Search Results

Search found 15433 results on 618 pages for 'nintex workflow 2010'.

Page 349/618 | < Previous Page | 345 346 347 348 349 350 351 352 353 354 355 356  | Next Page >

  • Guide To Be An Active Facebook Member With Safety

    These days many people from all over the world have a fun time by browsing online social networking websites like Facebook. The reason is that they are the superb means to be in contact with friends ... [Author: Susan Miller - Computers and Internet - May 17, 2010]

    Read the article

  • licensing a ' Sharepoint bug-Fix' to reserve it

    - by Remon
    My friend recently finished hes personal work on a project that fixes a known bug in sharepoint 2010, the guy spent significant time\effort to reach this point He consulted me on how to license this fix and asked if this possible and is it accepted for a such type of solutions! actually I don't have any experiences in this matter especially that he is willing to start selling the fix and don't want to be lost in the market P.S.: hes current location is U.A.E TIA.

    Read the article

  • Protect Your Virtual World

    Technology is definitely very seductive. The thrill of getting more into newer technologies and the wow factor of sleeker design are irresistible. But as we all know, every step we take has some draw... [Author: Francis Regan - Computers and Internet - May 04, 2010]

    Read the article

  • Digitally Signed Malware on the Rise

    Brought to the forefront in 2010 with Stuxnet, the infamous worm aimed at sabotaging industrial infrastructure, the use of stolen digital certificates is relatively new. Stuxnet's creators digitally signed its rootkit components with stolen certificates from JMicron and RealTek, a pair of semiconductor manufacturers. The worm's existence and complexity caught the security community by surprise. In fact, many researchers predicted that malware creators would begin adopting the same technique to work around driver signature enforcement employed by Microsoft in its 64-bit versions of Windows V...

    Read the article

  • So, You Thought YOU Owned Your Website?

    As part of being an SEO consultant, I?m frequently asked to conduct SEO Audits on potential client?s websites. Amongst sundry other tasks, I always check to see who the legal owner of the site is. Wi... [Author: Ben Kemp - Web Design and Development - April 20, 2010]

    Read the article

  • [News] Aper?u des nouvelles fonctionnalit?s de Resharper 5

    Visual Studio 2010 reprendra bon nombre de fonctionnalit?s du d?sormais c?l?bre plugin Resharper de JetBrains. On aurait pu croire que JetBrains aurait baiss? les armes face ? la concurrence impitoyable de Microsoft. Pas du tout, Resharper 5 est annonc? avec toujours plus de richesse. Voici un aper?u des nouveaut?s, certaines sont tr?s innovantes.

    Read the article

  • Binding Data to Web Performance Tests

    Web Performance Tests provide a simple means of ensuring correct and performant responses are being returned from your web application. Testing a wide variety of inputs can be tedious without a way to separate test recording and input selection. Data binding provides a convenient and simple way to try an unlimited number of different inputs as part of your web performance tests using Visual Studio 2010.

    Read the article

  • Choosing Unlimited Web Hosting

    There are so many web hosting companies available either online or offline and one can select any one depending upon the choice and interest. Nowadays, several hosting companies are providing unlimit... [Author: Anand Maheshwari - Web Design and Development - May 16, 2010]

    Read the article

  • Can Cyber Stalkers Harass People on Myspace?

    There are countless areas on the Internet that many people go to meet new people, talk to their close friends and family members, and enjoy engaging in fun games, polls, and a variety of other exciti... [Author: Ed Opperman - Computers and Internet - June 02, 2010]

    Read the article

  • Negativity On My Blog

    A few weeks ago I had someone post a comment on my blog that was a little less than flattering. This was posted by ?Fellow REALTOR?? (he didn?t use the proper trademark but due to recent events I?ll ... [Author: Cliff Stevenson - Computers and Internet - May 04, 2010]

    Read the article

  • Specify Linq To SQL ConnectionString explicitly

    - by Michael Freidgeim
    When modifying Linq to  Sql data model in Visual Studio 2010,  it re-assigns ConnectionString that is available on developer’s machine. Because the name can be different on different machines, Designer often replace it with something like ConnectionString1, which causes errors during deployment.It requires developers to ensure that ConnectionString stays unchanged.  More reliable way is to use context constructor with explicit ConnectionString name instead of parameterless default constructor GOOD:   var ctx = new MyModelDataContext(Settings.Default.ConnectionString);Not good:          var ctx = new MyModelDataContext();

    Read the article

  • Popularity Of Web CMS

    What is the benefit of using CMS in web designs? Content Management Systems or CMS is a software used in many industry to manage work flow in a collaborative environment. One of the most popular type... [Author: Margarette Mcbride - Web Design and Development - May 12, 2010]

    Read the article

  • How to Use Social Media To Manage & Improve Events

    Social media is fast becoming a vital part of an event planner?s toolbox. Social media is described as a class of website that is based on user participation and user generated content. Examples of s... [Author: Kate Oxton - Computers and Internet - March 23, 2010]

    Read the article

  • Non-Standardized Style Sheet Languages

    CSS (Cascading Style Sheets) and XSL (Extensible Stylesheet Language) are considered as the standard style sheet languages used in web development. However, other than CSS and XSL, there has also bee... [Author: Margarette Mcbride - Web Design and Development - May 04, 2010]

    Read the article

  • CSS And Other Style Sheet Languages

    In the past, websites were designed through the use of tables. It was used as a way to control the visual appearance of the Web pages presented to end users. Although it was successful, the use of ta... [Author: Margarette Mcbride - Web Design and Development - May 02, 2010]

    Read the article

  • Why Do You Need SSL Certificate

    SSL (Secure Sockets Layer) is an encrypting modus operandi that ensures the en route security of the personal details processed by the browser to the server. We all know that online shopping is prefe... [Author: Jack Melde - Computers and Internet - May 01, 2010]

    Read the article

  • A Look At The Three Best CMS Today

    The use of WCMS softwares or Web Content Management Systems have made it easier for many web designers and developers to make quick changes within their websites. However, the true advantage of using... [Author: Margarette Mcbride - Web Design and Development - April 13, 2010]

    Read the article

  • Resolving "Error accessing a table..." Error

    Are you encountering an error message during DB2 database startup? Or during the execution of Alter Tablespace SQL command? If ';yes';, then the three possible reasons for the error message are, contai... [Author: Mark Willium - Computers and Internet - May 13, 2010]

    Read the article

  • Are SSL Certificates Really Secure

    The biggest challenge for internet these days is in the form of fraud or hacking. Security of any transaction on the WWW is very crucial and therefore, several security tools are developed for the sa... [Author: Jack Melde - Computers and Internet - May 01, 2010]

    Read the article

< Previous Page | 345 346 347 348 349 350 351 352 353 354 355 356  | Next Page >