Search Results

Search found 4374 results on 175 pages for 'computers'.

Page 48/175 | < Previous Page | 44 45 46 47 48 49 50 51 52 53 54 55  | Next Page >

  • Using Online Backup Software for Remote Workers

    More and more companies are giving workers laptops and sending them in the field. In fact, laptops and netbooks actually outsold desktops last year. Good new for those of you that love the mobility, ... [Author: Ken Totura - Computers and Internet - April 01, 2010]

    Read the article

  • DNN Skin Developers & Consultants in India

    There are plenty of DNN Skin Developers and Consultants in India working and flourishing with a motto of doing their best so that the client base remains as robust as it ever was. The solutions they ... [Author: John Anthony - Computers and Internet - May 12, 2010]

    Read the article

  • Blog Web Hosting Services in India

    Blog Hosting Services in India are quite new in comparison to the new trend that has started across the world of service providers providing services to host blogs. Blogs get written to describe thin... [Author: John Anthony - Computers and Internet - May 24, 2010]

    Read the article

  • Microsoft and Application Architectures

    Microsoft has dealt with several kinds of application architectures to include but not limited to desktop applications, web applications, operating systems, relational database systems, windows services, and web services. Because of the size and market share of Microsoft, virtually every modern language works with or around a Microsoft product. Some of the languages include: Visual Basic, VB.Net, C#, C++, C, ASP.net, ASP, HTML, CSS, JavaScript, Java and XML. From my experience, Microsoft strives to maintain an n-tier application standard where an application is comprised of multiple layers that perform specific functions, for example: presentation layer, business layer, data access layer are three general layers that just about every formally structured application contains. The presentation layer contains anything to do with displaying information to the screen and how it appears on the screen. The business layer is the middle man between the presentation layer and data access layer and transforms data from the data access layer in to useable information to be stored later or sent to an output device through the presentation layer. The data access layer does as its name implies, it allows the business layer to access data from a data source like MS SQL Server, XML, or another data source. One of my favorite technologies that Microsoft has come out with recently is the .Net Framework. This framework allows developers to code an application in multiple languages and compiles them in to one intermediate language called the Common Language Runtime (CLR). This allows VB and C# developers to work seamlessly together as if they were working in the same project. The only real disadvantage to using the .Net Framework is that it only natively runs on Microsoft operating systems. However, Microsoft does control a majority of the operating systems currently installed on modern computers and servers, especially with personal home computers. Given that the Microsoft .Net Framework is so flexible it is an ideal for business to develop applications around it as long as they wanted to commit to using Microsoft technologies and operating systems in the future. I have been a professional developer for about 9+ years now and have seen the .net framework work flawlessly in just about every instance I have used it. In addition, I have used it to develop web applications, mobile phone applications, desktop applications, web service applications, and windows service applications to name a few.

    Read the article

  • Key to Successful Offshore Projects

    One of the most popular trends flourishing day by day in the business world is offshore outsourcing. In the recession hit corporate scenario, companies are facing pressure of reducing their operation... [Author: Harkirat Singh Bedi - Computers and Internet - April 21, 2010]

    Read the article

  • Cloud Computing Can Help You Realize Savings

    Simply speaking, the concept of cloud computing allows you to forget about the size, the scalability, the usually large capital investment for your hardware infrastructure. It may be difficult to gra... [Author: George Hadjiyanis - Computers and Internet - March 23, 2010]

    Read the article

  • Network Inventory Software

    The necessary condition of a company successful operation is a good state of computer assets. That is why all the company?s software and hardware should be inventoried on the regular basis. A system ... [Author: Dmitriy Stepanov - Computers and Internet - March 21, 2010]

    Read the article

  • Working Better With Ruby on Rails

    In the last four years, we have seen how Ruby on Rails (RoR) built on, and accelerated the wider acceptance of, the object-oriented Ruby language. Consequently, the Ruby/RoR combo has become a workho... [Author: Anthony Rainey - Computers and Internet - April 26, 2010]

    Read the article

  • How Does PowerPoint Play In A Great Presentation?

    ?Four score and seven years ago?? Abraham Lincoln?s famous Gettysburg address. ?Ask not what your country can do for you, but what you can do for your country.? John F. Kennedy?s famous address to t... [Author: Anne Warfield - Computers and Internet - June 10, 2010]

    Read the article

  • Webdav stops working after a few seconds

    - by user214885
    With Ubuntu 13.10, I connect to two different OwnCloud installations and can browse for only a few seconds before it freezes the connection and stops working. When I try to reinstate the connection it fails to even ask for the password (Ubuntu was told to forget the password). I did check the webdav connection through Firefox on two computers and ES File Explorer on android. I know that this isn't a webdav problem and don't know what is happening in Ubuntu to stop being able to read the connection.

    Read the article

  • Dropbox often stalls "Saving 1 file", have to restart it

    - by Nicolas Raoul
    Dropbox works well, but often the tray icon starts spinning forever with the tooltip message "Saving 1 file..." I usually don't worry about it, and I never had any loss, despite switching computers often. An easy solution is to restart Dropbox, it spins for a second before the tooltip says "All files up to date". But how to permanently prevent this problem? Ubuntu 2010.10 Dropbox 0.7.110 Dropbox stores about 50 text files, 1 MB in total.

    Read the article

  • Buy Printer Cartridges Online

    It can be really frustrating to have been out and bought printer ink only to get home and realize that you have bought the wrong kind. Not only does it mean you have wasted the time involved in buyin... [Author: Kathryn Dawson - Computers and Internet - June 08, 2010]

    Read the article

  • How To Spot An Online Ticket Scam

    Police have shut down 100 online ticket scam websites this month, by taking action through the organisation in charge of registering all web addresses; Icann (Internet Corporations of Assigned Names ... [Author: Chris Holgate - Computers and Internet - May 15, 2010]

    Read the article

  • How do i Setup Different Users to Folders

    - by Erin
    I am trying to setup a Ubuntu Server for an office. Its going to be a file share server that 4-5 desktops connect to and access the files. Im planning on having different access for certain computers so computer 1 has full access but say computer 2 can only see a certain folder. My question is, is this possible and how would i go about setting it up? All workstations are using Windows XP - Vista.

    Read the article

  • How Secure Are Your ID Cards From Counterfeiting

    ID cards are increasingly used by organizations as a key component of their security infrastructure. As such, there is an increasing concern that ID cards are secure so that they can NOT be fraudulen... [Author: Edmond Shi - Computers and Internet - May 23, 2010]

    Read the article

  • Printer Ink Cartridges for Home or Office

    Looking for a printer for your home office? Deciding on the right one for you can be a difficult decision to make, especially if you are not really sure what each type has to offer. Printers have c... [Author: Kathryn Dawson - Computers and Internet - May 03, 2010]

    Read the article

  • Stuxnet - how it infects

    - by Kit Ong
    Except from the CNET article.http://news.cnet.com/8301-13772_3-57413329-52/stuxnet-delivered-to-iranian-nuclear-plant-on-thumb-drive/?part=propeller&subj=news&tag=linkvThe Stuxnet worm propagates by exploiting a hole in all versions of Windows in the code that processes shortcut files, ending in ".lnk," according to...[the] Microsoft Malware Protection Center....Merely browsing to the removable media drive using an application that displays shortcut icons, such as Windows Explorer, will run the malware without the user clicking on the icons. The worm infects USB drives or other removable storage devices that are subsequently connected to the infected machine. Those USB drives then infect other machines much like the common cold is spread by infected people sneezing into their hands and then touching door knobs that others are handling.The malware includes a rootkit, which is software designed to hide the fact that a computer has been compromised, and other software that sneaks onto computers by using a digital certificates signed two Taiwanese chip manufacturers that are based in the same industrial complex in Taiwan--RealTek and JMicron, according to Chester Wisniewski, senior security advisor at Sophos.... It is unclear how the digital signatures were acquired by the attacker, but experts believe they were stolen and that the companies were not involved.Once the machine is infected, a Trojan looks to see if the computer it lands on is running Siemens' Simatic WinCC software. The malware then automatically uses a default password that is hard-coded into the software to access the control system's Microsoft SQL database. The Stuxnet worm propagates by exploiting a hole in all versions of Windows in the code that processes shortcut files, ending in ".lnk," according to...[the] Microsoft Malware Protection Center....Merely browsing to the removable media drive using an application that displays shortcut icons, such as Windows Explorer, will run the malware without the user clicking on the icons. The worm infects USB drives or other removable storage devices that are subsequently connected to the infected machine. Those USB drives then infect other machines much like the common cold is spread by infected people sneezing into their hands and then touching door knobs that others are handling.The malware includes a rootkit, which is software designed to hide the fact that a computer has been compromised, and other software that sneaks onto computers by using a digital certificates signed two Taiwanese chip manufacturers that are based in the same industrial complex in Taiwan--RealTek and JMicron, according to Chester Wisniewski, senior security advisor at Sophos.... It is unclear how the digital signatures were acquired by the attacker, but experts believe they were stolen and that the companies were not involved.Once the machine is infected, a Trojan looks to see if the computer it lands on is running Siemens' Simatic WinCC software. The malware then automatically uses a default password that is hard-coded into the software to access the control system's Microsoft SQL database.

    Read the article

  • Designs For Emerald Cut Rings

    Step Cut type of the emerald cut stones appears to be like steps engraved into the jewel. Particularly, emerald cutting was rectangular in shape with little cropped corners. At first, this cut was bu... [Author: Scheygen Smith - Computers and Internet - March 21, 2010]

    Read the article

  • Using of EPOS Touch Screen and Its Benefit

    EPOS stands for Electronic Point of Sale and is modern cash registers. Its usually used by retail and hospitality businesses in their POS stations as staff reacts well to them as they are similar to ... [Author: Alan Wisdom - Computers and Internet - April 05, 2010]

    Read the article

< Previous Page | 44 45 46 47 48 49 50 51 52 53 54 55  | Next Page >