Search Results

Search found 17194 results on 688 pages for 'document databases'.

Page 255/688 | < Previous Page | 251 252 253 254 255 256 257 258 259 260 261 262  | Next Page >

  • What is the cloud?

    - by llaszews
    Everyone has their own definition cloud computing. This is a real conversation overheard at small cafe in NH between two general contractors: Contractor One: I can't get document I need because it is on my home PC. Contractor Two: You need cloud computing! Contractor One: What the hell is that? Contractor Two: You log into one computer and all your information for all your other computers is available. The NH live free or die definition of cloud computing!

    Read the article

  • Threads, événements et QObject, première partie sur les boucles événementielles, traduction par Vivien Duboué

    Le but de ce document n'est pas de vous enseigner la manière d'utiliser les threads, de faire des verrouillages appropriés, d'exploiter le parallélisme ou encore d'écrire des programmes extensibles : il y a de nombreux bons livres sur ce sujet ; par exemple, jetez un coup d'%u0153il sur la liste des lectures recommandées par la documentation. Ce petit article est plutôt voué à être un guide pour introduire les utilisateurs dans le monde des threads de Qt 4, afin d'éviter les écueils les plus récurrents et de les aider à développer des codes à la fois plus robustes et mieux structurés.

    Read the article

  • A TDD Journey: 4-Tests as Documentation; False Positive Results; Component Isolation

    In Test-Driven Development (TDD) , The writing of a unit test is done more to design and to document than to verifiy. By writing a unit test you close a number of feedback loops, and verifying the functionality of the code is just a minor one. everything you need to know about your class under test is embodied in a simple list of the names of the tests. Michael Sorens continues his introduction to TDD that is more of a journey in six parts, by discussing Tests as Documentation, False Positive Results and Component Isolation.

    Read the article

  • Big Data Sessions at Openworld 2012

    - by Jean-Pierre Dijcks
    If you are coming to San Francisco, and you are interested in all the aspects to big data, this Focus On Big Data is a must have document.  Some (other) highlights: A performance demo of a full rack Big Data Appliance in the engineered systems showcase A set of handson labs on how to go from a NoSQL DB to an effective analytics play on big data Much, much more See you all in a few weeks in SF!

    Read the article

  • How can I export emacs documents in 13.04?

    - by Whippy
    When I try to export a document from org-mode in emacs, c-X, c-E now results in 'Can't find library org' whereas in 10.04 it opened the export dialog allowing me to produce html, pdf etc. from the source org file. Searching with Google, I found this bug for redhat which looks closely related. The trouble is I don't know how to get hold of the emacs-el package it talks about in ubuntu in order to try its workaround so I'm currently stuck.

    Read the article

  • Le texte sur la neutralité du Net approuvé aux États-Unis, ce cadre réglémentaire fait la distinction entre l'Internet mobile et fixe

    Le texte de loi sur la neutralité du Net approuvé aux États-Unis Ce cadre réglementaire fait la distinction entre l'Internet mobile et fixe Mise à jour du 24/12/2010 La Commission fédérale des communications américaine (FCC) vient de publier les règles sur la neutralité du Net, un document aussi attendu que controversé, adopté par trois voix favorables contre deux mardi. Cette publication révèle un nouvel article qui stipule que les opérateurs de téléphonie mobile ne peuvent bloquer l'accès (pour peu qu'ils soit légaux) "aux applications et services qui peuvent être en concurrence" avec les services de base fou...

    Read the article

  • New: Deploying Highly Available Monitoring Infrastructure using Oracle Enterprise Manager Cloud Control 12c and Oracle Database Appliance

    - by uwes
    Recently (May 2014) the Solution-in-a-box: Deploying Highly Available Monitoring Infrastructure using Oracle Enterprise Manager Cloud Control 12c and Oracle Database Appliance white paper was published on OTN.This white paper outlines the steps to deploy Oracle Enterprise Manager Cloud Control 12c on the highly available Oracle Database Appliance platform. By reading this document, you will learn more about the process of planning, installing and deploying Oracle Enterprise Manager Cloud Control 12c Release 3 Plug - in Update 1 (12.1.0.3) on Oracle Database Appliance Virtualized Platform.

    Read the article

  • When will the Unity Greeter begin to look like the propositions from the Design Team?

    - by Marcappuccino
    The Canonical Design Team gave a rather beautiful login screen mockup for the unity greeter. These designs, in my opinion far exceed the current UI that we have for Quantal (which I think is worse, apart from remote login), and I was led to beleive that these were the official guidelines for the greeter. Are there plans to implement these designs into the Unity Greeter? The proposal is here: https://docs.google.com/a/canonical.com/document/d/1ypvxcSmwNKKMZawit-0r6uLnbTxoA-XoyB0ZNCKNMSg/edit?pli=1 The mockups are here: https://docs.google.com/a/canonical.com/file/d/0BzP7juF4TDpQS3JCWmtHTmR6OVk/edit?pli=1

    Read the article

  • jquery not running from <body> [closed]

    - by Andre
    I'm calling a function that's loaded in custom js file in the header. my.js has $(document).ready(function(){ function testFunction(){ alert("inside testfunction"); } }); after a few clicks, this is loaded in the : $("#someid").live($.myapp.event.play, function(event) { alert("this works"); testFunction(); }); the alert "this works", fires, but then nothing happens, what am I doing wrong?

    Read the article

  • What norms/standards should I follow when writing a functional spec?

    - by user970696
    I would like to know what documents (ISO?) should I follow when I write a functional specification. Or what should designers follow when creating the system design? I was told that there was a progress in last years but was not told what the progress was in (college professor). Thank you EDIT: I do not speak about document content etc. but about standards for capturing requirements, for business analysis.

    Read the article

  • How do I fix the configuration for monitors?

    - by user1409190
    I'm new to Ubuntu and I've been using it for about 2 weeks now and I have the following problem: I installed the NVidia driver version 331.38. Then I restarted the computer and after I logged-in a dialog popped up with the following error message: Could not apply the stored configuration for monitors - Error on line 1 char 1 : Document must begin will an element (e.g <book>) Any suggestions on how to proceed?

    Read the article

  • My Oracle Suport?????

    - by Dongwei Wang
    ????????????????,??????MOS???????(????),????????????????????????????:Note 62143.1 - Troubleshooting: Tuning the Shared Pool and Tuning Library Cache Latch ContentionNote 376442.1 - * How To Collect 10046 Trace (SQL_TRACE) Diagnostics for Performance IssuesNote 749227.1 - * How to Gather Optimizer Statistics on 11gNote 1359094.1 - FAQ: How to Use AWR reports to Diagnose Database Performance IssuesNote 1320966.1 - Things to Consider Before Upgrading to 11.2.0.2 to Avoid Poor Performance or Wrong ResultsNote 1392633.1 - Things to Consider Before Upgrading to 11.2.0.3 to Avoid Poor Performance or Wrong Results????????????????”??“???,?????????????????(PDF??)???????????????”Rate this document“????

    Read the article

  • Architecture Guide: ASP.NET MVC + N-tier + Entity Framework and Many More

    If you want to use ASP.NET MVC but is strugling to get things arrange to confidently use for your next business project. This Article is just for you. The article guide you to use ASP.NET MVC to architect a small Document Management System....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • On my computer, will Ubuntu be faster then XP? [closed]

    - by pgrytdal
    I was recently given a HP Compaq presario SR1200NX. It has Windows XP installed on it. After having Windows 7, then Ubuntu, I find XP to be really slow. I was wondering if XP is slow? The processor itself is slow? Or a combination thereof? Specs can be found here: http://h10025.www1.hp.com/ewfrf/wc/document?docname=c00245801&cc=ca&dlc=en&lc=en&jumpid=reg_r1002_usen_c-001_title_r0002

    Read the article

  • SharePoint 2010 and SQL Server 2008 R2

    - by Enrique Lima
    Recently participated in a conversation that asked about what thoughts were around the advantages of SharePoint 2010 and SQL Server 2008 R2. I guess we can really dive in by exploring a document on TechNet by the name of SQL Server 2008 R2 and SharePoint 2010 Products: Better Together (white paper)

    Read the article

  • Is a functional spec a part of the System requirement spec?

    - by user970696
    I wonder, sources like wikipedia or templates I found shows that Functional spec is a part of System requirement documents. I always thought that SRD is just overall decsription of the system, with all functional and non functional requirements. Yet I thought that Functional spec is more detailed and it is a separate document, while SRD is high level customer-created description (how is this one called then?) Could anyone help to make this clear for me?

    Read the article

  • Scanner Review: Fujitsu ScanSnap S1300

    The world of computer peripherals moves almost as fast as a busy business traveler. Fujitsu keeps up with both with its new portable scanner complete with automatic document feeder and business card import to Outlook.

    Read the article

  • Scanner Review: Fujitsu ScanSnap S1300

    The world of computer peripherals moves almost as fast as a busy business traveler. Fujitsu keeps up with both with its new portable scanner complete with automatic document feeder and business card import to Outlook.

    Read the article

  • Why can any user read the content in my homedir?

    - by Digiplace
    Why is it that the default setting makes it possible for user A to look in the homedir of user B and vice versa? And furthermore..that user can not only look into the homedir of another user, he can also open any document he wants to. It feels very insecure to me. There should be more privacy for users. I know how to prevent this situation, but it puzzles me why this should be possible in the first place.

    Read the article

  • Assigning shortcuts (accelerators) to Nautilus 3

    - by abruski
    I want to assign some shortcuts to menu actions in Nautilus 3.2.1 running under Ubuntu 11.10. I followed the steps shown here How do you create a "new document" keyboard shortcut? but it did not work for me. Switched to gnome classic so I can get the normal menu, hovered over the desired action pressed the desired keys but nothing happened (restarted nautilus, re-logged and nothing). Any suggestions or ideas on how to assign custom shortcuts to actions in Nautilus 3

    Read the article

  • Dissertation about website and database security - in need of some pointers

    - by ClarkeyBoy
    Hi, I am on my dissertation in my final year at university at the moment. One of the areas I need to research is security - for both websites and for databases. I currently have sections on the following: Website Form security - such as data validation. This section is more about preventing errors made by legitimate users as much as possible rather than stopping hackers, for example comparing a field to a regular expression and giving them meaningful feedback on any errors which did occur so as to stop it happening again. Constraints. For example if a value must be true or false then use a checkbox. If it is likely to be one of several values then use a dropdown or a set of radio boxes, and so on. If the value is unpredictable then use regular expressions to limit what characters they are allowed to enter, and to restrict the length of the string, and sometimes to limit the format (such as for dates / times, post codes and so on). Sometimes you can limit permissions to the form. This is on the occasion that you know exactly who (whether it be peoples names or a group of people - such as administrators or employees) is going to need access to the form. Restricting permissions will stop members of the public from being able to access the form. Symbols or strings which could be used maliciously or cause the website to act incorrectly (such as the script tag) should be filtered out or html encoded. Captcha images can be used to prevent automated systems from filling in and submitting the form. There are some hacks for file uploads - such as using double extensions - which can allow hackers to upload malicious files. Databases (this is nowhere near done yet but the sections I have planned are listed below) SQL statements vs stored procedures Throwing an error when one of the variables contains particular characters or groups of characters (I cant remember what characters they are, but I have seen a message thrown back at me before where I have tried to enter html or something into a text area). SQL Injection - and ways around it, with some examples. Does anyone have any hints and tips on where I could go for some decent, reliable information either about these areas or about other areas of security that I could cover? Thanks in advance. Regards, Richard PS I am a complete newbie when it comes to security, so please be patient with me. If any of the information I have put down is wrong or could be sub-sectioned then please feel free to say so.

    Read the article

< Previous Page | 251 252 253 254 255 256 257 258 259 260 261 262  | Next Page >