Search Results

Search found 9822 results on 393 pages for 'hottest articles'.

Page 120/393 | < Previous Page | 116 117 118 119 120 121 122 123 124 125 126 127  | Next Page >

  • When failure is a feature

    Warning: this post is going to be slightly off-topic and non-technical. Well, not computer science technical at least. I was reading an article in SciAm this morning about the possibility of a robot uprising. Dont laugh yet, this is a very real, if still quite remote possibility. The main idea that was described was that AI could rise one day to self-awareness and to an ability to improve itself through self-replication beyond human abilities to control it. Sure, thats one possibility, and some...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • How to Submit to Regional Directory

    A regional directory is developed for sites that caters to audience in a specific geographical regions. In a regional directory, the categories can be classified into countries, states, cities, and towns.

    Read the article

  • Is SEO Dead?

    Google has release yet another update - Caffeine, and with it comes the next wave of people claiming that SEO is dead. This happens almost once a year, it seems. Not Google's updates, but the clamoring for the death of SEO. Let's examine some reasons why people think it this time around, and whether or not SEO is really dead.

    Read the article

  • Web Development Tid Bits

    The article has been written to highlight the importance of owning a website by an individual business or a big corporate house. The services provided by the web development companies in India are available on a 24x7 basis.

    Read the article

  • Importance of On-Page SEO in Affiliate Marketing

    You may already have heard that search engine optimization or SEO is important in affiliate marketing. Although it is not everything, SEO is indeed important. The higher you rank in the search engine results pages, the more clients you are likely to have.

    Read the article

  • Task of SEO Consultant is Building the Perfect Web Page

    Current trend in the market is using the services of reputed and reliable SEO consultant for the purpose of search engine optimization and website promotion. Use of the consultant is basically aimed at developing perfect web page for the client. Certain primary areas are also there that should be taken care of.

    Read the article

  • ASP.NET Podcast Show #142 - MonoTouch - iPhone Development with .NET/C# - Video & Audio

    Subscribe to Everything. Subscribe to WMV. Subscribe to M4V. Subscribe to MP3. Download WMV. Download M4V. Download MOV. Download MP3. Show Notes: Apple, Developers, and Licensing.Why Develop on the iPhone.What is Mono and MonoTouch.Getting started with a Hello World style application.UITableView with a custom table cell.Acceleration. Note: There is a shake event, this is done to show acceleration.MonoTouch ebook.Professional iPhone Development wit MonoTouch and .NET/C#....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Awesome SEO Tips

    To survive in the competitive e-marketing world almost every small e-commerce business is implementing Search Engine Optimization technique. From the pile of SEO tips as well as strategies selecting the best strategy is pretty tough. You must have basic knowledge of SEO and what is the latest update on this field. Here are some of the most praiseworthy and efficient SEO tips framed for you.

    Read the article

  • Search Engine Placement - How Anchor Text Can Improve Yours

    For somewhat obvious reasons, Google and the other search engines like to keep the true nature of how exactly they rank web pages in search results a secret; letting their closely guarded secrets out would lead to search results being so manipulated by companies wishing to rank highly as to render most results irrelevant. So, not everything that goes on behind Google's curtain is fully understood, and that isn't necessarily a bad thing, but fortunately there is enough knowledge available to help give sites a gentle leg-up advantage over the competition who maybe care a little less about their ranking.

    Read the article

  • Data Source Security Part 1

    - by Steve Felts
    I’ve written a couple of articles on how to store data source security credentials using the Oracle wallet.  I plan to write a few articles on the various types of security available to WebLogic Server (WLS) data sources.  There are more options than you might think! There have been several enhancements in this area in WLS 10.3.6.  There are a couple of more enhancements planned for release WLS 12.1.2 that I will include here for completeness.  This isn’t intended as a teaser.  If you call your Oracle support person, you can get them now as minor patches to WLS 10.3.6.   The current security documentation is scattered in a few places, has a few incorrect statements, and is missing a few topics.  It also seems that the knowledge of how to apply some of these features isn’t written down.  The goal of these articles is to talk about WLS data source security in a unified way and to introduce some approaches to using the available features.  Introduction to WebLogic Data Source Security Options By default, you define a single database user and password for a data source.  You can store it in the data source descriptor or make use of the Oracle wallet.  This is a very simple and efficient approach to security.  All of the connections in the connection pool are owned by this user and there is no special processing when a connection is given out.  That is, it’s a homogeneous connection pool and any request can get any connection from a security perspective (there are other aspects like affinity).  Regardless of the end user of the application, all connections in the pool use the same security credentials to access the DBMS.   No additional information is needed when you get a connection because it’s all available from the data source descriptor (or wallet). java.sql.Connection conn =  mydatasource.getConnection(); Note: You can enter the password as a name-value pair in the Properties field (this not permitted for production environments) or you can enter it in the Password field of the data source descriptor. The value in the Password field overrides any password value defined in the Properties passed to the JDBC Driver when creating physical database connections. It is recommended that you use the Password attribute in place of the password property in the properties string because the Password value is encrypted in the configuration file (stored as the password-encrypted attribute in the jdbc-driver-params tag in the module file) and is hidden in the administration console.  The Properties and Password fields are located on the administration console Data Source creation wizard or Data Source Configuration tab. The JDBC API can also be used to programmatically specify a database user name and password as in the following.  java.sql.Connection conn = mydatasource.getConnection(“user”, “password”); According to the JDBC specification, it’s supposed to take a database user and associated password but different vendors implement this differently.  WLS, by default, treats this as an application server user and password.  The pair is authenticated to see if it’s a valid user and that user is used for WLS security permission checks.  By default, the user is then mapped to a database user and password using the data source credential mapper, so this API sort of follows the specification but database credentials are one-step removed from the application code.  More details and the rationale are described later. While the default approach is simple, it does mean that only one database user is doing all of the work.  You can’t figure out who actually did the update and you can’t restrict SQL operations by who is running the operation, at least at the database level.   Any type of per-user logic will need to be in the application code instead of having the database do it.  There are various WLS data source features that can be configured to provide some per-user information about the operations to the database. WebLogic Data Source Security Options This table describes the features available for WebLogic data sources to configure database security credentials and a brief description.  It also captures information about the compatibility of these features with one another. Feature Description Can be used with Can’t be used with User authentication (default) Default getConnection(user, password) behavior – validate the input and use the user/password in the descriptor. Set client identifier Proxy Session, Identity pooling, Use database credentials Use database credentials Instead of using the credential mapper, use the supplied user and password directly. Set client identifier, Proxy session, Identity pooling User authentication, Multi Data Source Set Client Identifier Set a client identifier property associated with the connection (Oracle and DB2 only). Everything Proxy Session Set a light-weight proxy user associated with the connection (Oracle-only). Set client identifier, Use database credentials Identity pooling, User authentication Identity pooling Heterogeneous pool of connections owned by specified users. Set client identifier, Use database credentials Proxy session, User authentication, Labeling, Multi-datasource, Active GridLink Note that all of these features are available with both XA and non-XA drivers. Currently, the Proxy Session and Use Database Credentials options are on the Oracle tab of the Data Source Configuration tab of the administration console (even though the Use Database Credentials feature is not just for Oracle databases – oops).  The rest of the features are on the Identity tab of the Data Source Configuration tab in the administration console (plan on seeing them all in one place in the future). The subsequent articles will describe these features in more detail.  Keep referring back to this table to see the big picture.

    Read the article

  • Expandable or Auto-Resize TextBox Height

    Recently, I was asked to prepare a Facebook like expandable textbox in a ASP.NET web application, where user can input text and the textbox can be re-sized (more specifically the height) dynamically. I searched for a while and found quite a lot of solutions that use jQuery (example). However, I was looking for something more intrinsic and simple, and finally I found another script on a forum that just use few lines of JavaScript codes: 1. Control declaration: <asp:TextBox ID="txtMsg"...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • How Do I Obtain an SEO Certificate Online?

    There are now many colleges online now offering certified training courses whereby one can now obtain a recognized SEO certificate. So if you are looking to jump start your career in the SEO industry you can do this from the comfort of your own home and at your own pace.

    Read the article

  • Auto Website SEO Analysis and Why You Shouldn't

    Every SEO Company out there seems to offer a "Free Website Analysis", normally performed by some auto program that automatically crawls your site and tells you what you are missing. The major problem with these auto programs lies with the business of Search.

    Read the article

  • A Few SEO Tips to Get Your Business Going

    Before I tell you various SEO tips that can take your online business to heights, let me first explain you what is SEO and how is using SEO tips beneficial for your online business. SEO stands for Search Engine Optimization and it is a process for improving the rating, volume and quality of web traffic for your web site or a web page in various popular search engines using paid or un-paid techniques. There would be no online business owner that would not want to have more and more traffic to his/her website.

    Read the article

  • Top 10 SEO Lies

    There is a lot of white noise out there about SEO tactics. Sometimes it's hard to keep up with and we fall behind using out dated methods to optimize our websites. Here are the top 10 SEO lies so that you don't make that same mistake.

    Read the article

  • Yellow Pages Script Perfectly Organizes Info of Businesses

    Yellow pages are also called internal yellow pages for online businesses. In the past, people only had yellow colored directory books but with the passage of time and advancements came into internet world, these directories had been started displaying on internet for people's ease and comfort.

    Read the article

  • How Search Engines Work

    The knowing about how the different search engines are working is necessary for your SEO efforts, weather you do it your self or hire a SEO consultant to it. You should know how the search engines find WebPages, and their well known criteria for determining the ranking that will be displayed in the search results screen.

    Read the article

  • SEO Tips - Avoiding 3 Common Mistakes

    Some of the most effective SEO tips are also some of the easiest to implement and are often overlooked. An effectively optimized site can increase the amount of free and targeted search engine traffic you receive. Read on to see 3 search engine optimization tips that are easy to follow and will result in more free traffic to your site.

    Read the article

  • High ROI Through Search Engine Optimization

    In online marketing, it is important to provide marketer with efficient or high Return of Investment (ROI) in order for them to build trust to the web site, where they are posting their products. But how can this be possible? ROI is a percentage figure which tells you how much your investment would be to have your products created, advertised, sold, and delivered.

    Read the article

  • Visual Studio 2010 RC and Entity Framework 4 RC Support in the New Version of ADO.NET Data Providers

    Devart has recently announced the release of dotConnect products for Oracle, MySQL, PostgreSQL, and SQLite - ADO.NET providers that offer Entity Framework support, LINQ to SQL support, and contain an ORM model designer for developing LINQ to SQL and EF models based on different database engines. New dotConnect ADO.NET providers offer complete support for Visual Studio 2010 Release Candidate and Entity Framework 4 Release Candidate. Entity Developer 2.80, a designer for modeling and code generation...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

< Previous Page | 116 117 118 119 120 121 122 123 124 125 126 127  | Next Page >