Search Results

Search found 2210 results on 89 pages for 'techniques'.

Page 26/89 | < Previous Page | 22 23 24 25 26 27 28 29 30 31 32 33  | Next Page >

  • Interview Questions [closed]

    - by Pemdas
    Possible Duplicate: What techniques do you use when interviewing developers? Nearly every SE interviewing process has some sort of coding exercise to prove that the interviewee can actually write code. More often then not, the exercise also hopes to demonstrate that the interviewee can solve problems. However, this is often not sufficient enough to determine if the interviewee can actually design software. What are some effective ways to determine if an interviewee understands the basic concepts of design such as abstraction, interface design, thread management, ...ect?

    Read the article

  • How to estimate effort required to convert a large codebase to another language/platform

    - by Justin Branch
    We have an MFC C++ program with around 200,000 lines of code in it. It's pretty much finished. We'd like to hire someone to convert it to work for Macs, but we are not sure how to properly estimate a reasonable timeline for this project. What techniques can we use to estimate what it would take to convert this project to work on a Mac? Also, is there anything in particular we should be watching out for specific to this sort of conversion?

    Read the article

  • Stairway to SQLCLR Level 3: Security (General and SAFE Assemblies)

    In the third level of our Stairway to SQLCLR, we look at the various mechanisms in place to help us control Security. In this Level we will focus on SAFE mode and see how secure SQLCLR is by default. Free eBook - Performance Tuning with DMVsThis free eBook provides you with the core techniques and scripts to monitor your query execution, index usage, session and transaction activity, disk IO, and more. Download the free eBook.

    Read the article

  • SFR : un problème perturbe l'accès aux sites sécurisés depuis 48h, l'accès à iTunes très affecté pour certains possesseurs de Neufbox

    SFR : un problème perturbe l'accès aux sites sécurisés depuis 48h L'accès à iTunes très affecté pour certains possesseurs de Neufbox Depuis deux jours maintenant, un « bug » de SFR perturbe fortement l'accès à plusieurs services, dont iTunes. En cause, un « dysfonctionnement qui touche l'accès aux divers sites sécurisés », explique le FAI. L'erreur est humaine et les incidents techniques arrivent. Certes. Mais la manière de gérer la situation semble créer quelques tensions.

    Read the article

  • how a custom BizTalk pipeline component can be used to split an incoming message into smaller indivi

    Use a custom pipeline component to split an incoming message into smaller individual messages for further processing. Sample shows how to use simple but powerful techniques that can be built upon and developed for use in a production environment  read moreBy BiZTech KnowDid you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • What is the difference between "data hiding" and "encapsulation"?

    - by Software Engeneering Learner
    I'm reading "Java concurrency in practice" and there is said: "Fortunately, the same object-oriented techniques that help you write well-organized, maintainable classes - such as encapsulation and data hiding -can also help you create thread-safe classes." The problem #1 - I never heard about data hiding and don't know what it is. The problem #2 - I always thought that encapsulation is using private vs public, and is actually the data hiding. Can you please explain what data hiding is and how it differs from encapsulation?

    Read the article

  • Are there any formal approaches for familiarising oneself with a new or legacy codebase? [closed]

    - by codecowboy
    Possible Duplicate: How do you dive into large code bases? As a contractor, I often encounter legacy codebases which might have little or no supporting documentation. Are there any techniques or best practices? I work with PHP and web applications, though also face situations in which I have to edit code in an unfamiliar language. How can I leave a codebase in better shape, learn something along the way and impress the team I'm working with?

    Read the article

  • Microsoft met fin à l'abonnement TechNet, le programme tué par la piraterie et les abus des abonnés ?

    Microsoft annonce la fin de l'abonnement TechNet le programme tué par la piraterie et les abus des abonnés ?Dans un billet publié sur TechNet, Microsoft a annoncé la fin de l'abonnement Technet pour les professionnels de l'IT.Lancé en 1998, le programme TechNet permet aux professionnels de l'informatique à se préparer aux problèmes critiques et à planifier les déploiements en leur offrant un accès rapide et pratique aux derniers logiciels à des fins d'évaluation, ainsi qu'aux versions bêta, aux appels passés au Support technique professionnel, à des informations techniques et à des outils dans le but de faciliter leur travail.À partir du 31 août, Microsoft ne prendra plus en compte les nouveaux ...

    Read the article

  • Les Microsoft Days 2010 présentent dans toute la France les nouveautés technologiques, du 1er Avril

    Microsoft Days 2010 : Rencontres Techniques, Rencontrez des experts pour enrichir vos connaissances Du 1er Avril au 15 Juin, les partenaires Microsoft viennent à la rencontre des développeurs et professionnels de l'informatique en organisant des événements en région, sponsorisés par les Microsoft Days. Au programme de ces journées : - tour d'horizon des derniers lancements comme Office 2010, SQL Server 2008 R2, Visual Studio 2010, SharePoint 2010, Windows Azure, etc. - démonstrations live pour vous permettre de découvrir et d'explorer les dernières innovations, résolument tournées vers l'utilisateur. D'autres thématiques seront abordées selon les étapes, parmi lesquelles Windows Server...

    Read the article

  • Accenture recrute pour ses métiers de l'informatique à Paris, Nantes et Toulouse

    Accenture recrute pour ses métiers de l'informatique A Paris, Nantes et Toulouse Que vous soyez stagiaire, jeune diplômé ou expert, Accenture recrute des développeurs, des ingénieurs d'études et des chefs de projets pour sa filiale Accenture Technology Solutions. Les profils recherchés, fonctionnels ou techniques, concernent particulièrement les expertises SAP, Java/J2EE, Test, Oracle, BI Business Intelligence et AMOA. Citation: Rejoignez un groupe int...

    Read the article

  • Are these non-standard applications of rendering practical in games?

    - by maul
    I've recently got into 3D and I came up with a few different "tricky" rendering techniques. Unfortunately I don't have the time to work on this myself, but I'd like to know if these are known methods and if they can be used in practice. Hybrid rendering Now I know that ray-tracing is still not fast enough for real-time rendering, at least on home computers. I also know that hybrid rendering (a combination of rasterization and ray-tracing) is a well known theory. However I had the following idea: one could separate a scene into "important" and "not important" objects. First you render the "not important" objects using traditional rasterization. In this pass you also render the "important" objects using a special shader that simply marks these parts on the image using a special color, or some stencil/depth buffer trickery. Then in the second pass you read back the results of the first pass and start ray tracing, but only from the pixels that were marked by the "important" object's shader. This would allow you to only ray-trace exactly what you need to. Could this be fast enough for real-time effects? Rendered physics I'm specifically talking about bullet physics - intersection of a very small object (point/bullet) that travels across a straight line with other, relatively slow-moving, fairly constant objects. More specifically: hit detection. My idea is that you could render the scene from the point of view of the gun (or the bullet). Every object in the scene would draw a different color. You only need to render a 1x1 pixel window - the center of the screen (again, from the gun's point of view). Then you simply check that central pixel and the color tells you what you hit. This is pixel-perfect hit detection based on the graphical representation of objects, which is not common in games. Afaik traditional OpenGL "picking" is a similar method. This could be extended in a few ways: For larger (non-bullet) objects you render a larger portion of the screen. If you put a special-colored plane in the middle of the scene (exactly where the bullet will be after the current frame) you get a method that works as the traditional slow-moving iterative physics test as well. You could simulate objects that the bullet can pass through (with decreased velocity) using alpha blending or some similar trick. So are these techniques in use anywhere, and/or are they practical at all?

    Read the article

  • Google Maps Developers Live: Mapping with Style

    Google Maps Developers Live: Mapping with Style Compelling and informative map visualizations require simple, yet useful, maps... and some beautiful data. For this episode of Google Maps Developers Live, Paul Saxman discusses how he designed a few of his favorite map styles, and shares a few of his tools and techniques for designing maps for visualizations. From: GoogleDevelopers Views: 0 0 ratings Time: 30:00 More in Education

    Read the article

  • Features of Professional SEO Services

    The importance of Search Engine Optimization has given way to professional SEO services. The way they conduct optimization techniques to improve the websites' rankings are exemplary. Most of the companies that are involved into SEO services relate themselves as an effective alternative to improve the rankings in a professional manner. The current situation is that every reputed company are seeking SEO services in order to enhance their rankings on a further note.

    Read the article

  • Three Easy Steps to SEO

    As with all marketing endeavors, Search Engine Optimization (SEO) techniques should be targeted, incremental and measurable. This is truly an act of continuous quality improvement. Here are three essential elements to learn about, practice and refine: Target Your Audience Know who they are, what they need and where they come from.

    Read the article

  • Important SEO Mistakes

    Nowadays, you can see many Companies providing SEO services. Some SEO guys use purely ethical SEO techniques, while others use unethical SEO. Even the person who hired the SEO guy do not know about this. When his site gets punished that time he came to know. So the conclusion is, if you want to hire SEO, choose a reputable SEO consultant, one who will keep in regular contact with progress reports and updates

    Read the article

  • What are some good examples of Powernap scripts and its use?

    - by shootingstars
    I would like to use powernap for putting my media server into suspend mode, and I haven't been able to find any example /etc/powernap/action scripts out there, except these: one two three Does anybody have a good script or recommend particular techniques with its use? From the comments of the default /etc/powernap/action script: # You may do one of: # 1) Write your own custom script below and make this file executable, # calling some specific action, such as: # /usr/sbin/pm-suspend # /usr/sbin/pm-hibernate # /sbin/poweroff # echo 'I am wasting electricity' | mail [email protected] # 2) Replace this file with an executable script or binary # 3) Symlink this file to some other executable script or binary

    Read the article

  • How are undocumented functions discovered?

    - by Paska
    Hi all, I've always wondered how do you find undocumented / private API ? Example the Apple undocumented / private API, Play Station, Windows Phone 7, Win32 Kernel, Windows API, hidden callback, etc... What tools do hackers use to find out about private and undocumented functions? Where can I read about peoples' experiences delving into private APIs and reverse engineering techniques which reveal the secrets which are normally explained in API documentation? thanks, A

    Read the article

  • Title Tag Optimization For SEO - (Search Engine Optimization)

    In this article we have discussed the importance of the title tag in search engine optimization and further we have discussed important techniques for the title tag optimization that can get good results for search engine optimization. Title tag optimization can play a dramatic role in increasing the ranking of a web page in search engine results pages.

    Read the article

  • Myths About SEO

    Search Engine Optimization(SEO) comes into existence since few years back & also some myths have been developed around this concept. Some of these are nothing but the outdated techniques & some are misunderstanding that occurs because web is such a new medium for a large number of people.

    Read the article

  • Is There A Need For End-To-End ExtJS to Microsoft Server (MVC-C#, LOB) 4 Day Class? (Poll Enclosed)

    Over the past couple years, the focus of the web development Ive been doing involves building highly flexible, highly scalable and straight forward web sites to implement and maintain Line of... This site is a resource for asp.net web programming. It has examples by Peter Kellner of techniques for high performance programming...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Random enemy placement on a 2d grid

    - by Robb
    I want to place my items and enemies randomly (or as randomly as possible). At the moment I use XNA's Random class to generate a number between 800 for X and 600 for Y. It feels like enemies spawn more towards the top of the map than in the middle or bottom. I do not seed the generator, maybe that is something to consider. Are there other techniques described that can improve random enemy placement on a 2d grid?

    Read the article

< Previous Page | 22 23 24 25 26 27 28 29 30 31 32 33  | Next Page >