Search Results

Search found 355 results on 15 pages for 'analyse'.

Page 4/15 | < Previous Page | 1 2 3 4 5 6 7 8 9 10 11 12  | Next Page >

  • La force du mot de passe serait corrélée au genre d'un individu, d'après une étude, les informaticiens choisiraient des mots de passe forts

    La force du mot de passe serait corrélée au genre d'un individu d'après une récente étudeLe mot de passe est un des éléments essentiels de la sécurité des systèmes d'information. Il constitue très souvent le premier obstacle que doit franchir un hacker pour avoir accès aux informations personnelles d'un utilisateur lambda.Une récente étude vient d'être menée sur quasiment l'ensemble de la population de l'université américaine de Carnegie Mellon. Elle a porté sur l'analyse des mots de passe de 25000...

    Read the article

  • Android vend deux fois plus qu'iOS, mais ses développeurs gagneraient quatre fois moins d'après une estimation de Flurry

    Android vend deux fois plus qu'iOS, mais ses développeurs gagneraient quatre fois moins D'après Flurry A quelques jours du Google I/O et en plein WWDC d'Apple, l'étude est polémique et se doit d'être prise avec des pincettes. D'après Flurry, un cabinet d'analyse éditeur de solutions de marketing mobile, iOS bénéficierait d'une communauté de développeurs beaucoup plus fidèle et plus motivée que celle d'Android. En comparant les deux OS, l'étude affirme que sur 10 applications développées, 7 le sont pour les appareils d'Apple contre seulement 3 pour Android. [IMG]http://ftp-developpez.com/gordon-fowler/Etudes...

    Read the article

  • Quantcast Media Planner

    Have you ever wondered what type and how many people are visiting your website? If you answered "yes" to the previous question, you will be pleased to know that there are online tools available that allow people to analyse the relevance and effectiveness of their web pages.

    Read the article

  • L'utilisation d'OpenOffice et LibreOffice en entreprise chute, Microsoft Office domine largement, selon un rapport de Forrester

    L'utilisation d'OpenOffice et LibreOffice en entreprise chute Microsoft Office domine largement, selon un rapport de ForresterLes suites bureautiques et de productivité Open Source Open Office et Libre Office font pâle figure devant Microsoft Office, selon un récent rapport publié par le cabinet d'analyse Forrester.L'étude de Forrester montre qu'Office 2010, la version d'Office qui a connu le plus fort taux d'adoption, domine largement dans les entreprises avec une part de marché de 85 %. Office...

    Read the article

  • Apple seconde marque la plus chère au monde devant IBM, Google passe devant Microsoft, quatre entreprises IT dans le top 5

    Apple seconde marque la plus chère au monde devant IBM Google passe devant Microsoft, quatre entreprises IT dans le top 5 L'institut Interbrand vient de publier son classement mondial des 100 premières marques pour l'année 2012. Contrairement à la liste du cabinet Millward Brown (pour qui Apple est la marque la plus chère) ou encore celle de General Sentiment (qui attribue la palme d'or à Google), la marque la plus puissante du monde ne serait pas une entreprise IT pour Interbrand. Le cabinet d'analyse identifie Coca-Cola comme la marque ay...

    Read the article

  • SEO and Product Life Cycle

    Search Engine Optimization or SEO is one of the most important online marketing activities in order to popularize a product on the Internet and generate sales. However if you analyse a lot of success stories you'll realize that it is the right time in the PLC or product life cycle when you need to capitalize on.

    Read the article

  • C++ est-il devenu un langage de script ? Un développeur estime que la norme C++ 11 a transformé le langage de programmation

    C++ est-il devenu un langage de script ? Un développeur estime que la norme C++ 11 a transformé le langage de programmation « C++ est devenu un langage de script », titre un développeur du nom de Jussi Pakkanen, dans un billet de blog.Sous ce titre, qui pourrait provoquer le courroux de certains utilisateurs du langage, Jussi Pakkanen apporte une analyse objective, qui n'est pas dénuée de tout sens. « Avec la sortie de C++ 11, quelque chose d'extraordinaire s'est produit. L'accent mis sur les...

    Read the article

  • VMware et Salesforce annoncent VMForce, un Cloud d'entreprise pour les développeurs Java

    Salesforce.com et VMware nouent une alliance stratégique et lancent VMforce, le premier « cloud Java d'entreprise » VMforce ouvre les ressources du cloud à plus de 6 millions de développeurs Java d'entreprise ? dont 2 millions appartenant également à la communauté Spring Avec VMforce, les développeurs Java bénéficient immédiatement des services avancés de la plate-forme Force.com : base de données, gestion de workflows, outils d'analyse et de recherche, profils Chatter, fils d'information VMforce bénéficie également de la technologie vCloud pour radicalement simplifier l'administration et l'orchestration des applications dans les infrastructures VMware vSphere

    Read the article

  • Des attaquants pourraient savoir quels sites vous avez visité sur IE, Chrome et Firefox d'après les recherches d'un ingénieur Belge

    Des attaquants pourraient savoir quels sites vous avez visité sur IE, Chrome et Firefox d'après les recherches d'un ingénieur Belge En 2010 des chercheurs de l'université de Californie du Sud ont mené une analyse sur plus de 40 sites qui espionnaient les habitudes de navigation des utilisateurs. Parmi eux figuraient YouPorn.com qui se targue d'être le YouTube de son domaine et utilisait du code JavaScript pour savoir si les visiteurs avaient visité récemment des sites concurrents. En combinant...

    Read the article

  • IDC revoit à la baisse ses prévisions sur les ventes de tablettes sur l'année 2014, le cabinet en explique les raisons

    IDC revoit à la baisse ses prévisions sur les ventes de tablettes sur l'année 2014, le cabinet en explique les raisons Le cabinet d'analyse IDC a revu à la baisse ses prévisions sur le marché des tablettes ; au départ il était question de 260,9 millions d'unités vendues, désormais IDC table sur 254,4 millions. Ce qui représenterait en termes de volume une croissance annuelle de 12,1%, bien loin des 51,8% de croissance annuelle observée en 2013.Selon IDC, deux raisons principales expliqueraient...

    Read the article

  • Un quart de milliard de smartphones vendus au troisième trimestre, Android et iOS peinent à gagner des parts pendant que Windows Phone progresse

    Un quart de milliard de smartphones vendus au troisième trimestre, Android et iOS peinent à gagner des parts pendant que Windows Phone progresse Les rapports de vente de smartphones au troisième trimestre de l'année en cours se multiplient. Cette fois-ci, c'est l'entreprise indépendante d'analyse Canalys qui révèle à son tour une augmentation annuelle de 44% du marché. Cette proportion représente un quart de milliards de dispositifs écoulés en un trimestre sur la planète. Sans surprise,...

    Read the article

  • Is there a utility to visualise / isolate and watch application calls

    - by MyStream
    Note: I'm not sure what to search for so guidance on that may be just as valuable as an answer. I'm looking for a way to visually compare activity of two applications (in this case a webserver with php communicating with the system or mysql or network devices, etc) such that I can compare the performance at a glance. I know there are tools to generate data dumps from benchmarks for apache and some available for php for tracing that you can dump and analyse but what I'm looking for is something that can report performance metrics visually from data on calls (what called what, how long did it take, how much memory did it consume, how can that be represented visually in a call stack) and present it graphically as if it were a topology or layered visual with different elements of system calls occupying different layers. A typical visual may consist of (e.g. using swim diagrams as just one analogy): Network (details here relevant to network diagnostics) | ^ back out v | Linux (details here related to firewall/routing diagnostics) ^ back to network | | V ^ back to system Apache (details here related to web request) | | ^ response to V | apache PHP (etc) PHP---------->other accesses to php files/resources----- | ^ v | MySQL (total time) MySQL | ^ V | Each call listed + time + tables hit/record returned My aim would be to be able to 'inspect' a request/range of requests over a period of time to see what constituted the activity at that point in time and trace it from beginning to end as a diagnostic tool. Is there any such work in this direction? I realise it would be intensive on the server, but the intention is to benchmark and analyse processes against each other for both educational and professional reasons and a visual aid is a great eye-opener compared to raw statistics or dozens of discrete activity vs time graphs. It's hard to show the full cycle. Any pointers welcome. Thanks! FROM COMMENTS: > XHProf in conjunction with other programs such as Perconna toolkit > (percona.com/doc/percona-toolkit/2.0/pt-pmp.html) for mySQL run apache > with httpd -X & (Single threaded debug mode and background) then > attach with strace -> kcache grind

    Read the article

  • Part 6: Extensions vs. Modifications

    - by volker.eckardt(at)oracle.com
    Customizations = Extensions + Modifications In the EBS terminology, a customization can be an extension or a modification. Extension means that you mainly create your own code from scratch. You may utilize existing views, packages and java classes, but your code is unique. Modifications are quite different, because here you take existing code and change or enhance certain areas to achieve a slightly different behavior. Important is that it doesn't matter if you place your code at the same or at another place – it is a modification. It is also not relevant if you leave the original code enabled or not! Why? Here is the answer: In case the original code piece you have taken as your base will get patched, you need to copy the source again and apply all your changes once more. If you don't do that, you may get different results or write different data compared to the standard – this causes a high risk! Here are some guidelines how to reduce the risk: Invest a bit longer when searching for objects to select data from. Rather choose a view than a table. In case Oracle development changes the underlying tables, the view will be more stable and is therefore a better choice. Choose rather public APIs over internal APIs. Same background as before: although internal structure might change, the public API is more stable. Use personalization and substitution rather than modification. Spend more time to check if the requirement can be covered with such techniques. Build a project code library, avoid that colleagues creating similar functionality multiple times. Otherwise you have to review lots of similar code to determine the need for correction. Use the technique of “flagged files”. Flagged files is a way to mark a standard deployment file. If you run the patch analyse (within Application Manager), the analyse result will list flagged standard files in case they will be patched. If you maintain a cross reference to your own CEMLIs, you can easily determine which CEMLIs have to be reviewed. Implement a code review process. This can be done by utilizing team internal or external persons. If you implement such a team internal process, your team members will come up with suggestions how to improve the code quality by themselves. Review heavy customizations regularly, to identify options to reduce complexity; let's say perform this every 6th month. You may not spend days for such a review, but a high level cross check if the customization can be reduced is suggested. De-install customizations which are no more required. Define a process for this. Add a section into the technical documentation how to uninstall and what are possible implications. Maintain a cross reference between CEMLIs and between CEMLIs, EBS modules and business processes. Keep this list up to date! Share this list! By following these guidelines, you are able to improve product stability. Although we might not be able to avoid modifications completely, we can give a much better advise to developers and to our test team. Summary: Extensions and Modifications have to be handled differently during their lifecycle. Modifications implicate a much higher risk and should therefore be reviewed more frequently. Good cross references allow you to give clear advise for the testing activities.

    Read the article

  • Help me avoid a resonance cascade.

    - by SLC
    Hi, my name is Dr. Kleiner, and I'm a senior scientist working at the Black Mesa Research Facility. I've just finished compiling my code to analyse a large unknown sample we've come across. Unfortunately, there were 19 build errors and 42 warnings, but I've been told the experiment must go ahead. Time is critical, we've already got one of our newest employees who is suiting up as I type this to complete the experiment. I really need some help. Can you think of anything last minute to stop a potential resonance cascade? Someone has hidden my glasses again... Anyway, I hope I never see a resonance cascade, and definitely don't want to create one. It's my lunch break in 5 minutes, and my casserole is already in the microwave ready. Please, give me some advice. If it helps I wrote all of the code to analyse the sample and activate the sampler machine in BASIC. Edit: Oh god! They're everywhere! Send assista

    Read the article

  • RoboCopy Log File Analysis

    - by BobJim
    Is it possible to analyse the log text file outputted from RoboCopy and extract the lines which are defined as "New Dir" and "Extra Dir"? I would like the line from the log contain all the details returned regarding this "New Dir" or "Extra Dir" The reason for completing this task is to understand how two folder structures have change over time. One version has been kept internally at the parent company, the second has been used by a consultancy. For your information I am using Windows 7.

    Read the article

  • FAT filesystem analysis tool

    - by Andy
    I have a dump a FAT file system. Is there a windows tool I can use to analyse it, including: Provide basic information (sector size etc.) Validate the file system, basic corruption checking Allow the files and directory structure to be viewed and possibly edited (i.e mounting as a windows partition) Thanks, Andy

    Read the article

  • Software to capture the packets in an MPEG Transport Stream

    - by Crippledsmurf
    I have a DVB-T capture card and would like to capture the packets from the MPEG stream it receives so i can analyse them just for a bit of fun and learning I've googled and found a lot of converters and software to capture the video from these streams but very little in the area of capturing raw data from a stream. What software exists that can capture and dump the MPEG stream from a tuner?

    Read the article

  • Excel Free Text Survey Question Analysis

    - by joec
    I have to analyse a survey. The survey consists of some yes/no questions, some numeric questions and some questions like the following (free text where respondents have entered multiple answers). Do you have any social networking accounts (Facebook, Twitter, Myspace etc) Y N If yes, which ones _____________________________ Respondents answer: Facebook and Twitter How do I put these types of answer into Excel to gain some sort of useful analysis? Thanks. PS. I know Excel is not great for surveys, but can't spend $1000 on SPSS or similar.

    Read the article

  • How to make a sample file with Handbrake

    - by MaxMackie
    I want to test a couple things with my encode before I encode the whole file. Is there a way for me to make a sample file (30 seconds long or something like that) that I can analyse using different applications (not just the built in sample preview). By the way, I'm using the OSX Handbrake. Alternatively, the question can be stated as: "Where does handbrake store the short sample video files after creating them?"

    Read the article

  • Are these tools a gimmick?

    - by dotnetdev
    Hi, Are tools which analyse which enable you to use all your CPU cores (eg: GBP.htm"http://www2.ashampoo.com/webcache/html/1/product_2_0061_GBP.htm) and also tools which help you to regain memory (can't think of any just yet but seen plenty) a gimmick? Do these tools really work? Thanks

    Read the article

  • Layer 3 Protocol only in wireshark

    - by javardo
    I have a simple question: is there any way in wireshark to avoid resolution of protocol besides the protocol of layer 3 ? For example, in the column protocol, instead of showing http, I want it to show TCP or it's value (6). I can see in menu analyse / enabled protocols we can disable one by one, but for very big traces with lots of differente protocols like "eDonkey" "QUAKE" etc, it's costs a lot of time...

    Read the article

  • Problem with executing dssp (secondary structure assignment)

    - by Mana
    I followed a previous post to install dssp on ubuntu How to install dssp (secondary structure assignments) under 12.04? After the installation I tried to execute dssp which was in /usr/local/bin/dssp But it gave me the following error bash: /usr/local/bin/dssp: cannot execute binary file Also I tried to analyse some trajectory files from a simulation using the code do_dssp -s md.tpr -f traj.xtc But it also failed giving me the error below Reading file md.tpr, VERSION 4.5.5 (single precision) Reading file md.tpr, VERSION 4.5.5 (single precision) Segmentation fault (core dumped) Please post me a solution for this problem. Thank you!

    Read the article

< Previous Page | 1 2 3 4 5 6 7 8 9 10 11 12  | Next Page >