Search Results

Search found 3097 results on 124 pages for 'tutor author'.

Page 34/124 | < Previous Page | 30 31 32 33 34 35 36 37 38 39 40 41  | Next Page >

  • Just Twitter FIND IT!

    On their website, I 80-Equipment invite the online truck shopper to ?Just say FIND IT!? (http://www.i80equipment.com/locator.html) and they promise to help you find whatever you?re looking for. It?s ... [Author: i80 Equipment - Computers and Internet - September 03, 2009]

    Read the article

  • Fish Isle Guide to Saving Time When Fishing

    This is a guide to show you how to save time while you are fishing in Fish Isle. This is done by using your options under the multi tool. You have three options which include catching, releasing, and... [Author: Jake Clark - Computers and Internet - April 21, 2010]

    Read the article

  • How Much Does Web Design Cost

    Ah, the age old question: How much does a website cost? This is a tricky question and can best be answered with a favourite analogy of ours - purchasing a new car, that is unless of course you purcha... [Author: Kevin Disher - Web Design and Development - March 29, 2010]

    Read the article

  • Web Design ? Keep the Web Clutter Free

    Web design practices that may increase the usability of a web design and would also contribute to a better Symantec web. Managing a web site has become so easier these days. Anyone can just get onli... [Author: Claudia Winifred - Web Design and Development - March 20, 2010]

    Read the article

  • The Buzz at the JavaOne Bookstore

    - by Janice J. Heiss
    I found my way to the JavaOne bookstore, a hub of activity. Who says brick and mortar bookstores are dead? I asked what was hot and got two answers: Hadoop in Practice by Alex Holmes was doing well. And Scala for the Impatient by noted Java Champion Cay Horstmann also seemed to be a fast seller. Hadoop in PracticeHadoop is a framework that organizes large clusters of computers around a problem. It is touted as especially effective for large amounts of data, and is use such companies as  Facebook, Yahoo, Apple, eBay and LinkedIn. Hadoop in Practice collects nearly 100 Hadoop examples and presents them in a problem/solution format with step by step explanations of solutions and designs. It’s very much a participatory book intended to make developers more at home with Hadoop.The author, Alex Holmes, is a senior software engineer with more than 15 years of experience developing large-scale distributed Java systems. For the last four years, he has gained expertise in Hadoop solving Big Data problems across a number of projects. He has presented at JavaOne and Jazoon and is currently a technical lead at VeriSign.At this year’s JavaOne, he is presenting a session with VeriSign colleague, Karthik Shyamsunder called “Java: A Perfect Platform for Data Science” where they will explain how the Java platform has emerged as a perfect platform for practicing data science, and also talk about such technologies as Hadoop, Hive, Pig, HBase, Cassandra, and Mahout. Scala for the ImpatientSan Jose State University computer science professor and Java Champion Cay Horstmann is the principal author of the highly regarded Core Java. Scala for the Impatient is a basic, practical introduction to Scala for experienced programmers. Horstmann has a presentation summarizing the themes of his book on at his website. On the final page he offers an enticing summary of his conclusions:* Widespread dissatisfaction with Java + XML + IDEs               --Don't make me eat Elephant again * A separate language for every problem domain is not efficient               --It takes time to master the idioms* ”JavaScript Everywhere” isn't going to scale* Trend is towards languages with more expressive power, less boilerplate* Will Scala be the “one ring to rule them”?* Maybe              --If it succeeds in industry             --If student-friendly subsets and tools are created The popularity of both books echoed comments by IBM Distinguished Engineer Jason McGee who closed his part of the Sunday JavaOne keynote by pointing out that the use of Java in complex applications is increasingly being augmented by a host of other languages with strong communities around them – JavaScript, JRuby, Scala, Python and so forth. Java developers increasingly must know the strengths and weaknesses of such languages going forward.

    Read the article

  • How to Get Burned by Your Internet History

    Burned by your Internet history? What do you mean? Perhaps you are not aware but your personal computer is one big, powerful recorder of all your computer activity. Whether you are searching the Inte... [Author: Chet Childers - Computers and Internet - August 24, 2009]

    Read the article

  • Website Design Customization

    Website design can be of two types- General or customized. If you are really serious and want to offer something new and unique through your website design, then customized services can fulfill this ... [Author: Alan Smith - Web Design and Development - May 18, 2010]

    Read the article

  • My Experiences with HP9000 Printheads

    HP9000s Head Replacement Although we have found this printer to produce a good quality print and to have been reliable, there is a question mark over the longevity of the printheads and also the hig... [Author: Matthew Theobald - Computers and Internet - August 31, 2009]

    Read the article

  • Turkey Telecom Sector Forecast to 2012

    The telecommunication sector in Turkey has grown at a rapid pace in past few years, driven by government support and initiatives aimed at liberalization and privatization of the sector. Besides this,... [Author: RNCOS E-Services Pvt. Ltd. - Computers and Internet - April 05, 2010]

    Read the article

  • Green Technology Management

    Computer Recycling: Computer recycling is the recycling or reuse of computers. It includes both finding another use for materials and having systems dismantled in a manner that allows for the safe e... [Author: Chris Loo - Computers and Internet - April 26, 2010]

    Read the article

  • Facebook As A Membership Communication Tool

    Social media is classed as being any website that allows user generated content. Social media is one of the most popular activities online, with more and more people logging onto social networks, cre... [Author: Kate Oxton - Computers and Internet - April 13, 2010]

    Read the article

  • Why Choose Aluminum Laptop Cases

    One of the decisions you will face when you purchase a new laptop computer is which case will best suit your needs. While there are many different cases on the market, many of the ones that are carri... [Author: Shannon Hilson - Computers and Internet - March 25, 2010]

    Read the article

  • Find Wi-Fi Hot Spots Around You

    Nowadays you will find that many laptops and portable devices such as personal digital assistants have built-in wireless Internet that is Wi-Fi chips. This definitely makes Internet use much more eas... [Author: Susan Brown - Computers and Internet - May 08, 2010]

    Read the article

  • Apress Deal of the Day - 13/Feb/2010 - Pro Hyper–V

    - by TATWORTH
    Today's Apresss $10 Deal of the Day at http://www.apress.com/info/dailydeal is In Pro Hyper–V, author Harley Stagner takes a comprehensive approach to acquiring, deploying, using, and troubleshooting Microsoft’s answer to virtualization on the Windows Server platform. Learn from a true virtualization guru all you need to know about deploying virtual machines, managing your library of VMs in your enterprise, recovering gracefully from failure scenarios, and migrating existing physical machines to virtual hardware.

    Read the article

  • Use Entitlements To Secure LDAP-enabled Applications With Oracle Virtual Directory and Oracle Entitl

    - by mark.wilcox
    I stumbled on an interesting article  that shows how the author used OVD to exposed OES security to protect a portal that only understood LDAP group-based authorization.This is great because it shows how you can use OES today to build central policies that can be used without needing to rewrite all of your applications - in particular if you just want to leverage rule-based groups.  Posted via email from Virtual Identity Dialogue

    Read the article

< Previous Page | 30 31 32 33 34 35 36 37 38 39 40 41  | Next Page >