Search Results

Search found 12950 results on 518 pages for 'field activities'.

Page 159/518 | < Previous Page | 155 156 157 158 159 160 161 162 163 164 165 166  | Next Page >

  • Google analytics/adwords account and leaking of private data

    - by Satellite
    I am frequently asked to log into clients google analytics and adwords accounts. If I forget to log out before visiting other google properties (google search, youtube etc), this leaves tracks of my views/searches etc, exposing my activities to the client. Summary: Client gives me access to their Google Analytics / AdWords account I log into clients Analytics account and do some stuff Then in another tab I perform some related google searches to solve some related issues Issues solved, I then close the Analytics tab I then visit google.com, perform some unrelated searches I then visit YouTube, view some unrelated videos All Web and YouTube searches are recorded in clients google account, thus leaking potentially sensitive data Even assuming that I remember to log out correctly at step 4 (as I do 95% of the time), anything I do at step 3 is exposed to the client. I would be surprised if this is not a very common issue. I'm looking for a technical solution to ensure that this can never happen. Any ideas?

    Read the article

  • What spins your disks?

    - by fatherjack
    LiveJournal Tags: TSQL,How To,Tips and Tricks,DMV,File Usage I'm not asking what makes you mad - that's what grinds your gears; I am asking what activities on your servers make your hard drive spindles get spinning. Do you know which files are the busiest on your SQL Server? Are some databases burning a hole in your platters? Is the TempDB data file busier than your Distribution database, or does one of your CRM partitions trump them both? With a little bit of careful consideration you can...(read more)

    Read the article

  • OIM 11g - Multi Valued attribute reconciliation of a child form

    - by user604275
    This topic gives a brief description on how we can do reconciliation of a child form attribute which is also multi valued from a flat file . The format of the flat file is (an example): ManagementDomain1|Entitlement1|DIRECTORY SERVER,EMAIL ManagementDomain2|Entitlement2|EMAIL PROVIDER INSTANCE - UMS,EMAIL VERIFICATION In OIM there will be a parent form for fields Management domain and Entitlement.Reconciliation will assign Servers ( which are multi valued) to corresponding Management  Domain and Entitlement .In the flat file , multi valued fields are seperated by comma(,). In the design console, Create a form with 'Server Name' as a field and make it a child form . Open the corresponding Resource Object and add this field for reconcilitaion.While adding , choose 'Multivalued' check box. (please find attached screen shot on how to add it , Child Table.docx) Open process definiton and add child form fields for recociliation. Please click on the 'Create Reconcilitaion Profile' buttton on the resource object tab. The API methods used for child form reconciliation are : 1.           reconEventKey =   reconOpsIntf.createReconciliationEvent(resObjName, reconData,                                                            false); ·                                    ‘False’  here tells that we are creating the recon for a child table . 2.               2.       reconOpsIntf.providingAllMultiAttributeData(reconEventKey, RECON_FIELD_IN_RO, true);                RECON_FIELD_IN_RO is the field that we added in the Resource Object while adding for reconciliation, please refer the screen shot) 3.    reconOpsIntf.addDirectBulkMultiAttributeData(reconEventKey,RECON_FIELD_IN_RO, bulkChildDataMapList);                 bulkChildDataMapList  is coded as below :                 List<Map> bulkChildDataMapList = new ArrayList<Map>();                   for (int i = 0; i < stokens.length; i++) {                            Map<String, String> attributeMap = new HashMap<String, String>();                           String serverName = stokens[i].toUpperCase();                           attributeMap.put("Server Name", stokens[i]);                           bulkChildDataMapList.add(attributeMap);                         } 4                  4.       reconOpsIntf.finishReconciliationEvent(reconEventKey); 5.       reconOpsIntf.processReconciliationEvent(reconEventKey); Now, we have to register the plug-in, import metadata into MDS and then create a scheduled job to execute which will run the reconciliation.

    Read the article

  • ISO 12207: SQA as a supporting process?

    - by user970696
    I have been following ISO12207 for the sake of my thesis dealing with software quality. Now I should explain quality assurance and here comes the problem: according to this norm, QA is a supporting process, separated but on the same level with verification, validation and auditing processes. According to other sources, Quality Assurance is basically high level activity making sure that standards, norms etc. are being followed. Usually the part of Quality Assurance is the Quality Control (testing, reviewing, inspections also V&V) which measures the quality and provides QA with this information so it can be acted upon. I somehow do not understand how QA is thought to be according to this ISO and what activities should it perform. Also it does not mention QC except for a footnote.

    Read the article

  • Styling ASP.NET MVC Error Messages

    - by MightyZot
    Originally posted on: http://geekswithblogs.net/MightyZot/archive/2013/11/11/styling-asp.net-mvc-error-messages.aspxOff the cuff, it may look like you’re stuck with the presentation of your error messages (model errors) in ASP.NET MVC. That’s not the case, though. You actually have quite a number of options with regard to styling those boogers. Like many of the helpers in MVC, the Html.ValidationMessageFor helper has multiple prototypes. One of those prototypes lets you pass a dictionary, or anonymous object, representing attribute values for the resulting markup. @Html.ValidationMessageFor( m => Model.Whatever, null, new { @class = “my-error” }) By passing the htmlAttributes parameter, which is the last parameter in the call to the prototype of Html.ValidationMessageFor shown above, I can style the resulting markup by associating styles to the my-error css class.  When you run your MVC project and view the source, you’ll notice that MVC adds the class field-validation-valid or field-validation-error to a span created by the helper. You could actually just style those classes instead of adding your own…it’s really up to you. Now, what if you wanted to move that error message around? Maybe you want to put that error message in a box or a callout. How do you do that? When I first started using MVC, it didn’t occur to me that the Html.ValidationMessageFor helper just spits out a little bit of markup. I wanted to put the error messages in boxes with white backgrounds, our site originally had a black background, and show a little nib on the side to make them look like callouts or conversation bubbles. Not realizing how much freedom there is in the styling and markup, and after reading someone else’s post, I created my own version of the ValidationMessageFor helper that took out the span and replaced it with divs. I styled the divs to produce the effect of a popup box and had a lot of trouble with sizing and such. That’s a really silly and unnecessary way to solve this problem. If you want to move your error messages around, all you have to do is move the helper. MVC doesn’t appear to care where you put it, which makes total sense when you think about it. Html.ValidationMessageFor is just spitting out a little markup using a little bit of reflection on the name you’re passing it. All you’ve got to do to style it the way you want it is to put it in whatever markup you desire. Take a look at this, for example… <div class=”my-anchor”>@Html.ValidationMessageFor( m => Model.Whatever )</div> @Html.TextBoxFor(m => Model.Whatever) Now, given that bit of HTML, consider the following CSS… <style> .my-anchor { position:relative; } .field-validation-error {    background-color:white;    border-radius:4px;    border: solid 1px #333;    display: block;    position: absolute;    top:0; right:0; left:0;    text-align:right; } </style> The my-anchor class establishes an anchor for the absolutely positioned error message. Now you can move the error message wherever you want it relative to the anchor. Using css3, there are some other tricks. For example, you can use the :not(:empty) selector to select the span and apply styles based upon whether or not the span has text in it. Keep it simple, though. Moving your elements around using absolute positioning may cause you issues on devices with screens smaller than your standard laptop or PC. While looking for something else recently, I saw someone asking how to style the output for Html.ValidationSummary.  Html.ValidationSummery is the helper that will spit out a list of property errors, general model errors, or both. Html.ValidationSummary spits out fairly simple markup as well, so you can use the techniques described above with it also. The resulting markup is a <ul><li></li></ul> unordered list of error messages that carries the class validation-summary-errors In the forum question, the user was asking how to hide the error summary when there are no errors. Their errors were in a red box and they didn’t want to show an empty red box when there aren’t any errors. Obviously, you can use the css3 selectors to apply different styles to the list when it’s empty and when it’s not empty; however, that’s not support in all browsers. Well, it just so happens that the unordered list carries the style validation-summary-valid when the list is empty. While the div rendered by the Html.ValidationSummary helper renders a visible div, containing one invisible listitem, you can always just style the whole div with “display:none” when the validation-summary-valid class is applied and make it visible when the validation-summary-errors class is applied. Or, if you don’t like that solution, which I like quite well, you can also check the model state for errors with something like this… int errors = ViewData.ModelState.Sum(ms => ms.Value.Errors.Count); That’ll give you a count of the errors that have been added to ModelState. You can check that and conditionally include markup in your page if you want to. The choice is yours. Obviously, doing most everything you can with styles increases the flexibility of the presentation of your solution, so I recommend going that route when you can. That picture of the fat guy jumping has nothing to do with the article. That’s just a picture of me on the roof and I thought it was funny. Doesn’t every post need a picture?

    Read the article

  • Quality Assurance tools discrepancies

    - by Roudak
    It is a bit ironic, yesterday I answered a question related to this topic that was marked to be good and today I'm the one who asks. These are my thoughts and a question: Also let's agree on the terms: QA is a set of activities that defines and implements processes during SW development. The common tool is the process audit. However, my colleague at work agrees with the opinion that reviews and inspections are also quality assurance tools, although most sources classify them as quality control. I would say both sides are partially right: during inspections, we evaluate a physical product (clearly QC) but we see it as a white box so we can check its compliance with set processes (QA). Do you think it is the reason of the dichotomy among the authors? I know it is more like an academic question but it deserves the answer :)

    Read the article

  • ArchBeat Link-o-Rama for November 7, 2012

    - by Bob Rhubart
    Updated Business Activity Monitoring (BAM) Class | @OracleSOA Oracle SOA Team blogger Gary Barg has news for those interested in a skills upgrade. This updated Oracle University course "explains how to use Oracle BAM to monitor enterprise business activities across an enterprise in real time. You can measure your key performance indicators (KPIs), determine whether you are meeting service-level agreements (SLAs), and take corrective action in real time." Oracle Solaris 11.1 update focuses on database integration, cloud | @markfontecchio TechTarget editor Mark Fontecchio reports on the recent Oracle Solaris 11.1 release, with comments from IDC's Al Gillen. Thought for the Day "Why is composing symphonies tough? I don't know. It's just very few people in the world can do it well. And I think that's the case with upfront design. It is very hard to do well." — Martin Fowler Source: SoftwareQuotes.com

    Read the article

  • What are the benefits of Android way of "saving memory" - explicitly passing Context objects everywhere?

    - by Sarge Borsch
    Turned out, this question is not easy to formulate for me, but let's try. In Android, pretty much any UI object depends on a Context, and has defined lifetime. It also can destroy and recreate UI objects and even whole application process at any time, and so on. This makes coding asynchronous operations correctly not straightforward. (and sometimes very cumbersome) But I never have seen a real explanation, why it's done that way? There are other OSes, including mobile OSes (iOS, for example), that don't do such things. So, what are the wins of Android way (Activities & Contexts)? Does that allow Android applications to use much less RAM, or maybe there are other benefits?

    Read the article

  • Data Source Security Part 1

    - by Steve Felts
    I’ve written a couple of articles on how to store data source security credentials using the Oracle wallet.  I plan to write a few articles on the various types of security available to WebLogic Server (WLS) data sources.  There are more options than you might think! There have been several enhancements in this area in WLS 10.3.6.  There are a couple of more enhancements planned for release WLS 12.1.2 that I will include here for completeness.  This isn’t intended as a teaser.  If you call your Oracle support person, you can get them now as minor patches to WLS 10.3.6.   The current security documentation is scattered in a few places, has a few incorrect statements, and is missing a few topics.  It also seems that the knowledge of how to apply some of these features isn’t written down.  The goal of these articles is to talk about WLS data source security in a unified way and to introduce some approaches to using the available features.  Introduction to WebLogic Data Source Security Options By default, you define a single database user and password for a data source.  You can store it in the data source descriptor or make use of the Oracle wallet.  This is a very simple and efficient approach to security.  All of the connections in the connection pool are owned by this user and there is no special processing when a connection is given out.  That is, it’s a homogeneous connection pool and any request can get any connection from a security perspective (there are other aspects like affinity).  Regardless of the end user of the application, all connections in the pool use the same security credentials to access the DBMS.   No additional information is needed when you get a connection because it’s all available from the data source descriptor (or wallet). java.sql.Connection conn =  mydatasource.getConnection(); Note: You can enter the password as a name-value pair in the Properties field (this not permitted for production environments) or you can enter it in the Password field of the data source descriptor. The value in the Password field overrides any password value defined in the Properties passed to the JDBC Driver when creating physical database connections. It is recommended that you use the Password attribute in place of the password property in the properties string because the Password value is encrypted in the configuration file (stored as the password-encrypted attribute in the jdbc-driver-params tag in the module file) and is hidden in the administration console.  The Properties and Password fields are located on the administration console Data Source creation wizard or Data Source Configuration tab. The JDBC API can also be used to programmatically specify a database user name and password as in the following.  java.sql.Connection conn = mydatasource.getConnection(“user”, “password”); According to the JDBC specification, it’s supposed to take a database user and associated password but different vendors implement this differently.  WLS, by default, treats this as an application server user and password.  The pair is authenticated to see if it’s a valid user and that user is used for WLS security permission checks.  By default, the user is then mapped to a database user and password using the data source credential mapper, so this API sort of follows the specification but database credentials are one-step removed from the application code.  More details and the rationale are described later. While the default approach is simple, it does mean that only one database user is doing all of the work.  You can’t figure out who actually did the update and you can’t restrict SQL operations by who is running the operation, at least at the database level.   Any type of per-user logic will need to be in the application code instead of having the database do it.  There are various WLS data source features that can be configured to provide some per-user information about the operations to the database. WebLogic Data Source Security Options This table describes the features available for WebLogic data sources to configure database security credentials and a brief description.  It also captures information about the compatibility of these features with one another. Feature Description Can be used with Can’t be used with User authentication (default) Default getConnection(user, password) behavior – validate the input and use the user/password in the descriptor. Set client identifier Proxy Session, Identity pooling, Use database credentials Use database credentials Instead of using the credential mapper, use the supplied user and password directly. Set client identifier, Proxy session, Identity pooling User authentication, Multi Data Source Set Client Identifier Set a client identifier property associated with the connection (Oracle and DB2 only). Everything Proxy Session Set a light-weight proxy user associated with the connection (Oracle-only). Set client identifier, Use database credentials Identity pooling, User authentication Identity pooling Heterogeneous pool of connections owned by specified users. Set client identifier, Use database credentials Proxy session, User authentication, Labeling, Multi-datasource, Active GridLink Note that all of these features are available with both XA and non-XA drivers. Currently, the Proxy Session and Use Database Credentials options are on the Oracle tab of the Data Source Configuration tab of the administration console (even though the Use Database Credentials feature is not just for Oracle databases – oops).  The rest of the features are on the Identity tab of the Data Source Configuration tab in the administration console (plan on seeing them all in one place in the future). The subsequent articles will describe these features in more detail.  Keep referring back to this table to see the big picture.

    Read the article

  • Is there an easy way to (temporarily) disable the display timeout?

    - by Izzy
    In KDE 3.5 there was the powermanager plugin for the kicker panel, where one could easily switch between different profiles. So normally, I want the display to go to sleep after, say, 10 minutes of user inactivity. But when I watch a video, this should not happen. I know I could go via the KDE launcher, settings, powermanager, and change the setting. But this is too complicated for daily use. I also know there are those activities. But I don't want to change background etc., just the display timeout. Furthermore, when I tried this, many of the open apps simply crashed and got restarted. I simply don't like this approach. Preferably, it would be something to plug-in to the panel, which opens a menu to select the profile -- as it was with KDE 3.5. Is there a similar solution I missed?

    Read the article

  • London Nov-8: Desktop Virtualisation Seminar

    - by mprove
    >> Simplify Application and Data Access with Oracle Desktop VirtualisationMany companies claim they’ll handle your application access needs, and yet only Oracle can provide you with every component needed for secure and reliable access to Oracle Applications and other enterprise software from a variety of devices. This means you can design your deployment knowing that all of the pieces work together, from applications and virtualisation to servers and storage systems.Join us to learn how Oracle desktop virtualisation helps you get the most from your valuable IT resources. Topics we’ll cover and demonstrate in this productive half-day event include: How to provide secure access to applications and data from nearly anywhere on a wide range of devices Use cases for desktop virtualisation How desktop virtualisation can support a wider business transformation agenda Reasons to embrace employees using their own devices for work-related activities How virtualisation can extend the life of your PCs and other devices How desktop virtualisation can decrease your carbon footprint and IT costs << Register here for the free event

    Read the article

  • How difficult it is to develope Apps for Android and iOS? [on hold]

    - by netsetter
    I'm an experienced web developer in PHP, HTML, Javascript, MySQL, CSS and I'm running communities where people can register to be able to login and do some stuff. Now more and more people are requestion an App, I told them that I have no time and experience to develope Apps with many functions for such complex communities I am running, but then the users told me what would be enough for them and this sounds already simpler to me: An app to install on Android / iOS just to be able to login (+ autologin), so they appear always online in the community when they have internet connection. Then only 1 function like a counter of new activities regarding their user account (new messages, new replies, etc..), and if they click on the app then a browser window will open to read the info at the main website. So, what you think, it will be a big thing to develope such an app for the members? Is there a big diffrence between developing for Android and iOS? How to test the App if you don't have an Android or iOS phone in example?

    Read the article

  • GNOME 3.8 stutters / lags

    - by Robin
    I recently installed Fedora 19 beta and noticed unusually laggy behaviour of GNOME Shell (3.8) on the Nouveau driver on a nVidia 9200GS (also with nVidia driver) So I thought this could be related to Fedora so I installed Ubuntu 13.04 which comes with GNOME 3.6. Everything was buttery smooth as it has always been, but once I upgraded GNOME to 3.8, I experience the same laggy performance on Ubuntu as well. I'm talking about the animations, such as the window overview in activities, openSUSE live image with 3.6 = smooth Ubuntu 13.04 live image with 3.6 = smooth Ubuntu 13.04 install with 3.6 = smooth Ubuntu 13.04 install with 3.8 = laggy Fedora live image with 3.8 = laggy Fedora install with 3.8 = laggy Does anyone have a clue what could be going on?

    Read the article

  • How activity id affects calculations such as schedule % complete when using a baseline?

    - by Jeffrey McDaniel
    Fields such as schedule % complete, planned value costs, etc. that use a baseline to help determine the value depend on the activity id's to match between the baseline project and the current project. If the activity id is changed the link is broken. In the P6 power client there is an internal guid that allows you to change the activity id in either the baseline or current project and still have these values related. In the P6 Reporting Database the activity id is used as the joining characteristic between which activities are a match between a baseline project and a current project.

    Read the article

  • Online Learning Library free BPM training for everybody partners, customers and freelancer!

    - by JuergenKress
    BPM Product Library - Special Topics Tab A portal to free resources to help you learn about Oracle BPM Employee Onboarding Process Accelerator Demo All organizations hire new employees, and helping new hires become productive immediately is important for the organization’s ROI and for the individual’s motivation as well. To do that, an organization needs to have a process in place to help determine what services the new hire needs, and to track that all of the activities needed to prepare for the new hire are performed on time. This video demonstrates how the Oracle BPM Employee Onboarding Process Accelerator helps ensure that new hires hit the ground running from their first day on the job SOA & BPM Partner Community For regular information on Oracle SOA Suite become a member in the SOA & BPM Partner Community for registration please visit www.oracle.com/goto/emea/soa (OPN account required) If you need support with your account please contact the Oracle Partner Business Center. Blog Twitter LinkedIn Facebook Wiki Technorati Tags: BPM training,BPM education,process accelerator,SOA Community,Oracle SOA,Oracle BPM,Community,OPN,Jürgen Kress

    Read the article

  • Why does Files (Nautilus) stopped updating partition's bookmarks?

    - by YuriC
    I've upgraded from 13.04 to 13.10 and noticed that Files (Nautilus) stopped updating my bookmarks that are located in another partition (an ext4 one). It used to work before. Testing, I've found out that, if I add any new bookmark (using CTRL + D, for example), Files then adds this new one and updates all bookmarks, showing that ones that point to my partition. I conclude that the feature (updating bookmarks) works, but it's not being executed when I mount my partition clicking on it. Any hints on how to solve this? Bookmarks really speed up everyday activities.

    Read the article

  • APress deal of the day 13/Sep/2012 - Beginning C# Object-Oriented Programming

    - by TATWORTH
    Today's $10 deal of the day from APress at http://www.apress.com/9781430235309 is Beginning C# Object-Oriented Programming"Beginning C# Object-Oriented Programming brings you into the modern world of development, as you master the fundamentals of programming with C# and learn to develop efficient, reusable, elegant code through the object-oriented programming (OOP) methodology."  Here is a summary of my earlier review:This is a good book to learn C# by doing something practical. The book provides an excellent series of hands-on activities.So should you get a copy for your trainee C# programmers? Yes!Do I recommend it for people learning C# 2010 on their own? Yes!Those of you who have written to me for training in C# (assuming the messages were not from BOTS!), should you buy this book - YES!

    Read the article

  • EBS Applications Technology Group (ATG) Advisor Webcast December 2012

    - by LuciaC
    Invitation : Advisor Webcast December 2012 In December 2012 we have scheduled an Advisor Webcast, where we want to give you a closer look into the invalid objects in an E-Business Suite Environment. E-Business Suite - Troubleshooting invalid objectsAgenda : Introduction Activities that generate invalid objects EBS Architecture EBS Patching Concepts Troubleshooting Invalid Objects References EMEA Session : Tuesday December 11th, 2012 at 09:00 AM UK / 10:00 AM CET / 13:30 India / 17:00 Japan / 18:00 Australia Details & Registration : Doc ID 1501696.1Direct link to register in WebExUS Session : Wednesday December 12th, 2012 at 18:00 UK / 19:00 CET / 10:00 AM Pacific / 11:00 AM Mountain/ 01:00 PM Eastern Details & Registration : Doc ID 1501697.1Direct link to register in WebExIf you have any question about the schedules or if you have a suggestion for an Advisor Webcast to be planned in future, please send an E-Mail to Ruediger Ziegler.

    Read the article

  • Consulting Expertise

    - by Oracle OpenWorld Blog Team
    Consult with the Experts Onsite at Oracle OpenWorld by Karen Shamban Learn from Oracle Consulting experts how to maximize the value of your Oracle investments by attending one or more Oracle Consulting sessions. Topics include cloud architecture and implementations, Engineered Systems best practices, Oracle Fusion Applications migrations, and more. Or, stop by the Oracle Consulting Center or the Demo Stations in the Exhibition Halls to ask specific questions and get additional information. Are you an IT executive or enterprise architect?  Register for the information-packed Enterprise Architecture Summit on Wednesday, October 12. To see the full range of Oracle Consulting activities at Oracle OpenWorld, click here.

    Read the article

  • Oracle Partner Specialists – Sell & Deliver High Value Products to Customers

    - by Richard Lefebvre
    Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 Do you want to know where to find useful information about partner training and other activities to complete Oracle Specialization available in the country you are personally based? Go to the EMEA partner enablement blog and read latest information regarding training opportunities ready to join for Cloud Services, Applications, Business Intelligence, Middleware, Database 12c, Engineered System as well as Server & Storage. Recently, we announced new TestFest events in France, which you can join to pass your own Implementation Assessment within the Specialization category you have already chosen. To find out where and when the next TestFest close to your location will take place, please contact [email protected] or watch out for further announcements of TestFest events in your home country. Turnback to the EMEA Partner Enablement Blog from time to time to update your own Specialization and join the latest training for Sales, Presales or Implementation Specialists:  https://blogs.oracle.com/opnenablement/

    Read the article

  • Is there an application or method to log of data transfers?

    - by Gaurav_Java
    My friend asked me for some files that I let him take from my system. I did not see he doing that. Then I was left with a doubt: what extra files or data did he take from my system? I was thinking is here any application or method which shows what data is copied to which USB (if name available then shows name or otherwise device id) and what data is being copied to Ubuntu machine . It is some like history of USB and System data. I think this feature exists in KDE This will really useful in may ways. It provides real time and monitoring utility to monitor USB mass storage devices activities on any machine.

    Read the article

  • Register Today for the Oracle Value Chain Summit 2013

    - by Pam Petropoulos
    Date: February 4 – 6, 2013 Location: Hyatt Regency San Francisco The Oracle Value Chain Summit will bring together users, partners, and luminaries to learn how Oracle is helping companies transform supply chains into value chains to gain competitive edge. This Summit will combine the intimate atmosphere of previous supply chain  events, such as the Oracle PLM and Oracle Maintenance Summits, under one roof and will include almost 200 sessions across all supply chain management solution areas. Oracle’s AutoVue enterprise visualization solutions will be featured as part of the PLM track, where they’ll be showcased within the context of Agile PLM, as well as Oracle’s next generation visualization solutions.   Don’t miss this opportunity to learn more about visualization successes and best practices through sessions featuring customer testimonials, solution demonstrations, and networking activities. Visit the event site for further details and agenda information. An early bird registration fee of $195 is available until December 31, 2012. Click here to register today!

    Read the article

  • I finished "Beginning Android Games", should I use its framework?

    - by orod
    I've worked through Mario Zechner's "Beginning Android Games" and have made my own pong and asteroids game using the framework used in the book. I have also downloaded the source code for Replica Island and am able to run that. I like Replica Island's framework over the one I made from reading the book. Some differences are that Replica Island uses different activities for each screen instead of Zechner's Screen class and that Replica Island can use a lot of textures and isn't limited to textures with dimensions of powers of 2. If I'm serious about writing games and apps for Android should I learn Replica Island's framework and use that instead of the one I made while reading Zechner's book?

    Read the article

  • Log of data transfer and copied from Ubuntu

    - by Gaurav_Java
    Yesterday my friend ask me for some files i told him that take it from my system i don't see . what extra files or data he take from my system . I was thinking is here any application or method which shows what data is copied to which USB (if name available then shows name or otherwise device id ). and what data is beign copied to ubuntu machine . It is some like history of USB and System data . i think this feature is in KDE this will really useful in may ways. it provides real time and monitoring utility to monitor USB mass storage devices activities on any machine .

    Read the article

  • Exadata, Exalogic and Exalytics Partner Demo Equipment Purchase Initiative

    - by Cinzia Mascanzoni
    Oracle is pleased to announce that as part of the Demo Equipment Purchase Program, until December 31, 2012, Oracle VADs may purchase Exadata, Exalogic and Exalytics configurations, for their own demonstration purposes or to distribute to a partner for the partner's demonstration use, at 25% off the list price. In addition, purchasing partners will be eligible to receive 10% of list price (excluding support) in MDF funds to support the partner's Exadata/Exalogic/Exalytics demand generation activities. New units must be used for demo purposes for a minimum of 6 months before they may be resold to an end user. For more info, visit the VAD Resource center here.

    Read the article

< Previous Page | 155 156 157 158 159 160 161 162 163 164 165 166  | Next Page >