Search Results

Search found 11 results on 1 pages for 'learnerforever'.

Page 1/1 | 1 

  • Web application development over C++ development..

    - by learnerforever
    Hi, I am CS undergrad and CS grad. In college I used to program in C/C++/java and have pretty much stuck to the same skill set in industry with 3 years experience. I like thinking,reading,applying logic etc, designing data structures, but I have little patience with debugging large C++ code. And having to deal with low level stuff like memory fault,memory corruption,compilation/linking issues. My confidence in programming is getting down due to this, but I like being in technical field. Does web application development like LAMP suit (Linux,apache,mysql,php),CSS,scripting (AMONG OTHER WEB DEVELOPMENT RELATED SKILLS) etc need lesser patience with debugging,and understanding of low level stuff, but your analysis/logical skills also get used? Also opportunities in web application development look more. Things like scalability, most of the stuff that Google does fascinates me, but for patience needed for dealing with C++ debugging. I make blunders while coding. How does the field look like outside C++? I am beginning to wonder if as a female, by moving to web application development, I can better manage work life balance. I have seen relatively lesser females in C++ than in Java/.net. Not very sure about web related stuff though. Also, what are the other hot technologies being used in web application development? lamp,css is something I know vaguely. Not in touch with keywords going on in this area. Please help!!.

    Read the article

  • Any career related single one-stop forum hub..

    - by learnerforever
    Hi, Stumbling into SO and then its sibling sites like programmers.stackexchange,superuser has been tremendously useful to me and is a single stop for my technical problems,long unanswered curiosities and it has been very useful to get perspective from mature professionals. I am an IT professional.I am looking for a similar one-stop career related forum, where I can understand job descriptions of different professions, career growth path, what a day looks like, salary,strengths needed with people having been there. I am confused about my career and particularly of interest are things like professors in academia,researchers in R&D lab, software developers,architectures,testers,business analyst,it analyst and related. Thanks,

    Read the article

  • Can I take up another part-time job when working with a typical IT company in India? [closed]

    - by learnerforever
    Hi, I know that this kind of question might depend from policies of company to company, but how does it look like in a typical IT company in India? Can I take up another part-time job when working full time in a typical private IT company in India? Is there any indian employement law preventing it(for whatever reason)? This part-time job could be a job on weekends or some online part-time freelancing programming job, which I manage to do on weekends or on weekdays after office hours. Thanks,

    Read the article

  • When I log on to my company desktop, I log on to a domain. How is this domain name installed?

    - by learnerforever
    Hi, When I have to work on my machine in company, I have noticed that I log on to a domain (named on the basis of company name) and not really on that computer. From, what I understand, this has a few advantages, the primary being that I just need one password for the domain and can work through any of the machines in company. My questions are : What software on desktop/network have to be installed so that the desktop recognizes and gives me option of logging into a domain. I would guess that a software can be installed on desktop, and there we can configure the IP address of domain server of company and port number, which handles authentication. Is this correct? This takes me to another question that how are softwares installed on end machines in a company. Going to each machine physically and installing looks very unweildy from administrator point of view. An obvious solution would be to install softwares (and updates) over network. My question on this are: What protocols,keywords come into picture when administrator installs OS,softwares,updates from his administrator machine to end machine through network. Thanks,

    Read the article

  • Block diagram containing computer buses,motherboard..

    - by learnerforever
    Hi all, I am trying to understand computer architecture. In particular: - Physical view i.e. what all is packed inside the motherboard and what all outside - Conceptual view. how processor,memory,peripherals are connected. I am getting confused among various buses like local bus,PCI bus, SCSI bus,ISA bus,USB bus. I am looking for block diagrams. How is the USB port connected to processor ultimately? through PCI bus etc? Why do we have so many buses? What was it like before SCSI/IDE came? Does the diagram at : http://www.vaughns-1-pagers.com/computer/pc-block-diagram.htm look correct? It shows no connection between PCI bus and SCSI bus. Is that correct? I would greatly appreciate any other link especially of block diagrams/anatomy and not just textual writeup. Thanks,

    Read the article

  • My Western Digital 500GB Passport disk says "not formatted" when I plug it in Windows

    - by learnerforever
    Hi, When I plug my Western Digital 500 GB Passport disk in my Windows machine, it says "not formatted, do you want to format it" something. I started having this problem after I put it in an old desktop at home. I don't exactly know what went wrong. May be partition table is corrupted etc. Questions: Some quick search on internet tells me there are partition fixing utilities, which can fix corrupted partition table. testdisk being one of such utiities. I can understand how to use this to copy files from the disk to some other location, but I would like to fix the partition table in-place so that I don't have to temporary move around my data of approx size 300GB, then format passport disk and then again bring back the data. Is there any way I can fix the partition table in-place? Also, how to know which file system was there originally in the disk? Can I only keep the same file system? My current laptop is running Windows 7. Earlier I used to use Windows Vista. My other laptop has Windows XP. So I have access to Windows 7 and Windows XP. Please help! Thanks,

    Read the article

  • 32-bit and 64-bit CPU/OS [closed]

    - by learnerforever
    Possible Duplicates: how to know if a computer is 32 bit or 64 bit 32-bit v/s 64-bit systems Hi, This 32-bit and 64-bit thing baffles me. It's not often that I run across it, but when I do, it baffles me. Like when I want to download software from http://www.google.com/ime/transliteration/ it asks me which version to download. I have win XP running on my thinkpad machine. How do I find out if my hardware is 32-bit or 64-bit. Also, how do I find if OS is 32-bit or 64-bit and thus how to know which version to download from this link. Also for any installed application say firefox, how do I know which bit version is installed. How popular are 64-bit hardware/OSs?. Are all the new CPUs and OSs supporting 64-bit and 32-bit for backwards compatible or 64-bit is still a luxury? Thanks,

    Read the article

  • Timing issue with autohotscript, fails to dump or open destination file

    - by learnerforever
    I've created a autohotscript to quickly dump selected text into my jot file on the Desktop and I think I'm facing a timing error. The script works like thus: Select text when reading a text file, browsing internet, reading PDF, etc. Hit Ctrl + J Contents of selected text is dumped into my jot file. When I press Ctrl + J very quickly, it sometimes doesn't come up in my jot file and sometimes when I keep pressing Ctrl + J for a long time, many instances of the text appear. Could somebody please point out what's wrong with this script and how I can improve it. ^j:: Clipboard := "" ; clear Send, ^c ; simulate Ctrl+C (=selection in clipboard) selection = %Clipboard% ; save the content of the clipboard FileAppend, `n%selection%`n,C:\Users\jagrati\Desktop\jots.txt return

    Read the article

  • How to access internet from 2 laptops with data card plugged-in in one of the machine?

    - by learnerforever
    Hi, I have 2 laptops - one running Windows XP and other running Vista. Both have wifi card.I have one Reliance broadband data card. I want to be able to access internet on both the machines simultaneously using this one data card. Please help. I think, there would be many many ways to do it. I do have some linksys router but any simple quick way without any extra hardware? like we could set up p2p or WLAN between these 2 machines, because both have wifi card so we shouldn't compulsorily need any extra hardware(?) I am fine with connecting data card to either of the machines. Thanks,

    Read the article

  • How to access internet from 2 laptops with data card plugged-in in one of the machine?

    - by learnerforever
    Hi, I have 2 laptops - one running Windows XP and other running Vista. Both have wifi card.I have one Reliance broadband data card. I want to be able to access internet on both the machines simultaneously using this one data card. Please help. I think, there would be many many ways to do it. I do have some linksys router but any simple quick way without any extra hardware? like we could set up p2p or WLAN between these 2 machines, because both have wifi card so we shouldn't compulsorily need any extra hardware(?) I am fine with connecting data card to either of the machines. Thanks,

    Read the article

  • How is my password sent across when I check gmails/access bank site [closed]

    - by learnerforever
    What encryption is used when my password is sent across in gmails/when I do online banking? RSA? DSA? Public-private key encryption?. In key encryption, which entity is assigned a public/private key? Does each unique machine with unique MAC address has a unique public/private key? Does each instance of browser have unique key? Does each user have unique private/public key? How does session key come into picture? How do machines receive their keys?

    Read the article

1