Search Results

Search found 22718 results on 909 pages for 'developer 2010'.

Page 382/909 | < Previous Page | 378 379 380 381 382 383 384 385 386 387 388 389  | Next Page >

  • 5 Steps for Creating a Successful Banner Design

    Banners are supposed to be one of the most effective ways of marketing your products and services. They account for a better visibility and scope for placing your products in the eyes of your custome... [Author: Jessica Woodson - Web Design and Development - March 29, 2010]

    Read the article

  • Joomla Template Club Makes Your Web Design a Breeze

    Building a new web site will be a lot of trouble when you begin looking at all the minute details. You have to find a company that can provide you with a domain name that is offered and expresses the... [Author: Joel Morrison - Web Design and Development - April 20, 2010]

    Read the article

  • Free Gaming Online With Kongregate

    Kongegrate is a fantastic new gaming site, as you know gaming is something I don';t know much about. So this week, Matt Stevenson has kindly offered to write for you. Enjoy! " A year and a half ago I... [Author: Chris Holgate - Computers and Internet - April 10, 2010]

    Read the article

  • New TPerlRegEx Compatible with Delphi XE

    - by Jan Goyvaerts
    The new RegularExpressionsCore unit in Delphi XE is based on the PerlRegEx unit that I wrote many years ago. Since I donated full rights to a copy rather than full rights to the original, I can continue to make my version of TPerlRegEx available to people using older versions of Delphi. I did make a few changes to the code to modernize it a bit prior to donating a copy to Embarcadero. The latest TPerlRegEx includes those changes. This allows you to use the same regex-based code using the RegularExpressionsCore unit in Delphi XE, and the PerlRegEx unit in Delphi 2010 and earlier. If you’re writing new code using regular expressions in Delphi 2010 or earlier, I strongly recomment you use the new version of my PerlRegEx unit. If you later migrate your code to Delphi XE, all you have to do is replace PerlRegEx with RegularExrpessionsCore in the uses clause of your units. If you have code written using an older version of TPerlRegEx that you want to migrate to the latest TPerlRegEx, you’ll need to take a few changes into account. The original TPerlRegEx was developed when Borland’s goal was to have a component for everything on the component palette. So the old TPerlRegEx derives from TComponent, allowing you to put it on the component palette and drop it on a form. The new TPerlRegEx derives from TObject. It can only be instantiated at runtime. If you want to migrate from an older version of TPerlRegEx to the latest TPerlRegEx, start with removing any TPerlRegEx components you may have placed on forms or data modules and instantiate the objects at runtime instead. When instantiating at runtime, you no longer need to pass an owner component to the Create() constructor. Simply remove the parameter. Some of the property and method names in the original TPerlRegEx were a bit unwieldy. These have been renamed in the latest TPerlRegEx. Essentially, in all identifiers SubExpression was replaced with Group and MatchedExpression was replaced with Matched. Here is a complete list of the changed identifiers: Old Identifier New Identifier StoreSubExpression StoreGroups NamedSubExpression NamedGroup MatchedExpression MatchedText MatchedExpressionLength MatchedLength MatchedExpressionOffset MatchedOffset SubExpressionCount GroupCount SubExpressions Groups SubExpressionLengths GroupLengths SubExpressionOffsets GroupOffsets Download TPerlRegEx. Source is included under the MPL 1.1 license.

    Read the article

  • The Kinney And I Boston Thursday May 13

    Im very pleased to announce that Adam Kinney and I will be at a Special Boston Spark event, Mix 2010 Recap.  The evening will feature an hour of Silverlight and Windows Phone, an hour of Blend and IE9 and an hour of informal Q&A. Date: May 13 [...]...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Common Areas For Securing Web Services

    The only way to truly keep a web service secure is to host it on a web server and then turn off the server. In real life no web service is 100% secure but there are methodologies for increasing the security around web services. In order for consumers of a web service they must adhere to the service’s Service-Level Agreement (SLA).  An SLA is a digital contract between a web service and its consumer. This contract defines what methods and protocols must be used to access the web service along with the defined data formats for sending and receiving data through the service. If either part does not abide by the contract then the service will not be accessible for consumption. Common areas for securing web services: Universal Discovery Description Integration  (UDDI) Web Service Description Language  (WSDL) Application Level Network Level “UDDI is a specification for maintaining standardized directories of information about web services, recording their capabilities, location and requirements in a universally recognized format.” (UDDI, 2010) WSDL on the other hand is a standardized format for defining a web service. A WSDL describes the allowable methods for accessing the web service along with what operations it performs. Web services in the Application Level can control access to what data is available by implementing its own security through various methodologies but the most common method is to have a consumer pass in a token along with a system identifier so that they system can validate the users access to any data or actions that they may be requesting. Security restrictions can also be applied to the host web server of the service by restricting access to the site by IP address or login credentials. Furthermore, companies can also block access to a service by using firewall rules and only allowing access to specific services on certain ports coming from specific IP addresses. This last methodology may require consumers to obtain a static IP address and then register it with the web service host so that they will be provide access to the information they wish to obtain. It is important to note that these areas can be secured in any combination based on the security level tolerance dictated by the publisher of the web service. This being said, the bare minimum security implantation must be in the Application Level within the web service itself. Typically I create a security layer within a web services exposed Internet that requires a consumer identifier and a consumer token. This information is then used to authenticate the requesting consumer before the actual request is performed. Refernece:UDDI. (2010). Retrieved 11 13, 2011, from LooselyCoupled.com: http://www.looselycoupled.com/glossary/UDDIService-Level Agreement (SLA). (n.d.). Retrieved 11 13, 2011, from SearchITChannel: http://searchitchannel.techtarget.com/definition/service-level-agreement

    Read the article

  • What is ICANN?

    Regardless of where you register your domain name and no matter who your domain registrar is, you are indirectly using the services of ICANN. Your domain registrar pays ICANN a small fee out of your ... [Author: Tanya Smith - Computers and Internet - April 06, 2010]

    Read the article

  • Are there still plans for a new sound theme?

    - by Ingo Gerth
    Let me quote from Mark's blog almost one year ago: March 5th, 2010 at 7:19 pm Mark, will there be an update to the sound theme to match the updated visual brand? Mark Shuttleworth: Gack, I completely forgot about that. A very good point. Would you see if you can rally a round of community submissions for a sound theme inspired by light? Lets keep it short and sweet: What are the current considerations for the Ubuntu default sound theme?

    Read the article

  • MCM Preperations - how it's going

    - by NeilHambly
    Since the announcement in November 2010 that the MCM SQL Server 2008 Training program had been revamped, read more on that here http://www.sqlskills.com/BLOGS/PAUL/post/Big-changes-to-the-MCM-program-and-how-SQLskills-can-help-you.aspx Experienced SQL Professionals now have more opportunity to undertake this advanced certification, Where they previously might not have been able to undertake for a variety of reasons, {time, money, location etc..} With a few announcements of those who has recently...(read more)

    Read the article

  • Benefits of POS Cash Register

    POS Cash Register is a cash register that is consisted of a Point of sale hardware and software. It comes with so many facilities that is worthy to the shop owners. That is why POS cash register is r... [Author: Alan Wisdom - Computers and Internet - April 05, 2010]

    Read the article

  • Week in Geek: LulzSec Hackers Calling it Quits

    - by Asian Angel
    This week we learned how to pin any file to the Windows 7 Taskbar, sync iTunes to an Android phone, create custom cover pages in Microsoft Word 2010, how you use the Command Line on your computers, got to indulge in some sweet Geek Deals, and more. Photo by pasukaru76.What is a Histogram, and How Can I Use it to Improve My Photos?How To Easily Access Your Home Network From Anywhere With DDNSHow To Recover After Your Email Password Is Compromised

    Read the article

  • Create Your Own Basecamp in Joomla!

    Imagine the possibilities when you create your own company intranet. ProjectPraise makes it a reality to create your own Basecamp in Joomla. With its companion ProjectFork theme, custom style paramet... [Author: David Tanguay - Web Design and Development - March 29, 2010]

    Read the article

  • Reasons for Conducting Keyword Research

    For successful SEO usage of proper keywords/key phrases is needed. Many webmasters lay extra importance to keyword research for every given article of web content. But most of the people new to this ... [Author: Alan Smith - Web Design and Development - June 13, 2010]

    Read the article

  • Hottest Clue About Facebook

    Individuals, of all different ages, enjoy meeting and communicating with other internet users. Despite the truth that individuals of all ages use the web to socialize, there are certain categories of... [Author: Abraham Itunnu - Computers and Internet - June 12, 2010]

    Read the article

  • Oracle #1 in Application Servers

    - by blake.connell
    Oracle is the leading application server vendor by a wide margin according to the latest Gartner data. Oracle has more market share then the next four vendors combined! If you have a Gartner subscription, check out the report "Market Share: Application Infrastructure and Middleware Software, Worldwide, 2009." (Fabrizio Biscotti, Teresa Jones, and Asheesh Raina - April 2010)

    Read the article

  • Looking for SQL 2008 R2 Training Resources

    - by NeilHambly
    Are you looking for some R2 Training Resources - then this would most likely keep you busy for a while digesting all the content http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=fffaad6a-0153-4d41-b289-a3ed1d637c0d SQL Server 2008 R2 Update for Developers Training Kit (April 2010 Update) it Contains the following Presentations (22) Demos (29) Hands-on Labs (18) Videos (35) SQL Server 2008 R2 offers an impressive array of capabilities for developers that build upon key innovations...(read more)

    Read the article

  • Primary Advantages Of asp.net

    ASP.NET, another revolutionized web development language from the software giant Microsoft, recently has become highly popular among majority of the web developers and software professionals worldwid... [Author: Mark Warne - Web Design and Development - April 07, 2010]

    Read the article

  • Outsourcing Web Development ? Benefits and Risks

    Outsourcing of web development is a trend that has caught up in recent times. Originally people were skeptical in sending work abroad, but now-a-days it is a modern day boon. It can be a huge cost sa... [Author: Dawn Lee - Web Design and Development - April 10, 2010]

    Read the article

< Previous Page | 378 379 380 381 382 383 384 385 386 387 388 389  | Next Page >