Search Results

Search found 11825 results on 473 pages for 'books online'.

Page 269/473 | < Previous Page | 265 266 267 268 269 270 271 272 273 274 275 276  | Next Page >

  • HTML Types - Learning Order?

    - by Gabe
    I've decided that today - as soon as this question is answered, in fact - I'm going to dive into learning HTML. But, looking online, I've noticed there are many types: HTML, XHTML, HTML5, and so on. So, which should I start with? In what order should I learn them? And, for that first language, where should I learn at?

    Read the article

  • Free Offline Map Provider (and not OpenStreetMaps)

    - by Radian
    I am making for my Graduation Project a low price Navigation device, using Android as Operating System I tried the Native Google's Map-view Control, but it works only Online .. and of-course I want to store maps for offline navigation So.. I want a map provider (like OpenStreetMaps) that : I can use offline Contain Searchable Street names (not only a rendered image) for commercial use Free or at low price The problem with OpenStreetMaps that it doesn't provide detailed map for most cities in Egypt.

    Read the article

  • Transfering iTunes Connect Account name and information.

    - by Avizzv92
    I would like to change the name/ssn/tax information that is currently signed up with the iTunes Connect account. Basically I want to transfer the account to a different person. I know you need to contact them directly and you can't do it online, but I'm wondering how difficult it is to do? And what are the chances that Apple will do this for me?

    Read the article

  • Resources for how to design graph/charts well

    - by wesgarrison
    One of my projects needs to show users where they rank in certain calculations. I inherited the graph structure from the previous programmer and had to leave it alone while I worked on other parts of the site. It's time to make the graphs more meaningful, so I'm looking for books/websites/etc about graphs. (Not graph theory!) Charts that convey comparisons at a glance. Everyone suggests The Visual Display of Quantitative Information by Edward Tufte and that's spot on for what I'm looking for, so anything related to that would be great. Naturally, personal experience about what to do or not would be helpful as well.

    Read the article

  • Source cross reference like LXR but written in PHP?

    - by Dan
    Hi, does someone know a good cross reference engine like LXR, but written in PHP? My provider has PHP and MySQL as well as Postgres DBs, but neither I have access to Perl nor via SSH. I'd like to put up a online cross ref for my Software which is written in C. Thanks for helping! Dan

    Read the article

  • Is Md5 Encryption Symmetric or Asymmetric?

    - by PF1
    For my iPhone application, Apple wants to know if my password encryption (md5) is greater then 64-bit symmetric or greater then 1024-bit symmetric. I have not been able to find it online, so I am wondering if anyone knows the answer. In addition, is this considered an appropriate encryption technology for passwords, or should I use something different? Thanks for any help!

    Read the article

  • Looking to learn writing a NDIS or TDI Driver

    - by Victor43
    Can anyone possibly suggest a good book which steps through the development of such a driver written in C. I'm looking for a book which is good for beginners. If there is an online resource on how to do this which explains the process from ground up it would be greatly appreciated. Thanking you Victor

    Read the article

  • Why is php5isapi.dll missing after installing PHP for Windows?

    - by Seu
    It's been a while since I've installed PHP for Windows, but every guide I've seen online tells me to set IIS to recognize .PHP files with php5isapi.dll. However, I can't seem to find php5isapi.dll anywhere after installing PHP 5.3.0 and PHP 5.2.10. If I recall correctly it should be in C:\InstallDir Am I missing something important?

    Read the article

  • Interested in embedded systems. Where to begin?

    - by Ala ABUDEEB
    Hello, i'm a computer systems engineering student. i'm interested in designing embedded systems but i don't know where to begin learning this, and what topics are essentially needed to proceed in this domain. So can you please tell me what topics do i have to study, and what books are available there in market or online that can help me??? please help me p.s. normally as an engineering student i have basic knowledge of circuit theory and microcontroller realm. thank you in advance.

    Read the article

  • Can a binary tree or tree be always represented in a Database as 1 table and self-referencing?

    - by Jian Lin
    I didn't feel this rule before, but it seems that a binary tree or any tree (each node can have many children but children cannot point back to any parent), then this data structure can be represented as 1 table in a database, with each row having an ID for itself and a parentID that points back to the parent node. That is in fact the classical Employee - Manager diagram: one boss can have many people under him... and each person can have n people under him, etc. This is a tree structure and is represented in database books as a common example as a single table Employee.

    Read the article

  • RDFa / Microformat - Recipe markup standards

    - by hfidgen
    I wonder if anyone can help? After Google announced that it will take note of RDFa / Microformats for online recipes, I've been looking into this for a couple of recipe based sites I run. However we simply don't have all the required data to fulfill any of the standards. Does this matter? Will search engine crawlers still make the most of what they do find, or by missing a few elements (like a review or recipe rating) will I be wasting my time implementing this? Cheers, H

    Read the article

  • How are java.lang.Object's protected methods protected from subclasses?

    - by Adrian Lang
    The keyword protected grants access to classes in the same package and subclasses (http://java.sun.com/docs/books/tutorial/java/javaOO/accesscontrol.html). Now, every class has java.lang.Object as superclass (http://java.sun.com/j2se/1.5.0/docs/api/java/lang/Object.html). Hence I conclude that every class may access java.lang.Object's methods even if they are protected. Take a look at the following example: public class Testclass { public Object getOne() throws CloneNotSupportedException { return this.clone(); } public Object getTwo() throws CloneNotSupportedException { return ((Object) this).clone(); } } While getOne() compiles fine, getTwo() gives Testclass.java:6: clone() has protected access in java.lang.Object return ((Object) this).clone(); I neither understand why getTwo() doesn't compile nor what's the difference (regarding the access of java.lang.Objects members) with getOne().

    Read the article

  • Casting a primitive int to a Number

    - by Tamer
    Let's say that I have the following: int a = 2; Number b = (Number) a; System.out.println(b); // Prints 2 http://java.sun.com/docs/books/jls/first_edition/html/15.doc.html#238146 says that a primitive value may not be cast to a reference type. Does Java know to create an Integer from the primitive int and then cast to the superclass? How exactly does Java handle this behind the scenes? Thanks!

    Read the article

  • How to implement an interface member that returns void in F#

    - by Drew Noakes
    Imagine the following interface in C#: interface IFoo { void Bar(); } How can I implement this in F#? All the examples I've found during 30 minutes of searching online show only examples that have return types which I suppose is more common in a functional style, but something I can't avoid in this instance. Here's what I have so far: type Bar() = interface IFoo with member this.Bar = void Fails with FS0010: Unexpected keyword 'void' in expression.

    Read the article

  • Setting a property value on each of the results in a FetchedResults set

    - by RickiG
    Hi On my Core Data Entity "Book" i have a boolean property, 'wasViewed' (NSNumber numberWithBool) that tells me if the Book was "viewed". I would like to implement a sort of "reset" this property for all my NSManagedObjects "Book". So that I can set them all to NO between sessions. I use an NSPredicate to retrieve all the Books like this: NSPredicate *predicate = [NSPredicate predicateWithFormat:@"wasViewed == %@", [NSNumber numberWithBool:YES]]; // code for setting entity, request etc... NSMutableArray *mutableFetchResults = [[[managedObjectContext executeFetchRequest:request error:&error] mutableCopy] autorelease]; This is working just fine, however, now I need to set up a loop, go through each Book object, something like this: for(Book *b in mutableFetchResults) { [b setWasViewed:NO] } Is there a way to perform an action on each element that fits the predicate instead of retrieving it? So instead of executeFetchRequest on a managedObjectContext it could be executeOperationOnFetchRequestResults or something along those lines. Thanks for any input given:)

    Read the article

  • Is there a SQL Server error numbers C# wrapper anyone knows of?

    - by Mr Grok
    I really want to do something useful when a PK violation occurs but I hate trapping error numbers... they just don't read right without comments (they're certainly not self documenting). I know I can find all the potential error numbers at SQL Server books online but I really want to be able to pass the error number to some helper class or look it up against a Dictionary of some sort rather than have non-descript err numbers everywhere. Has anyone got / seen any code anywhere that encapsulates the SQL Server Error numbers in this way as I don't want to re-invent the wheel (or I'm lazy maybe).

    Read the article

  • Sources for news about network security

    - by chris.nullptr
    I am a software developer that wants to stay up-to-date on network security news. What are some of the best sources online for not only keeping tabs on newly discovered security vulnerabilities that may affect projects I'm working on, but also best-practices when developing network software. Please keep in mind that I am looking for sources that cater to the software developer not IT administration.

    Read the article

  • How do I lock the layout of my android program to one orientation

    - by Mike V
    I'm trying to write a program that needs smooth orientation sensor samples as the phone is rotated all around. Every time the orientation of the phone is changed, it interrupts the data and freezes the program while the layout changes. How can I lock it in one orientation (landscape or portrait, it doesn't matter)? I assume it has something to do with android:layout in the xml file, but I can't find anything online.

    Read the article

  • Communication between java server and matlab client

    - by user272587
    I'd like to establish a server(Java)/client (Matlab) communication using socket. They can send messages to each other. An example shows how to do this in Java server and Java client, http://java.sun.com/docs/books/tutorial/networking/sockets/clientServer.html. When I try to rewrite the client part in Matlab, I only can get the first message that the Java server sends and display it in the Matlab command window. When I type a message in the Matlab command window, I can't pass it to the Java Server. Jave code: kkSocket = new Socket("localhost", 3434); Matlab equivalent: kkSocket = Socket('localhost', 3434); Java code for client: out = new PrintWriter(kkSocket.getOutputStream(), true); in = new BufferedReader(new InputStreamReader(kkSocket.getInputStream())); What would be a Matlab equivalent for this? Thanks in advance.

    Read the article

  • Is there any benefit to encrypting twice using pgp?

    - by ojblass
    I am asking from a "more secure" perspective. I can imagine a scenario with two required private keys needed for decryption scenarios that may make this an attractive model. This is to settle an argument. My vote is that it is not adding any additional security other than having to compromise two different private keys. I think that if it was any more secure than encrypting it one million times would be the best way to secure informaiton and I don't buy it. So I guess my question becomes is a two locking mechanism equivalent to another one locking mechanism with a single key? Update: Forgive me if the answer is obvious but my bread goes dead as I read books on the topic.

    Read the article

  • why do we all learn and study java or .net or why java or .net are popular?

    - by tadeze
    My question to be clear is why do we all need to learn java or .net(C#) , still java or .net are more popular than delphi or c++ and even there are lot of resource,articles or books compared to c++ or delphi about java and .net. However, I heard majority, if I am right about 80% of software are developed using c++ or delphi in the software industry. so, why do we bother about other languages specifically about the cosmopolitan languages such as java or .net in education as well as for job interview. Although, still I know the elegance of java and .net, their safe code execution,fully objected oriented behavior ...etc, but still according to the statics they are not preferred on software develpement as a primary language mainly because of their execution time compared to c++ or delphi. So my question are why do they choose them for jobs or educational purpose and everything else? why do we lose our time learning these language if we are forced to use the other languages in the industry?

    Read the article

  • Is there a web service for real estate data?

    - by Jen
    I am looking to access an online database of real estate information (e.g. tax information and sales history for a particular address, lot size, square footage, BPOs, etc.). Companies such as RealQuest offer reports as a subscription service, but I'm looking to download the raw data, preferably in XML format (I don't want to parse the output since the presentation could change without notice). Are there any such services available?

    Read the article

  • Using Entity Framework as Data Access Layer

    - by AJM
    In my ASP.NET application I want to implement by data acess layer using the Entity framweok so I can use it as an ORM tool. But I dont want the rest of the application to care that I'm using this or be polluted by anything entity frameowrk specific. I cant seem to find anyone who is using the entity framework exclusively in their Data access layer so I'm keen to see any online examples of this/ experience people have.

    Read the article

  • JAAS tutorial - how to force application to run with policy

    - by wuntee
    I just went through this tutorial: http://java.sun.com/docs/books/tutorial/security/tour2/index.html And was curios about the basic concept of JAAS... If every applcation needs to be run with the '-Djava.security.manager -Djava.security.policy=...' flags, what is enforcing security? Is it up to the end user to know when any Java application is being run, and modify the executable/script/whatever to include those flags? Or, how does a developer enforce that an application is run with the security manager enabled? The whole concept doesnt seem very functional to me - as it is by default not enabled... Am I missing something?

    Read the article

< Previous Page | 265 266 267 268 269 270 271 272 273 274 275 276  | Next Page >