews would be greatly appreciated! Thanks in advance.

    Read the article

  • Coherence Data Guarantees for Data Reads - Basic Terminology

    - by jpurdy
    When integrating Coherence into applications, each application has its own set of requirements with respect to data integrity guarantees. Developers often describe these requirements using expressions like "avoiding dirty reads" or "making sure that updates are transactional", but we often find that even in a small group of people, there may be a wide range of opinions as to what these terms mean. This may simply be due to a lack of familiarity, but given that Coherence sits at an intersection of several (mostly) unrelated fields, it may be a matter of conflicting vocabularies (e.g. "consistency" is similar but different in transaction processing versus multi-threaded programming). Since almost all data read consistency issues are related to the concept of concurrency, it is helpful to start with a definition of that, or rather what it means for two operations to be concurrent. Rather than implying that they occur "at the same time", concurrency is a slightly weaker statement -- it simply means that it can't be proven that one event precedes (or follows) the other. As an example, in a Coherence application, if two client members mutate two different cache entries sitting on two different cache servers at roughly the same time, it is likely that one update will precede the other by a significant amount of time (say 0.1ms). However, since there is no guarantee that all four members have their clocks perfectly synchronized, and there is no way to precisely measure the time it takes to send a given message between any two members (that have differing clocks), we consider these to be concurrent operations since we can not (easily) prove otherwise. So this leads to a question that we hear quite frequently: "Are the contents of the near cache always synchronized with the underlying distributed cache?". It's easy to see that if an update on a cache server results in a message being sent to each near cache, and then that near cache being updated that there is a window where the contents are different. However, this is irrelevant, since even if the application reads directly from the distributed cache, another thread update the cache before the read is returned to the application. Even if no other member modifies a cache entry prior to the local near cache entry being updated (and subsequently read), the purpose of reading a cache entry is to do something with the result, usually either displaying for consumption by a human, or by updating the entry based on the current state of the entry. In the former case, it's clear that if the data is updated faster than a human can perceive, then there is no problem (and in many cases this can be relaxed even further). For the latter case, the application must assume that the value might potentially be updated before it has a chance to update it. This almost aways the case with read-only caches, and the solution is the traditional optimistic transaction pattern, which requires the application to explicitly state what assumptions it made about the old value of the cache entry. If the application doesn't want to bother stating those assumptions, it is free to lock the cache entry prior to reading it, ensuring that no other threads will mutate the entry, a pessimistic approach. The optimistic approach relies on what is sometimes called a "fuzzy read". In other words, the application assumes that the read should be correct, but it also acknowledges that it might not be. (I use the qualifier "sometimes" because in some writings, "fuzzy read" indicates the situation where the application actually sees an original value and then later sees an updated value within the same transaction -- however, both definitions are roughly equivalent from an application design perspective). If the read is not correct it is called a "stale read". Going back to the definition of concurrency, it may seem difficult to precisely define a stale read, but the practical way of detecting a stale read is that is will cause the encompassing transaction to roll back if it tries to update that value. The pessimistic approach relies on a "coherent read", a guarantee that the value returned is not only the same as the primary copy of that value, but also that it will remain that way. In most cases this can be used interchangeably with "repeatable read" (though that term has additional implications when used in the context of a database system). In none of cases above is it possible for the application to perform a "dirty read". A dirty read occurs when the application reads a piece of data that was never committed. In practice the only way this can occur is with multi-phase updates such as transactions, where a value may be temporarily update but then withdrawn when a transaction is rolled back. If another thread sees that value prior to the rollback, it is a dirty read. If an application uses optimistic transactions, dirty reads will merely result in a lack of forward progress (this is actually one of the main risks of dirty reads -- they can be chained and potentially cause cascading rollbacks). The concepts of dirty reads, fuzzy reads, stale reads and coherent reads are able to describe the vast majority of requirements that we see in the field. However, the important thing is to define the terms used to define requirements. A quick web search for each of the terms in this article will show multiple meanings, so I've selected what are generally the most common variations, but it never hurts to state each definition explicitly if they are critical to the success of a project (many applications have sufficiently loose requirements that precise terminology can be avoided).

    Read the article

  • Why is JavaScript not used for classical application development (compiled software)?

    - by Jose Faeti
    During my years of web development with JavaScript, I come to the conclusion that it's an incredible powerful language, and you can do amazing things with it. It offers a rich set of features, like: Dynamic typing First-class functions Nested functions Closures Functions as methods Functions as Object constructors Prototype-based Objects-based (almost everything is an object) Regex Array and Object literals It seems to me that almost everything can be achieved with this kind of language, you can also emulate OO programming, since it provides great freedom and many different coding styles. With more software-oriented custom functionalities (I/O, FileSystem, Input devices, etc.) I think it will be great to develop applications with. Though, as far as I know, it's only used in web development or in existing softwares as a scripting language only. Only recently, maybe thanks to the V8 Engine, it's been used more for other kind of tasks (see node.js for example). Why until now it's only be relegated only to web development? What is keeping it away from software development?

    Read the article

  • SAP en dit peu sur ses projets concernant Sybase, mais semble très interessé par l'intégration de se

    Mise à jour du 25.05.2010 par Katleen SAP en dit peu sur ses projets concernant Sybase, mais semble très interessé par l'intégration de ses technologies mobiles La direction de SAP reste très évasive quant à ses plans concernant le futur de Sybase et de ses technologies, suite à l'annonce officielle du rachat du second par le premier. La semaine dernière se tenait la conférence Sapphire à Orlando, mais très peu d'informations y furent divulguées. Le CEO de SAP, Bill McDermott, a juste annoncé l'arrivée à une date indéterminée d'une suite complète d'applications ERP et d'outils de business intelligence qui pourront tourner sur "n'importe quelle machine, à n'importe quel endroit, n'importe ...

    Read the article

  • Is having your own website important?

    - by Josh K
    How necessary or important is it? I try to keep a running list of blogs or sites to follow, but a lot of the time I pull up someone's profile and notice there isn't anything there. Is it really important? I understand are different levels of programming (from C/C++ system programmers to Rails and even Haskell and J) and not everyone works in a language easily worked with for web based applications. Not everything is web-centric, however with the advent of many popular and sometimes free services I don't think it's unreasonable to expect a majority of programmers to have a personal site.

    Read the article

  • How do i fix the slow scroll in browsers and high XOrg cpu usage

    - by Virgil
    I am facing an issue while scrolling in browsers(firefox, chrome, and opera) , scroll is jagged and slow. Also when scrolling the cpu usage spikes. I am currently running ubuntu natty(beta 1), switched from ubuntu 10.10 where the problem was worse. I am using the nvidia beta driver, which ubuntu installed automatically. My graphic card is nvidia Quadro NVS 150M. I tried running ubuntu without the effects on , but when using multiple applications at the same time xorg usage spikes again. Additional info: 2GB of RAM and an intel core 2 duo processor. Any help would be greatly appreciated. Thanks in advance!

    Read the article

  • Good Intro to Computer Science Book for FE Developer [on hold]

    - by Squirkle
    I am a JavaScript developer/architect who, like many developers these days, did not come from a Computer Science background (I studied Philosophy at a liberal arts college), but instead learned development by actually building applications, and by reading books explaining language grammars, design patterns, and best practices. I have never felt that my ignorance of CS concepts has hurt my ability to build great apps or find employment. Recently, however, I have felt the itch to grow in this direction. Do you have any suggestions for some good introductory CS resources/books? I know that Computer Science is a huge field and my question is very general, but I am looking for a 101-type survey of the high-level concepts, from which I can branch off into more specific areas of study. Thanks!

    Read the article

  • ASP.NET 3.5 Gridview Hyperlink Columns

    One of the most common applications of GridView tables in ASP.NET 3.5 involves hyperlinks. The hyperlink can be database-driven which means it will retrieve hyperlink information from the MS SQL server database in the form of URLs or part of complete URLs. Adding hyperlinks to the Gridview columns can be accomplished using the hyperlinkfield. ... Business Productivity Online Suite From $10 per user per month. Includes a 12-month subscription. Min 5 seats.

    Read the article

  • HTTP Session Invalidation in Servlet/GlassFish

    - by reza_rahman
    HTTP session invalidation is something most of us take for granted and don't think much about. However for security and performance sensitive applications it is helpful to have at least a basic understanding of how it works in Servlets. In a brief code centric blog post Servlet specification lead Shing Wai Chan introduces the APIs for session invalidation and explains how you can fine tune the underlying reaper thread for session invalidation when it is needed in GlassFish 4. Don't hesitate to post a question here if the blog is not clear, this is a relatively esoteric topic...

    Read the article

  • Use Adwaita Dark for Libre Office and possibly other apps too?

    - by Relik
    I would like to know how to force some apps to use the Adwaita dark theme. I noticed by default that the movie player and photo viewer apps in gnome shell use Adwaita Dark while most other apps use the Light variant. I would really like to set Libre Office to use Dark instead of Light. How would I go about doing this? I found the site below, but the instructions seem a bit outdated and they do not work for GTK3. http://urukrama.wordpress.com/2008/07/13/setting-a-custom-gtk-theme-for-specific-applications/

    Read the article

  • How do you describe your profession in a public place or conference?

    - by Jenko
    I've often been in situations where non-technical people ask me, "So, what do you do?" ... and I've found it somewhat hard to describe that I spend the entirely of my days pouring over colored text. Of course, its quite reasonable to say "I design software" or "I develop computer applications", but that still feels somewhat "lame" and generic. So how do you describe your profession in public situations? are there any insights for those of us less gifted in public speaking?

    Read the article

< Previous Page | 363 364 365 366 367 368 369 370 371 372 373 374  | Next Page >