Search Results

Search found 2016 results on 81 pages for 'matt grande'.

Page 16/81 | < Previous Page | 12 13 14 15 16 17 18 19 20 21 22 23  | Next Page >

  • Whats steps can I suggest to achieve the best Geolocation Result [migrated]

    - by Matt
    We are using Geolocation (getCurrentPosition()) in a website to determine a users position when using our site from a mobile device. I want to write an article explaining how the user can obtain the best results. Am I correct in assuming: Enabling GPS will yield the best result when in rural areas (less buildings to obscure line of sight to the satelites) Enabling Wi-Fi will yield the best results when in urban areas (generally more Wi-Fi hotspots available) Is it true that Android phones have better results from silently harvesting Wi-Fi hotspot details? Any links to reference material on this are appreciated

    Read the article

  • Mozilla Persona to the login rescue?

    - by Matt Watson
    A lot of website now allow us to login or create accounts via OAuth or OpenID. We can use our Facebook, Twitter, Google, Windows Live account and others. The problem with a lot of these is we have to have allow the websites to then have access to our account and profile data that they shouldn't really have. Below is a Twitter authorization screen for example when signing in via Technorati. Now Technorati can follow new people, update my profile and post tweets? All I wanted to do was login to Technorati.com to comment on a post!Mozilla has just released their new solution for this called Persona. First thought is oh great another solution! But they are actually providing something a little different and better. It is based on an email address and isn't linked to anything like our personal social networks or their information. Persona only exists to help with logging in to websites. No loose strings attached.Persona is based on a new standard called BrowserID and you can read more about it here:How BrowserID Works.  The goal is to integrate BrowserID in to the browser at a deeper level so no password entry is required at all. You can tell your web browser to just auto sign in for you. I am really hoping this takes off and will look at implementing it in current projects! I would recommend researching it and lets hope it or something like it becomes a wide spread reality in the future.

    Read the article

  • Do we ethically have the right to use the MAC Address for verification purposes?

    - by Matt Ridge
    I am writing a program, or starting at the very beginning of it, and I am thinking of purchase verification systems as a final step. I will be catering to Macs, PCs, and possibly Linux if all is said and done. I will also be programming this for smartphones as well using C++ and Objective-C. (I am writing a blueprint before going head first into it) That being said, I am not asking for help on doing it yet, but what I’m looking for is a realistic measurement for what could be expected as a viable and ethical option for purchase verification systems. Apple through the Apple Store, and some other stores out there have their own "You bought it" check. I am looking to use a three prong verification system. Email/password 16 to 32 character serial number using alpha/numeric and symbols with Upper and lowercase variants. MAC Address. The first two are in my mind ok, but I have to ask on an ethical standpoint, is a MAC Address to lock the software to said hardware unethical, or is it smart? I understand if an Ethernet card changes if not part of the logic board, or if the logic board changes so does the MAC address, so if that changes it will have to be re-verified, but I have to ask with how everything is today... Is it ethical to actually use the MAC address as a validation key or no? Should I be forward with this kind of verification system or should I keep it hidden as a secret? Yes I know hackers and others will find ways of knowing what I am doing, but in reality this is why I am asking. I know no verification is foolproof, but making it so that its harder to break is something I've always been interested in, and learning how to program is bringing up these questions, because I don't want to assume one thing and find out it's not really accepted in the programming world as a "you shouldn't do that" maneuver... Thanks in advance... I know this is my first programming question, but I am just learning how to program, and I am just making sure I'm not breaking some ethical programmer credo I shouldn't...

    Read the article

  • Peut-on vraiment lutter contre les botnets ? Le plus grand réseau de malwares démantelé recommence à

    Mise à jour du 12/03/10 Peut-on vraiment lutter contre les botnets ? Le plus grand réseau de malwares démantelé recommence à sévir en 48 heures La victoire de Microsoft contre le réseau Waldec pourrait n'être qu'une goutte d'eau dans l'océan (lire ci-avant). Certes, le dépôt d'une plainte avait effectivement permis d'utiliser des moyens légaux - une nouveauté à grande échelle - pour déconnecter un centre de commande du botnet Zeus et mettre hors service 277 n...

    Read the article

  • When booting from grub2 menu, why does only the Primary OS that installed the boot loader get the nice splash?

    - by Matt
    It isn't a real problem, but if there is a way to fix it, I would like to. I have several Ubuntu installations on one computer, but on boot and shutdown, only the primary installation that grub was installed to the MBR from has a nice resolution and boot splash. All the other installations boot splash's are a blinking cursor on a black screen, and the resolution is ugly, on boot as well as shutdown. Why is this? and Can I make it so that my Ubuntu 12.04 have a nice boot again, like my 12.10 now does (because its grub wrote over MBR)?

    Read the article

  • My work isn't being used... what can/ should I do?

    - by Matt
    Several months ago I was approached by a small business, who had seen my work previously and asked me to create a website for them. Since then, the website hasn't changed one bit and I haven't heard a word from them. This sucks for them as they paid for a website and haven't used it. It''s frustrating for me because I spent a huge amount of time on the website and feel that all of that effort has been wasted, furthermore, I don't feel I can use the website on my portfolio/ CV. I was thinking of offering to go round to their office for one day, and update the website for them then and there; but I'd need their support whilst there (to get the content for the about page, to get information for on their products etc.) and I don't want to disrupt their work day, nor do I want to sit there like a spare tyre and get nowhere. Furthermore, if I were to do this, should I expect to receive money for it? It's a day of my life, but I'm doing it for my benefit rather than theirs (but they benefit as well). Has anyone else had experience of a client not using their product; how did you handle it? Additional background for those who want it: The company is a local travel agent, and the website lets them CRUD offers and locations, and has several other static pages (about, contact, etc.) At the time of creating the website, I filled the static pages with lipsum, and the offers and locations with fake information, so that I could give the business an idea about what the final pages would look like; during the hand over, I guided them through the CRUD forms (they made notes) and said if they sent me the text for the pages, I'd update it.

    Read the article

  • Why am I having so many problems installing Ubuntu 13.10 alongside Vista?

    - by Matt Gazaway
    I am trying to setup my laptop to dual boot Ubuntu 13.10 and Windows Vista. I get as far as the drive table and it either freezes up or I get an error saying "unable to satisfy partition parameters" or something very similar. Now I just have a black screen with alternating indications that a request for cache data failed and something to do with a "write through". Any ideas on what I might be doing wrong?

    Read the article

  • Emploi : l'automatisation grandissante des datacenters modifie les embauches dans ce secteur, quel a

    Emploi : l'automatisation grandissante des datacenters modifie les embauches dans ce secteur, exemple avec la restructuration d'HP Hewlett-Packard a annoncé la semaine dernière un plan de restructuration qui prévoit la suppression de 9000 postes (majoritairement des postes d'administrateurs systèmes selon les prévisions de Forrester Research), mais qui projette en contrepartie d'en recruter 6000 autres (vraisemblablement en architecture IT et en ingénierie commerciale). HP explique par exemple que sa restructuration intègre la consolidation des datacenters et la gestion des plateformes, pour une plus grande automatisation de la délivrance d'applications pour les clients : « Nous pensons aux cinq et dix prochaines années qui nous am...

    Read the article

  • Is it too late to start your career as a programmer at the age of 30 ?

    - by Matt
    Assuming one graduated college at 30 years old and has 5 years of experience (no real job experience, just contributing to open source and doing personal projects) with various tools and programming languages, how would he or she be looked upon by hiring managers ? Will it be harder to find a job considering that (I got this information looking at various websites, user profiles on SO and here, etc.) the average person gets hired in this field at around 20 years old. I know that it's never too late to do what you're passionate about and the like but sometimes it is too late to start a career. Is this the case? Managers are always looking for fresh people and I often read job descriptions specifically asking for young people. I don't need answers of encouragement, I know the community here is great and I wouldn't get offended by even the most cold answers. Please don't close this as being too localized, I'm not referring to any specific country or region, talk about the region you're in. I would also appreciate if you justified your answer.

    Read the article

  • La NSA intercepte des millions d'images par jour, la reconnaissance faciale élément clé des programmes d'espionnage de l'agence

    La NSA intercepte des millions d'images par jour la reconnaissance faciale élément clé des programmes d'espionnage de l'agenceLes documents top secret divulgués par Edward Snowden n'en finissent pas de révéler des informations sur les programmes d'espionnage à grande échelle de la NSA.De nouveaux documents analysés par le quotidien américain « The New York Times » affirment que l'agence de sécurité américaine recueille des millions d'images sur le Web chaque jour, dans le cadre de son programme...

    Read the article

  • Windows 8.1 : le SDK et un guide de migration pour les applications Windows 8 également disponibles en téléchargement

    Windows 8.1 : un nouveau SDK et un guide de migration pour les applications Windows 8 Disponibles en téléchargementPromesse tenue. Microsoft a dévoilé hier soir la première pré-version de Windows 8.1 (alias « Blue »), la mise à jour très attendue de Windows 8 qui sera officiellement disponible gratuitement pour les utilisateurs de Windows 8 « un peu plus tard dans l'année ».Un premier tour d'horizon de l'OS montre quelques nouveautés cosmétiques, comme deux nouvelles tailles de tuiles dans l'interface Metro la Modern UI. La taille « très grande » permet d'afficher plus d'informations sans avoir à ouvrir l'application (météo du jour mais également des jours suivant par exemple) ....

    Read the article

  • Windows 8 : réduction de la consommation d'énergie de façon cohérente et standardisée pour toutes les plateformes

    Windows 8 : réduction de la consommation d'énergie de façon cohérente et standardisée pour toutes les plateformes Mise à jour du 10/11/11 L'autonomie de la batterie et la consommation en énergie sont des sujets importants dans l'industrie informatique. Microsoft revient aujourd'hui sur les travaux qui ont été effectués dans Windows 8 pour améliorer la gestion de l'énergie. Construite de façon cohérente et standardisée pour toutes les plateformes (PC, Tablettes, etc.), la gestion d'énergie avec Windows 8 offre une plus grande autonomie de la batterie, avec une réduction significative de la consommation d'énergie. ...

    Read the article

  • Implementing `let` without using a macro

    - by Matt Fenwick
    I'm learning Lisp, and I've just gotten to let, which I don't quite understand (the implementation of). A common definition for it is given in terms of lambda as a macro. However, nowhere have I seen that let must be implemented as a macro or in terms of lambda. Is it possible to define let without using a macro or lambda? I know it can be implemented as a primitive, but I want to know whether it can be implemented in Lisp without creating a macro -- by creating a special form or a function.

    Read the article

  • Can't install Ubuntu 13.10 from 12.04 lts

    - by Matt Carle
    I have ubuntu 12.04 lts installed on my hp pavilion and I want to try 13.10. When I try to boot into the livecd, I get the purple ubuntu splash screen, then a blackscreen where some text flashes (to fast to see what it says) then it goes to a black screen and stays there. I know the installation disc is not the problem because I've successfully installed it on a different machine using the same disc. I've been trying to troubleshoot the issue for a while now and no luck. I have a radeon hd 8250 card. I know it's not much to go off of but any help would be greatly appreciated! Thanks!

    Read the article

  • Qwant annonce plusieurs nouveautés, nouveau mode d'affichage, catégorie Vidéos enrichie

    Qwant annonce plusieurs nouveautés, nouveau mode d'affichage, catégorie Vidéos enrichie Lancé en bêta en février dernier, Qwant détenu dans sa grande majorité par des capitaux français est disponible en version stable depuis le 04 juillet. Après le lancement d'une version mobile et d'un logo légèrement retouché, le Français vient présenter les nouvelles fonctionnalités de son outil de recherche. Qwant s'est basé sur les retours des utilisateurs pour améliorer sa solution. Il veut également...

    Read the article

  • Adobe victime du plus grand piratage de toute son histoire, 38 millions de comptes utilisateurs compromis et le code source de Photoshop dérobé

    Adobe victime de la plus grande campagne de piratage de toute son histoire 38 millions de comptes d'utilisateurs compromis et le code source de photoshop dérobéRécemment, Adobe a subit une cyberattaque des plus élaborées sur ses serveurs. Celle-ci a inévitablement conduit à la compromission de pratiquement 2,9 millions de comptes utilisateurs enregistrés pour ses différents services, selon les premières estimations de la firme.Au passage, les hackers ont réussi à emporter le code source de Photoshop,...

    Read the article

  • OpenSUSE 11.4 : cinquième version de développement qui intègre le « patch miracle » du noyau Linux, Attachmate explique ses projets

    OpenSUSE 11.4 : cinquième version de développement qui intègre le « patch miracle » du noyau Linux, Attachmate explique ses projets La distribution Linux openSUSE de Novell se porte visiblement bien, même après le rachat de la société par Attachemate. Son équipe de développement vient d'annoncer la 5ème grande étape (milestone) de sa version 11.4. OpenSUSE 11.4 M5 intègre un grand nombre de nouveautés, mais la plus importante d'entre elle reste l'intégration de la désormais célèbre mise à jour « miracle » de 224 lignes ...

    Read the article

  • Le web devrait-il se débarrasser des plugins pour offrir une meilleure sécurité aux internautes ? Firefox 26 bloque par défaut les plugins

    Le web devrait-il se débarrasser des plugins pour offrir une meilleure sécurité aux internautes ? Firefox 26 bloque par défaut ceux-ciLa sécurité des utilisateurs de Firefox représente un point important pour la fondation Mozilla. Dans la prochaine version de son navigateur, Firefox 26, qui est actuellement téléchargeable en version bêta, l'organisme a bloqué l'exécution par défaut des plugins.« Les plugins périmés sont une grande source de failles de sécurité. Ils devront être exécutés désormais...

    Read the article

  • Les quatre tendances qui vont changer la Business Intelligence dans les trois ans à venir, selon Gartner

    Les 4 tendances qui changeront (peut-être) la BI Dans les trois ans à venir, selon Gartner Dans le cadre de ses Prédiction 2011, le cabinet Gartner a identifié quatre grandes évolutions qui devraient impacter le domaine de la Business Intelligence. Ces prévisions restent hypothétiques mais elle s'appuie tout de même sur des tendances lourdes observables. Les voici en résumé : 1 - En 2013, 33% des fonctions de BI seront consommées au travers d'appareils mobiles Le taux d'adoption et la grande disponibilité des appareils nomades, ajoutée aux efforts des éditeurs de BI (développement de nouveaux produits et marketing) devraient rapidement générer ...

    Read the article

  • Microsoft publie discrètement les préversions de Windows Server 2012 R2, SQL Server 2014 et System Center 2012 R2

    Microsoft publie discrètement les préversions de Windows Server 2012 R2 SQL Server 2014 et System Center 2012 R2À quelques heures de la conférence Build (qui débutera demain 26 juin), la grande messe annuelle des développeurs de Microsoft, la firme a discrètement publié les préversions de Windows Server 2012 R2 et SQL Server 2014.Les abonnés au programme MSDN (Microsoft Developer Network) et Technet peuvent télécharger la Preview de Windows Server 2012 R2, System Center 2012 R2 et la Community Technology Preview (CTP) de SQL Server 2014. L'information a été divulguée par plusieurs développeurs sur leur page Twitter.Windows Server 2012 R2 renforce la vision « Cloud OS » introduite par son prédéces...

    Read the article

  • Les menaces mobiles augmentent de 614 % entre 2012 et 2013, les entreprises sont de plus en plus exposées

    Les menaces mobiles augmentent de 614 % entre 2012 et 2013, les entreprises sont de plus en plus exposéesLe troisième rapport annuel publié sur les menaces mobiles par Juniper Networks, une société américaine spécialiste en équipement de télécommunications, fait état d'une croissance exponentielle des logiciels malveillants sur mobile. Un bond de 614 % entre mars 2012 et mars 2013 selon son MTC (Mobile Threat Center) soit un passage de 38 689 à 276 259 en nombre de logiciels malveillants. Sans grande surprise, les hackers concentrent leurs attaques sur Android qui est la plateforme la plus ...

    Read the article

  • Padding error when using RSA Encryption in C# and Decryption in Java

    - by Matt Shaver
    Currently I am receiving the following error when using Java to decrypt a Base64 encoded RSA encrypted string that was made in C#: javax.crypto.BadPaddingException: Not PKCS#1 block type 2 or Zero padding The setup process between the exchange from .NET and Java is done by creating a private key in the .NET key store then from the PEM file extracted, created use keytool to create a JKS version with the private key. Java loads the already created JKS and decodes the Base64 string into a byte array and then uses the private key to decrypt. Here is the code that I have in C# that creates the encrypted string: public string Encrypt(string value) { byte[] baIn = null; byte[] baRet = null; string keyContainerName = "test"; CspParameters cp = new CspParameters(); cp.Flags = CspProviderFlags.UseMachineKeyStore; cp.KeyContainerName = keyContainerName; RSACryptoServiceProvider rsa = new RSACryptoServiceProvider(cp); // Convert the input string to a byte array baIn = UnicodeEncoding.Unicode.GetBytes(value); // Encrypt baRet = rsa.Encrypt(baIn, false); // Convert the encrypted byte array to a base64 string return Convert.ToBase64String(baRet); } Here is the code that I have in Java that decrypts the inputted string: public void decrypt(String base64String) { String keyStorePath = "C:\Key.keystore"; String storepass = "1234"; String keypass = "abcd"; byte[] data = Base64.decode(base64String); byte[] cipherData = null; keystore = KeyStore.getInstance("JKS"); keystore.load(new FileInputStream(keyStorePath), storepass.toCharArray()); RSAPrivateKey privateRSAKey = (RSAPrivateKey) keystore.getKey(alias, keypass.toCharArray()); Cipher cipher = Cipher.getInstance("RSA/ECB/PKCS1Padding"); cipher.init(Cipher.DECRYPT_MODE, privateRSAKey); cipherData = cipher.doFinal(data); System.out.println(new String(cipherData)); } Does anyone see a step missing or where the padding or item needs to be changed? I have done hours of reading on this site and others but haven't really found a concrete solution. You're help is vastly appreciated. Thanks. -Matt

    Read the article

  • Design pattern question: encapsulation or inheritance

    - by Matt
    Hey all, I have a question I have been toiling over for quite a while. I am building a templating engine with two main classes Template.php and Tag.php, with a bunch of extension classes like Img.php and String.php. The program works like this: A Template object creates a Tag objects. Each tag object determines which extension class (img, string, etc.) to implement. The point of the Tag class is to provide helper functions for each extension class such as wrap('div'), addClass('slideshow'), etc. Each Img or String class is used to render code specific to what is required, so $Img->render() would give something like <img src='blah.jpg' /> My Question is: Should I encapsulate all extension functionality within the Tag object like so: Tag.php function __construct($namespace, $args) { // Sort out namespace to determine which extension to call $this->extension = new $namespace($this); // Pass in Tag object so it can be used within extension return $this; // Tag object } function render() { return $this->extension->render(); } Img.php function __construct(Tag $T) { $args = $T->getArgs(); $T->addClass('img'); } function render() { return '<img src="blah.jpg" />'; } Usage: $T = new Tag("img", array(...); $T->render(); .... or should I create more of an inheritance structure because "Img is a Tag" Tag.php public static create($namespace, $args) { // Sort out namespace to determine which extension to call return new $namespace($args); } Img.php class Img extends Tag { function __construct($args) { // Determine namespace then call create tag $T = parent::__construct($namespace, $args); } function render() { return '<img src="blah.jpg" />'; } } Usage: $Img = Tag::create('img', array(...)); $Img->render(); One thing I do need is a common interface for creating custom tags, ie I can instantiate Img(...) then instantiate String(...), I do need to instantiate each extension using Tag. I know this is somewhat vague of a question, I'm hoping some of you have dealt with this in the past and can foresee certain issues with choosing each design pattern. If you have any other suggestions I would love to hear them. Thanks! Matt Mueller

    Read the article

  • PHP: Condense array of similar strings into one merged array

    - by Matt Andrews
    Hi everyone. Working with an array of dates (opening times for a business). I want to condense them to their briefest possible form. So far, I started out with this structure Array ( [Mon] => 12noon-2:45pm, 5:30pm-10:30pm [Tue] => 12noon-2:45pm, 5:30pm-10:30pm [Wed] => 12noon-2:45pm, 5:30pm-10:30pm [Thu] => 12noon-2:45pm, 5:30pm-10:30pm [Fri] => 12noon-2:45pm, 5:30pm-10:30pm [Sat] => 12noon-11pm [Sun] => 12noon-9:30pm ) What I want to achieve is this: Array ( [Mon-Fri] => 12noon-2:45pm, 5:30pm-10:30pm [Sat] => 12noon-11pm [Sun] => 12noon-9:30pm ) I've tried writing a recursive function and have managed to output this so far: Array ( [Mon-Fri] => 12noon-2:45pm, 5:30pm-10:30pm [Tue-Fri] => 12noon-2:45pm, 5:30pm-10:30pm [Wed-Fri] => 12noon-2:45pm, 5:30pm-10:30pm [Thu-Fri] => 12noon-2:45pm, 5:30pm-10:30pm [Sat] => 12noon-11pm [Sun] => 12noon-9:30pm ) Can anybody see a simple way of comparing the values and combining the keys where they're similar? My recursive function is basically two nested foreach() loops - not very elegant. Thanks, Matt EDIT: Here's my code so far, which produces the 3rd array above (from the first one as input): $last_time = array('t' => '', 'd' => ''); // blank array for looping $i = 0; foreach($final_times as $day=>$time) { if($last_time['t'] != $time ) { // it's a new time if($i != 0) { $print_times[] = $day . ' ' . $time; } // only print if it's not the first, otherwise we get two mondays } else { // this day has the same time as last time $end_day = $day; foreach($final_times as $day2=>$time2) { if($time == $time2) { $end_day = $day2; } } $print_times[] = $last_time['d'] . '-' . $end_day . ' ' . $time; } $last_time = array('t' => $time, 'd' => $day); $i++; }

    Read the article

< Previous Page | 12 13 14 15 16 17 18 19 20 21 22 23  | Next Page >