Search Results

Search found 25790 results on 1032 pages for 'information theory'.

Page 262/1032 | < Previous Page | 258 259 260 261 262 263 264 265 266 267 268 269  | Next Page >

  • Eager to Learn more about MySQL?(Week 40)

    - by rituchhibber
    Are you a SQL programmer eager to know more?Oracle University is pleased to announce the availability of a new course in Training on Demand format : MySQL Performance Tuning.Why wait to get the training you need? Learn Oracle from Oracle today. Check out the demo to see how it works.Take a look at the new Training on Demand  MySQL Certification Packages.Please note: your OPN discount is applied to the standard price shown on the website.For more information, assistance and bookings contact your local Oracle University Service Desk.

    Read the article

  • La croissance du marché de l'open source devrait-elle alarmer les éditeurs de logiciels propriétaires ? En France le marché pèse 2,5 milliards d'Euro

    La montée en popularité de l'open source devrait-elle alarmer les éditeurs de logiciels propriétaires ? En France le marché pèse 2,5 milliards Depuis quelque temps déjà l'open source fait couler beaucoup d'encre dans l'actualité technologique. En France par exemple l'open source a déjà investi tous les grands domaines du système d'information des administrations : environnements serveurs, domaines applicatifs, outils d'ingénierie, solutions de réseaux et sécurité. Des services publiques comme...

    Read the article

  • In Order to Be Recognized Professionally a SEO Certification is Required

    One can now obtain a host of information as well as education on SEO which includes certification assessments worldwide. SEO certification is the first certification developed by professionals for those wanting to study SEO professionally. Certification ensures that an individual has met all the requirements and standards needed to be recognized by the public sector.

    Read the article

  • Multiple vulnerabilities in Pidgin

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2214 Resource Management Errors vulnerability 3.5 Pidgin Solaris 10 SPARC : 147992-04 , x86 : 147993-04 Solaris 11 11/11 SRU 10.5 CVE-2012-2318 Improper Input Validation vulnerability 5.0 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Webcast - Building Agile BI or Discovery Applications with Oracle Endeca

    - by Grant Schofield
    On 18th of April we are hosting a live webcast where we will be demonstrating the step by step process of how to create an Agile BI application with Oracle Endeca Information Discovery. Many partners understand the positioning and the message, but are curious to understand what the tool looks like, and what it is like to work with it. Please join myself and Wim Villano by registering at the following link.  Register for webcast here:

    Read the article

  • Oracle University (Week 13)

    - by swalker
    Get ready for Fusion Applications Implementations Oracle University has scheduled the first implementation courses. To view see: Italy France The Netherlands: UK If you can’t travel to these countries, why don’t you try a Live Virtual Class? All courses can be booked via the websites. For more information, assistance in booking and scheduling requests contact your local Oracle University Service Desk. Manténgase conectado a Oracle University: LinkedIn OracleMix Twitter Facebook Google+

    Read the article

  • Protobuf design patterns

    - by Monster Truck
    I am evaluating Google Protocol Buffers for a Java based service (but am expecting language agnostic patterns). I have two questions: The first is a broad general question: What patterns are we seeing people use? Said patterns being related to class organization (e.g., messages per .proto file, packaging, and distribution) and message definition (e.g., repeated fields vs. repeated encapsulated fields*) etc. There is very little information of this sort on the Google Protobuf Help pages and public blogs while there is a ton of information for established protocols such as XML. I also have specific questions over the following two different patterns: Represent messages in .proto files, package them as a separate jar, and ship it to target consumers of the service --which is basically the default approach I guess. Do the same but also include hand crafted wrappers (not sub-classes!) around each message that implement a contract supporting at least these two methods (T is the wrapper class, V is the message class (using generics but simplified syntax for brevity): public V toProtobufMessage() { V.Builder builder = V.newBuilder(); for (Item item : getItemList()) { builder.addItem(item); } return builder.setAmountPayable(getAmountPayable()). setShippingAddress(getShippingAddress()). build(); } public static T fromProtobufMessage(V message_) { return new T(message_.getShippingAddress(), message_.getItemList(), message_.getAmountPayable()); } One advantage I see with (2) is that I can hide away the complexities introduced by V.newBuilder().addField().build() and add some meaningful methods such as isOpenForTrade() or isAddressInFreeDeliveryZone() etc. in my wrappers. The second advantage I see with (2) is that my clients deal with immutable objects (something I can enforce in the wrapper class). One disadvantage I see with (2) is that I duplicate code and have to sync up my wrapper classes with .proto files. Does anyone have better techniques or further critiques on any of the two approaches? *By encapsulating a repeated field I mean messages such as this one: message ItemList { repeated item = 1; } message CustomerInvoice { required ShippingAddress address = 1; required ItemList = 2; required double amountPayable = 3; } instead of messages such as this one: message CustomerInvoice { required ShippingAddress address = 1; repeated Item item = 2; required double amountPayable = 3; } I like the latter but am happy to hear arguments against it.

    Read the article

  • Righting Your Own SEO

    It is usual for any company or business to have an online presence, along with offices and a shop front. In a world where people increasingly browse the Internet first for information, it becomes crucial to maintain and promote that online presence, because it really could make or break the traffic whether to a website or the office door.

    Read the article

  • CVE-2012-3236 Buffer overflow vulnerability in Gimp

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-3236 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 4.3 Gimp Solaris 10 Contact Support Solaris 11 11/11 SRU 11.4 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Using Site Explorer to Improve Yahoo Search Results

    It is the information generated within Yahoo Site Explorer, and the interpretation of that valuable data, that provides the necessary direction; to improve your Yahoo search results. As with any tool, Site Explorer must be used properly and effectively; to be beneficial.

    Read the article

  • VMware présente vCenter Operations pour rationaliser la gestion des infrastructures virtuelles intelligentes

    VMware présente vCenter Operations Pour rationaliser la gestion des infrastructures virtuelles intelligentes Après VMware View 4.6, VMware, annonce une nouvelle solution pour simplifier et automatiser la gestion des services IT dans les environnements virtuels et dynamiques de cloud computing. VMware vCenter perations est destiné à optimiser l'exploitation opérationnelle des systèmes d'information des entreprises de manière à bénéficier de l'agilité et des économies financières inhérentes au cloud computing « Le cloud computing repose sur une approche fondamentalement nouvelle de l'informatique caractérisée par la mise en commun des différents types de ressources, par une gestion extr...

    Read the article

  • Why it is Important to Hire an SEO Company For Your Internet Business

    The World Wide Web is not only limited to sharing information; in fact, the Internet is now being used by profit-based organizations or businesses to help increase their potential for success and productivity. Though it is true that the Web offers plenty of untapped market for your business to delve into, you have to keep in mind that competition are also in abundance that will pull you down.

    Read the article

  • CVE-2011-3439 Denial of Service (DoS) vulnerability in FreeType

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3439 Denial of Service (DoS) vulnerability 9.3 FreeType Font Engine Solaris 11 Contact Support Solaris 10 SPARC: 119812-14 X86: 119813-16 Solaris 9 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Apple ne payera aucun impôt au Royaume-Uni sur 2012, en France les géants de l'IT ne payeraient que 1 % de l'impôt dont ils devraient s'acquitter

    Apple ne payera pas d'impôt au Royaume-Uni sur 2012 En France les géants de l'IT payent 1 % de ce qu'ils devraient d'après le Conseil National du NumériqueDans la continuité des débats sur l'optimisation fiscale (ou « évasion » selon les points de vue), une information risque de faire grincer quelques dents supplémentaires un peu partout en Europe. Apple n'a payé aucun impôt sur les sociétés cette année (exercice 2012) au Royaume-Uni.Comme d'habitude, les mécanismes de transfert de bénéfices via des jeux de filiales basées dans des paradis fiscaux et de facturation de droits d'exploitation de propriétés intellectuelles sont montrés du doigt...

    Read the article

  • SEO - On-Page Elements You Can Instantly Change to Get a Top Ranking in Google

    Your website can rank higher by simply knowing what elements Google and other search engines look at when indexing your page. When you are aware of these elements, you can make minor modifications to your website to produce a better ranking. This is information that your SEO expert does not want you to know. SEO experts charge thousands of dollars to apply this to your website.

    Read the article

  • Build Website with Flash Templates

    Flash website design is one step further in website designing. The way websites looked have undergone drastic change, apart from information source they have become more interactive in nature. Insert... [Author: Alan Smith - Web Design and Development - June 03, 2010]

    Read the article

  • CVE-2012-5166 Denial of Service vulnerability in ISC BIND

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-5166 Denial of Service vulnerability 7.8 BIND Solaris 11 Contact Support Solaris 10 SPARC : 119783-25 x86 : 119784-25 Solaris 9 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Application Integration Architecture – Bringing It All Together - Part 2

    Oracle's Application Integration Architecture (AIA) provides Oracle customers,prospects and partners with the capability to more easily integrate and orchestrate information and transactions across multiple systems. Learn more about Oracle AIA and get an update on new and planned integrations from Jose Lazares,Vice President, Oracle Applications Development.

    Read the article

  • Purpose of building file using Make

    - by foo
    I am trying to understand what is the purpose of making files using commands such as cmake .. and make, I have tried looking online but there is no concise explanation on its purpose that i could find. Also, is it necessary to use make on a project folder that is not built in order to use the source (C++) in other projects. I know this may be a simplistic question, but as i am fairly new to building files, any information or references would be much appreciated.

    Read the article

  • .NET Rocks! Internet Audio

    - by Editor
    NET Rocks! is a weekly talk show for anyone interested in programming on the Microsoft .NET platform. The shows range from introductory information to hardcore geekiness. Many of their listeners download the MP3 files and burn CDs for the commute to and from work, or simply listen on a portable media player.  Download .NET Rocks! audio.

    Read the article

< Previous Page | 258 259 260 261 262 263 264 265 266 267 268 269  | Next Page >