Search Results

Search found 10634 results on 426 pages for 'directx 11'.

Page 144/426 | < Previous Page | 140 141 142 143 144 145 146 147 148 149 150 151  | Next Page >

  • Mix metrics for June 20, 2011

    - by tbonnema
    One of the busiest week's ever for Mix this past week, thanks to Suggest-a-Session contest, which just wrapped up at midnight Pacific last night. See for yourself: Registered Mix users (weekly growth) 76,378 (+1.7%) Active users (percent of total) Last 30 days: 4,383 (5.7%) Last 60 days: 5,232 (6.9%) Last 90 days: 6,240 (8.2%) Traffic (30-day) Visits: 17,368 Page views: 148,426 Twitter Followers: 7,116 List mentions: 380 User-generated content (30-day) New ideas: 10 New questions: 11 New comments: 30 New group messages: 34 New direct messages: 1,661 Groups There are currently 1,603 Mix groups (requires login).

    Read the article

  • Multiple cross-site scripting (XSS) vulnerabilities in OpenStack Horizon

    - by Ritwik Ghoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2014-3473 cross-site scripting (XSS) vulnerability 4.3 OpenStack Horizon Solaris 11.2 11.2.1.5.0 CVE-2014-3474 cross-site scripting (XSS) vulnerability 4.3 CVE-2014-3475 cross-site scripting (XSS) vulnerability 4.3 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • openSUSE 11.4 est disponible, une distribution « tout terrain » riche en outils de développement et en EDI open-sources

    openSUSE 11.4 est disponible Avec un ensemble d'EDI open-sources et de technologies de développement Mise à jour du 14/03/11, par Hinault Romaric openSUSE 11.4 est disponible. La distribution Linux s'appuie sur le kernel 2.6.38, propose un démarrage plus rapide du système, améliore la gestion et la reconnaissance des périphériques ainsi que la gestion des logiciels et la configuration du système. L'environnement de bureau intègre par défaut KDE Plasma qui se décline en version Desktop et Netbook (avec de meilleures performances dans la gestion de l'activité et une interface plus ergonomique). open...

    Read the article

  • Graphic Designing in the Corporate Business World

    Every company or business organization wants to craft a positive brand identity of their own in the market and make people brand aware so that desired profits are gained. We all identify our favorite... [Author: Alan Smith - Web Design and Development - June 11, 2010]

    Read the article

  • 3G Market Forecast to 2013

    With the introduction of 3G technology to offer customers better and high quality services, the development of wireless broadband communication system in both developed and developing countries has p... [Author: RNCOS E-Services Pvt. Ltd. - Computers and Internet - June 11, 2010]

    Read the article

  • Webmatrix disponible en version finale dans les heures qui viennent, Microsoft dévoile son nouvel EDI ce soir

    Webmatrix disponible en version finale dans les heures qui viennent Microsoft dévoile son nouvel EDI ce soir Mise à jour du 13/01/11 par Hinault Romarick Microsoft organise ce soir une conférence de presse autour de « WebMatrix », son nouvel environnement de développement web. Après la sortie de trois beta (dont la dernière date de juillet 2010), la version finale devrait donc sortir dans les heures qui viennent. WebMatrix est un outil de développement gratuit, spécialement conçu pour permettre aux développeurs web de créer et gérer des applications Web sur la plate-forme Windows, tout en restant compatible av...

    Read the article

  • Multiple vulnerabilities in OpenSSL

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2110 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 7.5 OpenSSL Solaris 11 Contact Support Solaris 10 SPARC: 147159-05 147707-06 X86: 146672-07 CVE-2012-2131 Numeric Errors vulnerability 7.5 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • GTK+ 3.0 sort en version finale, le Toolkit de création d'interfaces graphiques se modernise et bénéficie d'un grand toilettage

    GTK+ 3.0 sort en version finale Le Toolkit de création d'interfaces graphiques se modernise et bénéficie d'un grand toilettage Mise à jour du 14/02/11 de Idelways La version 3 du Toolkit open source et multiplateforme de création d'interface graphique GTK+ est disponible en version définitive. Cette version du Toolkit (développé au départ pour le logiciel Gimp et utilisé actuellement par l'environnement de bureau Gnome) apporte de nombreuses nouveautés et élimine nombre de problèmes qui se sont accumulés au fil des années pour des raisons de rétro-compatibilité. Désormais, seul l'API graphique de rendu vectoriel 2D « Cairo » est u...

    Read the article

  • LINQ – SequenceEqual() method

    - by nmarun
    I have been looking at LINQ extension methods and have blogged about what I learned from them in my blog space. Next in line is the SequenceEqual() method. Here’s the description about this method: “Determines whether two sequences are equal by comparing the elements by using the default equality comparer for their type.” Let’s play with some code: 1: int[] numbers = { 5, 4, 1, 3, 9, 8, 6, 7, 2, 0 }; 2: // int[] numbersCopy = numbers; 3: int[] numbersCopy = { 5, 4, 1, 3, 9, 8, 6, 7, 2, 0 }; 4:  5: Console.WriteLine(numbers.SequenceEqual(numbersCopy)); This gives an output of ‘True’ – basically compares each of the elements in the two arrays and returns true in this case. The result is same even if you uncomment line 2 and comment line 3 (I didn’t need to say that now did I?). So then what happens for custom types? For this, I created a Product class with the following definition: 1: class Product 2: { 3: public int ProductId { get; set; } 4: public string Name { get; set; } 5: public string Category { get; set; } 6: public DateTime MfgDate { get; set; } 7: public Status Status { get; set; } 8: } 9:  10: public enum Status 11: { 12: Active = 1, 13: InActive = 2, 14: OffShelf = 3, 15: } In my calling code, I’m just adding a few product items: 1: private static List<Product> GetProducts() 2: { 3: return new List<Product> 4: { 5: new Product 6: { 7: ProductId = 1, 8: Name = "Laptop", 9: Category = "Computer", 10: MfgDate = new DateTime(2003, 4, 3), 11: Status = Status.Active, 12: }, 13: new Product 14: { 15: ProductId = 2, 16: Name = "Compact Disc", 17: Category = "Water Sport", 18: MfgDate = new DateTime(2009, 12, 3), 19: Status = Status.InActive, 20: }, 21: new Product 22: { 23: ProductId = 3, 24: Name = "Floppy", 25: Category = "Computer", 26: MfgDate = new DateTime(1993, 3, 7), 27: Status = Status.OffShelf, 28: }, 29: }; 30: } Now for the actual check: 1: List<Product> products1 = GetProducts(); 2: List<Product> products2 = GetProducts(); 3:  4: Console.WriteLine(products1.SequenceEqual(products2)); This one returns ‘False’ and the reason is simple – this one checks for reference equality and the products in the both the lists get different ‘memory addresses’ (sounds like I’m talking in ‘C’). In order to modify this behavior and return a ‘True’ result, we need to modify the Product class as follows: 1: class Product : IEquatable<Product> 2: { 3: public int ProductId { get; set; } 4: public string Name { get; set; } 5: public string Category { get; set; } 6: public DateTime MfgDate { get; set; } 7: public Status Status { get; set; } 8:  9: public override bool Equals(object obj) 10: { 11: return Equals(obj as Product); 12: } 13:  14: public bool Equals(Product other) 15: { 16: //Check whether the compared object is null. 17: if (ReferenceEquals(other, null)) return false; 18:  19: //Check whether the compared object references the same data. 20: if (ReferenceEquals(this, other)) return true; 21:  22: //Check whether the products' properties are equal. 23: return ProductId.Equals(other.ProductId) 24: && Name.Equals(other.Name) 25: && Category.Equals(other.Category) 26: && MfgDate.Equals(other.MfgDate) 27: && Status.Equals(other.Status); 28: } 29:  30: // If Equals() returns true for a pair of objects 31: // then GetHashCode() must return the same value for these objects. 32: // read why in the following articles: 33: // http://geekswithblogs.net/akraus1/archive/2010/02/28/138234.aspx 34: // http://stackoverflow.com/questions/371328/why-is-it-important-to-override-gethashcode-when-equals-method-is-overriden-in-c 35: public override int GetHashCode() 36: { 37: //Get hash code for the ProductId field. 38: int hashProductId = ProductId.GetHashCode(); 39:  40: //Get hash code for the Name field if it is not null. 41: int hashName = Name == null ? 0 : Name.GetHashCode(); 42:  43: //Get hash code for the ProductId field. 44: int hashCategory = Category.GetHashCode(); 45:  46: //Get hash code for the ProductId field. 47: int hashMfgDate = MfgDate.GetHashCode(); 48:  49: //Get hash code for the ProductId field. 50: int hashStatus = Status.GetHashCode(); 51: //Calculate the hash code for the product. 52: return hashProductId ^ hashName ^ hashCategory & hashMfgDate & hashStatus; 53: } 54:  55: public static bool operator ==(Product a, Product b) 56: { 57: // Enable a == b for null references to return the right value 58: if (ReferenceEquals(a, b)) 59: { 60: return true; 61: } 62: // If one is null and the other not. Remember a==null will lead to Stackoverflow! 63: if (ReferenceEquals(a, null)) 64: { 65: return false; 66: } 67: return a.Equals((object)b); 68: } 69:  70: public static bool operator !=(Product a, Product b) 71: { 72: return !(a == b); 73: } 74: } Now THAT kinda looks overwhelming. But lets take one simple step at a time. Ok first thing you’ve noticed is that the class implements IEquatable<Product> interface – the key step towards achieving our goal. This interface provides us with an ‘Equals’ method to perform the test for equality with another Product object, in this case. This method is called in the following situations: when you do a ProductInstance.Equals(AnotherProductInstance) and when you perform actions like Contains<T>, IndexOf() or Remove() on your collection Coming to the Equals method defined line 14 onwards. The two ‘if’ blocks check for null and referential equality using the ReferenceEquals() method defined in the Object class. Line 23 is where I’m doing the actual check on the properties of the Product instances. This is what returns the ‘True’ for us when we run the application. I have also overridden the Object.Equals() method which calls the Equals() method of the interface. One thing to remember is that anytime you override the Equals() method, its’ a good practice to override the GetHashCode() method and overload the ‘==’ and the ‘!=’ operators. For detailed information on this, please read this and this. Since we’ve overloaded the operators as well, we get ‘True’ when we do actions like: 1: Console.WriteLine(products1.Contains(products2[0])); 2: Console.WriteLine(products1[0] == products2[0]); This completes the full circle on the SequenceEqual() method. See the code used in the article here.

    Read the article

  • Java EE 7 : les fonctionnalités Cloud reportées, à cause d'un progrès trop lent de la spécification

    Java EE 7 offrira un support étendu du PaaS La plateforme confirme son virage vers le Cloud Mise à jour du 24/06/11, par Hinault Romaric On sait déjà que le prochain Java EE 7 sera très orienté Cloud. La technologie Java pour les applications d'entreprises, dont les spécifications traitent des sujets comme la persistance, le développement et le déploiement d'applications, sera adaptée pour supporter plusieurs modèles de Cloud. Selon les déclarations d'un employé d'Oracle, le prochain JAVA EE aura des capacités permettant une prise en charge du PaaS ((Platform-as-a-service), défini comme la couche intermédiaire en...

    Read the article

  • Google I/O Sandbox Case Study: MobileASL

    Google I/O Sandbox Case Study: MobileASL We interviewed MobileASL at the Google I/O Sandbox on May 11, 2011 and they explained to us the benefits of developing their accessibility applications on the Android platform. MobileASL is a video compression project that aims to make sign language communication on mobile phones a reality. For more information on Accessibility Developers, visit: google.com For more information on MobileASL, visit: mobileasl.cs.washington.edu From: GoogleDevelopers Views: 14 0 ratings Time: 01:57 More in Science & Technology

    Read the article

  • CVE-2011-3439 Denial of Service (DoS) vulnerability in FreeType

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3439 Denial of Service (DoS) vulnerability 9.3 FreeType Font Engine Solaris 11 Contact Support Solaris 10 SPARC: 119812-14 X86: 119813-16 Solaris 9 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Opera 11.50 disponible en version finale, avec une interface utilisateur encore plus épurée

    Opera 11.50 disponible en version finale Avec une interface utilisateur encore plus épurée Mise à jour du 28/06/11, par Hinault Romaric L'éditeur norvégien Opera Software vient de publier la mouture finale de la version 11.50 de son navigateur (disponible sur toutes les plates-formes). Opera 11.50 intègre une nouvelle interface utilisateur complètement remaniée baptisée « Featherweight » (poids plume), encore plus épurée. On remarquera de nouvelles icones et couleurs, et un affichage des fonctionnalités sur un nombre plus restreint de ligne. Le navigateur propose une nouvelle fonction d'accès rapide « Speed Dial ...

    Read the article

  • CVE-2012-5166 Denial of Service vulnerability in ISC BIND

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-5166 Denial of Service vulnerability 7.8 BIND Solaris 11 Contact Support Solaris 10 SPARC : 119783-25 x86 : 119784-25 Solaris 9 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Apress Deal of the Day - 18/Mar/2010 - Silverlight 4 Business Intelligence Software

    - by TATWORTH
    Today's $10 Deal of the day offer from Apress at http://www.apress.com/info/dailydeal is "Silverlight 4 Business Intelligence Software Business Intelligence (BI) software allows you to view different components of a business using a single visual platform, which makes comprehending mountains of data easier. This book shows BI concepts put into action using Silverlight 4." It was previously on on Feb/11

    Read the article

  • SQL Relay 2013R2

    Come join in the SQL Relay in 2013, attending a user group the week of Nov 11, 2013 in the UK. There are some amazing speakers, so be sure to register and attend. Optimize SQL Server performance“With SQL Monitor, we can be proactive in our optimization process, instead of waiting until a customer reports a problem,” John Trumbul, Sr. Software Engineer. Optimize your servers with a free trial.

    Read the article

  • Transforming your Business with Oracle Consulting

    Stephan Scholl Senior Vice President, North America Consulting talks about the role that the 11,000+ professionals in Oracle Consulting play in helping customers transform their businesses and reap the benefits of the latest releases on their Oracle solutions.

    Read the article

  • 2d array permutation proof [migrated]

    - by FGM
    I want to know if it's possible to get any possible combination of a 4x4 integer array given three rules: you may shift any column up or down you may shift any row left or right you may shift the entire array left, right, up, or down That is, you can transform: [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] into any possible combination of a 4x4 array of the same 16 values, given those three rules. Basically, I just want to know if there are impossible combinations.

    Read the article

  • Today is my last day at Oracle

    - by user12798506
    ?????????? ???????????11????????Oracle????????????????? Sun+Oracle????2?????2002??Sun?????????10?????????????Java EE????????????????????????????????????????????????????????????????????????????????????? ??????????????? ??????????Sun???2006????????????????????????????????????????????????????????????????????????????????????????????????????????????????????? ????Oracle??????????Java?IT??????????????????????????????? ???????????????????????????? p.s. ????????????????????????????????????????????????????????????????????? ????subscribe????????????????????????????????????????????????

    Read the article

  • Saving project (build) settings in Eclipse CDT [migrated]

    - by Mike Valeriano
    Is there an option somewhere in CDT (Juno) where I can set customized "Release" configurations for my projects? All I want to do for now is to be able to create a new C++ project and have by default the -std=c++11 and -std=gnu11options for the compilers and -s for the linker, and maybe a few other optimization flags. It's not a big hassle to do it every time for every new program, but I was just wondering, since I've been creating a lot of small programs to get to know C++ better.

    Read the article

  • Multiple Denial of Service (DoS) vulnerabilities in libxml2

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3905 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 5.0 libxml2 Solaris 11 Contact Support Solaris 10 SPARC: 125731-07 X86: 125732-07 Solaris 9 Contact Support CVE-2011-3919 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 7.5 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Multiple Denial of Service (DoS) vulnerabilities in libxml2

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-2821 Resource Management Errors vulnerability 7.5 libxml2 Solaris 11 Contact Support Solaris 10 SPARC: 125731-07 X86: 125732-07 Solaris 9 Contact Support CVE-2011-2834 Resource Management Errors vulnerability 6.8 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • IT Departments Can Be Profit Centers

    Information technology in law firms can be strategic. IT departments can help law firms generate significant profitability. Now, laws firms are working around the clock ? largely due to advances in t... [Author: Jay Bahel - Computers and Internet - June 11, 2010]

    Read the article

< Previous Page | 140 141 142 143 144 145 146 147 148 149 150 151  | Next Page >