Search Results

Search found 18473 results on 739 pages for 'microsoft managment conso'.

Page 44/739 | < Previous Page | 40 41 42 43 44 45 46 47 48 49 50 51  | Next Page >

  • Internet Explorer 10 bientôt disponible pour Windows 7, Microsoft annonce la sortie d'une préversion en novembre

    Internet Explorer 10 bientôt disponible pour Windows 7, Microsoft annonce la sortie d'une préversion en novembre Les utilisateurs de Windows 7 pourront télécharger une préversion d'Internet Explorer 10 à partir de mi-novembre. IE 10 est la prochaine mise à jour majeure du navigateur de Microsoft qui sera disponible en version finale au même moment que Windows 8 annoncé pour le 26 octobre prochain. Cette version se distingue essentiellement par sa nouvelle interface qui repose sur les tuiles Windows 8 et le support de la navigation tactile. Le navigateur dispose de nouvelles capacités de développement et de performances améliorées grâce à l'accélération matérielle. M...

    Read the article

  • Le Touch Pack de Windows 7 est disponible, Microsoft offre ses applications multitouch

    Le Touch Pack de Windows 7 est disponible, Microsoft offre ses applications multitouch Microsoft vient de rendre disponible le Touch Pack de Windows 7. Il s'agit de plusieurs applications gratuites utilisant les capacités multitouch du système. Voici la composition du pack : Surface Globe : Application utilisant le moteur Virtual Earth 3D et permettant de visiter la planète sur le bout des doigts. Surface Collage : Permet de sélectionner un dossier pour en disposer et présenter les images à l'envie. Surface Lagoon : Ecran de veille mais avec lequel on peut interagir, provoquer des remous dans l'eau, attirer les poissons, etc. Blackboard : Jeu ...

    Read the article

  • Microsoft Surface versus iPad 4 : comparaison au niveau du HTML5 par l'équipe Sencha

    Microsoft Surface versus iPad 4 : comparaison au niveau du HTML5 par l'équipe Sencha. [IMG]http://cdn.sencha.io/img/20121119-surface-vs-ipad-preview.png[/IMG] Sencha fournit des outils de développement pour bureau et mobile. Son équipe a mis l'iPad 4 et la tablette Surface de Microsoft à l'épreuve pour voir comment ils se débrouillent en tant que plates-formes HTML5. Le HTML5 est la prochaine génération de technologies Web qui est adoptée de plus en plus pour développer des applications qui peuvent être rédigées en une seule fois et exécutées sur plusieurs systèmes d'exploitation, les navigateurs et les périphériques. Les tests révèlent que l...

    Read the article

  • Microsoft étend son projet 4Afrika à l'Afrique du Sud, pour connecter les zones rurales à Internet

    Microsoft étend son projet 4Afrika à l'Afrique du Sud, pour connecter les zones rurales à Internet Dans le domaine de la télécommunication, une zone blanche correspond à une zone du territoire non couverte par un réseau donné (le plus souvent réseau de téléphonie mobile ou internet). Dans son projet Microsoft 4Afrika, l'entreprise ambitionne d'exploiter ces zones blanches au Kenya. Des parties rurales de la province de Limpopo, au nord-est de l'Afrique du Sud, pourraient se voir connectées à Internet. Le projet pilote qui permettra à cinq écoles primaires et secondaires de surfer sur le web devrait fournir au pays la capacité de fournir à 80 % de sa population l'accès au web d'ici 2020.Paul G...

    Read the article

  • Pirates, Treasure Chests and Architectural Mapping

    Pirate 1: Why do pirates create treasure maps? Pirate 2: I do not know.Pirate 1: So they can find their gold. Yes, that was a bad joke, but it does illustrate a point. Pirates are known for drawing treasure maps to their most prized possession. These documents detail the decisions pirates made in order to hide and find their chests of gold. The map allows them to trace the steps they took originally to hide their treasure so that they may return. As software engineers, programmers, and architects we need to treat software implementations much like our treasure chest. Why is software like a treasure chest? It cost money, time,  and resources to develop (Usually) It can make or save money, time, and resources (Hopefully) If we operate under the assumption that software is like a treasure chest then wouldn’t make sense to document the steps, rationale, concerns, and decisions about how it was designed? Pirates are notorious for documenting where they hide their treasure.  Shouldn’t we as creators of software do the same? By documenting our design decisions and rationale behind them will help others be able to understand and maintain implemented systems. This can only be done if the design decisions are correctly mapped to its corresponding implementation. This allows for architectural decisions to be traced from the conceptual model, architectural design and finally to the implementation. Mapping gives software professional a method to trace the reason why specific areas of code were developed verses other options. Just like the pirates we need to able to trace our steps from the start of a project to its implementation,  so that we will understand why specific choices were chosen. The traceability of a software implementation that actually maps back to its originating design decisions is invaluable for ensuring that architectural drifting and erosion does not take place. The drifting and erosion is prevented by allowing others to understand the rational of why an implementation was created in a specific manor or methodology The process of mapping distinct design concerns/decisions to the location of its implemented is called traceability. In this context traceability is defined as method for connecting distinctive software artifacts. This process allows architectural design models and decisions to be directly connected with its physical implementation. The process of mapping architectural design concerns to a software implementation can be very complex. However, most design decision can be placed in  a few generalized categories. Commonly Mapped Design Decisions Design Rationale Components and Connectors Interfaces Behaviors/Properties Design rational is one of the hardest categories to map directly to an implementation. Typically this rational is mapped or document in code via comments. These comments consist of general design decisions and reasoning because they do not directly refer to a specific part of an application. They typically focus more on the higher level concerns. Components and connectors can directly be mapped to architectural concerns. Typically concerns subdivide an application in to distinct functional areas. These functional areas then can map directly back to their originating concerns.Interfaces can be mapped back to design concerns in one of two ways. Interfaces that pertain to specific function definitions can be directly mapped back to its originating concern(s). However, more complicated interfaces require additional analysis to ensure that the proper mappings are created. Depending on the complexity some Behaviors\Properties can be translated directly into a generic implementation structure that is ready for business logic. In addition, some behaviors can be translated directly in to an actual implementation depending on the complexity and architectural tools used. Mapping design concerns to an implementation is a lot of work to maintain, but is doable. In order to ensure that concerns are mapped correctly and that an implementation correctly reflects its design concerns then one of two standard approaches are usually used. All Changes Come From ArchitectureBy forcing all application changes to come through the architectural model prior to implementation then the existing mappings will be used to locate where in the implementation changes need to occur. Allow Changes From Implementation Or Architecture By allowing changes to come from the implementation and/or the architecture then the other area must be kept in sync. This methodology is more complex compared to the previous approach.  One reason to justify the added complexity for an application is due to the fact that this approach tends to detect and prevent architectural drift and erosion. Additionally, this approach is usually maintained via software because of the complexity. Reference:Taylor, R. N., Medvidovic, N., & Dashofy, E. M. (2009). Software architecture: Foundations, theory, and practice Hoboken, NJ: John Wiley & Sons  

    Read the article

  • Microsoft Unveils New Logo

    Indeed, with those four familiar colored squares - set in a bigger square rather than standing on a point in a diamond - Microsoft's new corporate logo seems almost inevitable. As you'd expect, the company's name makes up part of the logo, but instead of the thick italic letters it has used for the past two and a half decades, it's in a more standard, lighter font. Jeff Hansen, Microsoft's general manager of brand strategy, notes that the point of the new logo is to signal the heritage but also signal the future - a newness and a freshness. It's very fitting when you consider just how many...

    Read the article

  • Xamarin Wins Funding, Microsoft Builds Repair Tool

    Let's focus on the Xamarin news first. Xamarin is a young company with a phoenix-like history. Founded in May of 2011 by Miguel de Icaza and the rest of the team that created Mono, Xamarin got its start, effectively, as Ximian (de Icaza's previous company). Ximian was founded way back in 1999, and created Mono, which TechCrunch describes as an open source project that brings Microsoft's .NET development framework to non-Microsoft operating systems like Android, iOS and Linux. Novell acquired Ximian inn 2003, and continued to fund Mono's development. But apparently, when Attachmate bought No...

    Read the article

  • SQLAuthority News Downloads Available for Microsoft SQL Server Compact 3.5

    There are few downloads released for Microsoft SQL Server Compact 3.5. Here is quick lists of the same. Microsoft SQL Server Compact 3.5 Service Pack 2 for Windows Desktop SQL Server Compact 3.5 SP2 is an embedded database that allows developers to build robust applications for Windows desktops and mobile devices. The download contains the [...]...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • How do I adjust transparency of watermark in Microsoft Word 2010?

    - by hkBattousai
    I added a watermark to my page from Page Layout Watermark Custom Watermark... Picture Watermark However, the resulting watermark was dim and fainted like it is transparent. I want it to look like the original image; as if I inserted it from Insert Picture. How do I adjust transparency of watermark? Versions: Office: Microsoft Office Professional Plus 2010 Word: 14.0.6112.5000 (64-bit)

    Read the article

  • Intel prévoit de lancer des smartphones tournant sous Windows 8, contrairement aux voeux de Microsoft

    Intel prévoit de lancer des smartphones tournant sous Windows 8, contrairement aux voeux de Microsoft Juste après avoir annoncé ses profits records pour 2010, Intel a donné quelques informations sur son futur, et une partie de celui-ci sera lié à Microsoft. En effet, Paul Otellini (CEO de la compagnie) a réagit au portage de la prochaine génération de Windows sur la plateforme ARM, action dans laquelle il perçoit des avantages pour sa propre société. "Le plus pour Intel, c'est qu'avec l'unification de leurs systèmes d'exploitation, nous avons désormais pour la première fois avoir un OS tactile pour tablettes compatible avec nos produits. Nous pourrons insérer nos processeurs low-power tournant sous Windows 8 dans des téléphone...

    Read the article

  • After low level formatting can microsoft track previously pirated windows installed on pc

    - by Neelabh
    am getting call from Microsoft and they are forcing me to purchase so many licensed software but my budget is not that much.. So they are asking for On-Site Audit (SAM Review)... So I did low level formatting of my All PC's and Installed Ubuntu. So can they track I installed pirated windows xp earlier on these system or I need to change hardware.. After formatting on what parameter Microsoft Track earlier piracy: 1) By any Harddisk ID 2) By any Motherboard ID 3) By any IP Address Please help me otherwise I have to borrow so much money for licensing fee. Thanks in Advance..

    Read the article

  • Microsoft sort une version d'évaluation de Windows Server 2008 R2 Hyper-V, sa solution de virtualisa

    Mise à jour du 30/03/10 Microsoft sort un ensemble de solutions pour la virtualisation dans Windows Server 2008 R2 Découvrez Windows Server 2008 R2 Hyper-V, System Center et Live Migration Microsoft semblait vouloir mettre les bouchées double dans la virtualisation du poste de travail aussi bien dans Windows 7 que dans Windows Server 2008 R2 (lire ci-avant). Il le confirme aujourd'hui en proposant de découvrir son nouvel ensemble de solutions de virtualisation pour ce dernier. Avec Hyper V, la virtualisation de serveur devient en effet une fonction de base de Windows Server 2008 R2. "Vous pouvez donc consolider sans surcoût vos serveurs phy...

    Read the article

  • Microsoft premier éditeur à publier ses spécifications JavaScript~ JScript 5.7 et 5.8, ses implément

    Microsoft premier éditeur à publier ses spécifications JavaScript JScript 5.7 et 5.8, les implémentations de JavaScript pour Internet Explorer 7 et 8 Microsoft vient de publier les spécifications de JScript : JScript 5.7 pour Internet Explorer 7 et JScript 5.8 pour Internet Explorer 8. Pour mémoire JScript est l'implémentation maison de JavaScript utilisé par Redmond dans ses navigateurs. JavaScript suit les standards de la spécification ECMA-262 (ou ECMAScript) dont le but est d'uniformiser, autant que faire se peut, le cadre de travail des développeurs web. D'où le nom des deux documents récemment publiés sur MSDN : "Internet Explorer ECMA-262 ECMAScript Language ...

    Read the article

  • What is the value of an Enterprise Resource Planning (ERP) System?

    According to PWC.com ERP systems can add tremendous value to a company’s core business functionality.  Below PWC.com summarizes the primary value that an ERP can add to a company. ERPs are a collection business application that coordinates the resources, information, and activities required for core business processes. ERPs are strategic tools used to reduce costs, improve business processes, and healthier risk management.

    Read the article

  • Microsoft MVP for year 2011

    - by imran_ku07
        This is great news for me that I become Microsoft Most Valuable Professional (Microsoft MVP) and Most Valuable Blogger. It feels so great for me. I am very thankful to all friends, community member and team members. Special thanks to ASP.NET MVC Team members Rick Anderson, Levi Broderick, Brad Wilson and Marcin Dobosz. I learn very much from these guys. They are indeed wizards and very much deserve their positions   

    Read the article

  • What are the challenges of implementing an ERP system?

    When a company decides to rollout an ERP system as part of its core business processes they must consider and provide solutions for the following general challenges. It is important to note that this list is generic and that every ERP system that rolls out is as distinct as the companies that are trying to implement the system. Upper Management Support Reengineering Existing Business Process and Applications Integration of the ERP with other existing departmental applications Implementation Time Implementation Costs Employee Training I just recently read an article by Mano Billi called “What are the major challenges in implementing ERP? “ were he basically outlines the common challenges to implementing an ERP system within a company. He discusses items like Upper management support, altering existing systems, and how ERPs integrate with other independent systems. In addition, he also covers items on selecting a ERP vendor, ERP Consultants, and the effects of an ERP system on employees.  I personally think he did a create job of outlining common issues that can cause an ERP implementation to fail or not be as effective as it potentially could be if the challenges are not taken in to account appropriately.

    Read the article

  • Disaster Recovery Example

    Previously, I use to work for a small internet company that sells dental plans online. Our primary focus concerning disaster prevention and recovery is on our corporate website and private intranet site. We had a multiphase disaster recovery plan that includes data redundancy, load balancing, and off-site monitoring. Data redundancy is a key aspect of our disaster recovery plan. The first phase of this is to replicate our data to multiple database servers and schedule daily backups of the databases that are stored off site. The next phase is the file replication of data amongst our web servers that are also backed up daily by our collocation. In addition to the files located on the server, files are also stored locally on development machines, and again backed up using version control software. Load balancing is another key aspect of our disaster recovery plan. Load balancing offers many benefits for our system, better performance, load distribution and increased availability. With our servers behind a load balancer our system has the ability to accept multiple requests simultaneously because the load is split between multiple servers. Plus if one server is slow or experiencing a failure the traffic is diverted amongst the other servers connected to the load balancer allowing the server to get back online. The final key to our disaster recovery plan is off-site monitoring that notifies all IT staff of any outages or errors on the main website encountered by the monitor. Messages are sent by email, voicemail, and SMS. According to Disasterrecovery.org, disaster recovery planning is the way companies successfully manage crises with minimal cost and effort and maximum speed compared to others that are forced to make decision out of desperation when disasters occur. In addition Sun Guard stated in 2009 that the first step in disaster recovery planning is to analyze company risks and factor in fixed costs for things like hardware, software, staffing and utilities, as well as indirect costs, such as floor space, power protection, physical and information security, and management. Also availability requirements need to be determined per application and system as well as the strategies for recovery.

    Read the article

  • Microsoft présente ses recherches sur les Interfaces Utilisateur Naturelles dont une devrait être adaptée sur Kinect

    Microsoft présente ses recherches sur les Interfaces Utilisateur Naturelles Dont une devrait être adaptée sur Kinect Microsoft aime les Interfaces Utilisateur Naturelles (NUI). Ses laboratoires de recherche viennent de poster une démonstration d'une technologie baptisée « 3D Photo-Real Talking Heads » et d'autres concernant les affichages intelligents, toutes réalisées grâce à l'utilisation d' appareils photo pour créer de nouveaux types d'expériences inter-actives. La 3D Photo-Real Talking Head produit un visage en 3D à partir de photos et permet de suivre les mouvements de la tête, et des lèvres. Elle devrait bientôt être adaptée au capteur de mouvement Kinect pour la X...

    Read the article

  • Patch Tuesday : Microsoft corrige 40 failles de sécurité dans Windows, Office, Internet Explorer, SharePoint et Exchange

    Microsoft corrige 40 failles de sécurité liées à Windows, Office, Internet Explorer, SharePoint Server et Exchange, dans son dernier Patch Tuesday de l'année Mise à jour du 15.12.2010 par Katleen Microsoft a rendu disponible hier son Patch Tuesday de décembre. Moins fourni que celui du mois dernier, il corrige tout de même 40 failles de sécurité. Composée de 17 bulletins (de MS10-090 à MS10-106), cette mise à jour est la dernière de l'année 2010 pour l'éditeur américain. Le premier bulletin de la série (MS10-090), l'un des plus cruciaux du lot, corrige sept failles touchant Internet Explorer (dans des environnements Windows et Windows Server uniquement). Parmi elles, cinq sont critique...

    Read the article

  • Patch Tuesday : Microsoft corrige 14 vulnérabilités, dont 7 critiques, Windows 8, RT et IE 10 concernés

    Patch Tuesday : Microsoft corrige 14 vulnérabilités dont 7 critiques, Windows 8, RT et IE 10 concernés Microsoft a publié hier sa traditionnelle mise à jour de sécurité mensuelle (Patch Tuesday), qui apporte des correctifs pour les dernières versions de ses produits : Windows 8, Windows RT, Windows Server 2012 et Internet Explorer 10. La dernière mise à jour de sécurité (sauf en cas de découverte d'une faille zero-day) de l'année corrige une douzaine de failles dans Windows, IE, Word et Exchange, dont sept ont été marquées comme critique et deux ont été qualifiées d'importants. Ces failles dans l'ensemble peuvent être exploitées par des pirates distants pour prendre le con...

    Read the article

< Previous Page | 40 41 42 43 44 45 46 47 48 49 50 51  | Next Page >