Search Results

Search found 9779 results on 392 pages for 'ezine articles'.

Page 94/392 | < Previous Page | 90 91 92 93 94 95 96 97 98 99 100 101  | Next Page >

  • Important Metrics to Evaluate the Strength of Your Link Building Campaign

    Your link building campaign will make the most of it only if you ensure to consider these metrics and create an ideal mold of link quality. It is true that different verticals demand different metrics, but practically, it all begins with the ability of creating your quality goals at the outset of your campaign, and authenticating that they go through genuine audits to assure a higher quality link portfolio along with improved ranking results.

    Read the article

  • Hosting cross-domain Silverlight applications (XAP)

    In the Silverlight world, there are two types of cross-domain things that may leave some banging their head against a wall for a while. The first involves making network-based calls (WebClient, HttpWebRequest, etc) to services hosted on a domain other than the one that is the site of origin for the XAP. This is solved by ensuring the service provider enables a clientaccesspolicy.xml file for their service. More information here: Cross Domain Policy Files with Silverlight. NOTE: site of origin is...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Leave SEO to the Pros

    Lets face the facts. No one uses the phone book any more. That is apparent from what I saw the other day. Outside my office lies a communal recycling area. Next to all the recycling receptacles lie a stack of phone books.

    Read the article

  • The "Salt and Pepper" of Simplifying SEO

    Judging by the amount of concern, fear, and sometimes panic over SEO, companies who make SEO a specialty are doing a terrific marketing job to create uneasiness over the unknown. Have you heard Kentucky Fried Chicken's marketing of "11 herbs and spices?" I remember reading somewhere that analysis showed that only salt and pepper were added to the coating.

    Read the article

  • The Know How Series - Understanding Search Engine Crawlers

    While most internet users use a lot of search engines, hardly a handful really know how a search engine works. If you are an online marketer or your business relies heavily on the internet it becomes a prerogative that you understand search engines and web crawlers. Search engines provide data at the flick of a button or at a single click.

    Read the article

  • Guidelines For Link Building

    If done well, link building can sky rocket your search engine page rank. Stick to natural simulation methods instead of opting for tempting shortcuts which can get your website blocked by search engines. Here are a set of guidelines that you should follow for link building:

    Read the article

  • Fantastico - 8 Facts

    Fantastico solution is an auto-installer for control panel servers working perfectly for PHP script, it is easy to use and help to simplify many open source software applications on web hosting accounts which contain free blog installation, domain name, web space, traffic, email accounts, CMS installation, MySQL, PHP databases and FTP accounts. It executed from the administration area of a website control panel such as cPanel and can be installed on ten thousand servers, with a million users worldwide.

    Read the article

  • Visual Studio 2010 JavaScript Intellisense Behavior

    After I installed Visual Studio 2010 I was having a difficult time editing .js files in Visual Studio. I habitually type the "(" character as soon as the function I want to call is highlighted in the Intellisense window, but in 2010 this behavior was no longer auto-completing the function name. At first I thought this behavior was due to the new "suggestion mode" in Intellisense, but no amount of toggling with CTRL+ALT+SPACE would bring back the auto-complete behavior. It turns out the two...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • The Significance of SEO

    SEO is not rocket science. It means some simple approaches to mark relevant keywords (on-page optimizations) and link building (off-page optimizations). In many cases SEO means only few simple modifications of the page to emphasize few keywords.

    Read the article

  • ASP.NET Pivot Grid: How To Enable Compact Layout Feature

    Check out this short ASPxPivotGrid video that shows you how to enable the new compact layout mode: The new compact layout mode helps you save space. And its easy to setup. Watch the short ASPxPivotGrid Compact Layout video and then drop me a line here with your thoughts. Thanks. DXperience? What's That? DXperience is the .NET developer's secret weapon. Get full access to a complete suite of professional components that let you instantly drop in new features, designer styles...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • New Development Snapshot

    More fixes. Thanks to Kornl Pl for his patches, bug reports and work on porting gmcs to IKVM.Reflection. Changes: Removed mcs specific flag that is no longer required. Removed use of reflection for getting the slot of a java.lang.reflect.Field. Implemented RuntimeMXBean. Feature request #2994310. Implemented OperatingSystemMXBean. Added ikvmc option to disable automagic serialization. Fixed ikvmc to give a proper...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Silverlight IE8 Web Slice + Desktop Application + Windows Phone 7 Series

    In our hotel room after Day 1 of MIX Gus from NV Interactive and I had an hour to kill for dinner. 20 minutes later wed managed to port the existing NZ Cricket Match Centre into a Windows Phone 7 Series application. After a touch of refactoring to handle orientation change events and a few tweaks around the hyperlink button targets we had things working on the Windows Phone 7 Series emulator! ...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • eBay Simple Lister Beta Now Available

    Thats right, the beta of the eBay Simple Lister app is now available in the eBay garden. I am really excited about this application! This Silverlight 4 application was built using Sketchflow, Blend, and Visual Studio 2010. It was designed and developed by Cynergy Systems for eBay with help from several Microsoft folk including Raj Ramabadran, Will Tschumy, Joe Shirey, and John Papa. You likely saw it in the MIX10 keynote or in the Silverlight 4 Launch keynote at DevConnections last week. If you...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • SEO Tactics For Google Caffeine - Time to Think Again

    Google Caffeine is the latest change in algorithm of the leading search engine. The changes made will be highly beneficial for those who are looking for long term SEO and online marketing success. If some decisive factors are kept in mind, webmasters can find a great success with the websites they are running.

    Read the article

  • Data Source Security Part 1

    - by Steve Felts
    I’ve written a couple of articles on how to store data source security credentials using the Oracle wallet.  I plan to write a few articles on the various types of security available to WebLogic Server (WLS) data sources.  There are more options than you might think! There have been several enhancements in this area in WLS 10.3.6.  There are a couple of more enhancements planned for release WLS 12.1.2 that I will include here for completeness.  This isn’t intended as a teaser.  If you call your Oracle support person, you can get them now as minor patches to WLS 10.3.6.   The current security documentation is scattered in a few places, has a few incorrect statements, and is missing a few topics.  It also seems that the knowledge of how to apply some of these features isn’t written down.  The goal of these articles is to talk about WLS data source security in a unified way and to introduce some approaches to using the available features.  Introduction to WebLogic Data Source Security Options By default, you define a single database user and password for a data source.  You can store it in the data source descriptor or make use of the Oracle wallet.  This is a very simple and efficient approach to security.  All of the connections in the connection pool are owned by this user and there is no special processing when a connection is given out.  That is, it’s a homogeneous connection pool and any request can get any connection from a security perspective (there are other aspects like affinity).  Regardless of the end user of the application, all connections in the pool use the same security credentials to access the DBMS.   No additional information is needed when you get a connection because it’s all available from the data source descriptor (or wallet). java.sql.Connection conn =  mydatasource.getConnection(); Note: You can enter the password as a name-value pair in the Properties field (this not permitted for production environments) or you can enter it in the Password field of the data source descriptor. The value in the Password field overrides any password value defined in the Properties passed to the JDBC Driver when creating physical database connections. It is recommended that you use the Password attribute in place of the password property in the properties string because the Password value is encrypted in the configuration file (stored as the password-encrypted attribute in the jdbc-driver-params tag in the module file) and is hidden in the administration console.  The Properties and Password fields are located on the administration console Data Source creation wizard or Data Source Configuration tab. The JDBC API can also be used to programmatically specify a database user name and password as in the following.  java.sql.Connection conn = mydatasource.getConnection(“user”, “password”); According to the JDBC specification, it’s supposed to take a database user and associated password but different vendors implement this differently.  WLS, by default, treats this as an application server user and password.  The pair is authenticated to see if it’s a valid user and that user is used for WLS security permission checks.  By default, the user is then mapped to a database user and password using the data source credential mapper, so this API sort of follows the specification but database credentials are one-step removed from the application code.  More details and the rationale are described later. While the default approach is simple, it does mean that only one database user is doing all of the work.  You can’t figure out who actually did the update and you can’t restrict SQL operations by who is running the operation, at least at the database level.   Any type of per-user logic will need to be in the application code instead of having the database do it.  There are various WLS data source features that can be configured to provide some per-user information about the operations to the database. WebLogic Data Source Security Options This table describes the features available for WebLogic data sources to configure database security credentials and a brief description.  It also captures information about the compatibility of these features with one another. Feature Description Can be used with Can’t be used with User authentication (default) Default getConnection(user, password) behavior – validate the input and use the user/password in the descriptor. Set client identifier Proxy Session, Identity pooling, Use database credentials Use database credentials Instead of using the credential mapper, use the supplied user and password directly. Set client identifier, Proxy session, Identity pooling User authentication, Multi Data Source Set Client Identifier Set a client identifier property associated with the connection (Oracle and DB2 only). Everything Proxy Session Set a light-weight proxy user associated with the connection (Oracle-only). Set client identifier, Use database credentials Identity pooling, User authentication Identity pooling Heterogeneous pool of connections owned by specified users. Set client identifier, Use database credentials Proxy session, User authentication, Labeling, Multi-datasource, Active GridLink Note that all of these features are available with both XA and non-XA drivers. Currently, the Proxy Session and Use Database Credentials options are on the Oracle tab of the Data Source Configuration tab of the administration console (even though the Use Database Credentials feature is not just for Oracle databases – oops).  The rest of the features are on the Identity tab of the Data Source Configuration tab in the administration console (plan on seeing them all in one place in the future). The subsequent articles will describe these features in more detail.  Keep referring back to this table to see the big picture.

    Read the article

< Previous Page | 90 91 92 93 94 95 96 97 98 99 100 101  | Next Page >