Search Results

Search found 2229 results on 90 pages for 'conditions'.

Page 29/90 | < Previous Page | 25 26 27 28 29 30 31 32 33 34 35 36  | Next Page >

  • Sophos découvre un nouveau Trojan ciblant les systèmes Apple, les menaces vont-elles être de plus en plus fréquentes sur Mac ?

    Sophos découvre un nouveau Trojan ciblant les systèmes Apple, les menaces vont-elles être de plus en plus fréquentes sur Mac ? Les machines Apple, moins visées par les pirates informatiques que les autres systèmes (comprenez Windows) ? peut être plus pour longtemps. Des chercheurs viennent en effet de repérer un cheval de troie qui s'en prends spécifiquement au systèmes Mac. Ce trojan, baptisé BlackHole RAT ( Remote Access Trojan), semble ne pas avoir encore été utilisé en conditions réelles. Il est cependant très facile à trouver sur la Toile, et son utilisation serait un jeu d'enfant. Il se base sur DarkComet, un Trojan open-source dont il est une variante et qui cible les systèmes Microsoft. ...

    Read the article

  • Business Case for investing time developing Stubs and BizUnit Tests

    - by charlie.mott
    I was recently in a position where I had to justify why effort should be spent developing Stubbed Integration Tests for BizTalk solutions. These tests are usually developed using the BizUnit framework. I assumed that most seasoned BizTalk developers would consider this best practice. Even though Microsoft suggest use of BizUnit on MSDN, I've not found a single site listing the justifications for investing time writing stubs and BizUnit tests. Stubs Stubs should be developed to isolate your development team from external dependencies. This is described by Michael Stephenson here. Failing to do this can result in the following problems: In contract-first scenarios, the external system interface will have been defined.  But the interface may not have been setup or even developed yet for the BizTalk developers to work with. By the time you open the target location to see the data BizTalk has sent, it may have been swept away. If you are relying on the UI of the target system to see the data BizTalk has sent, what do you do if it fails to arrive? It may take time for the data to be processed or it may be scheduled to be processed later. Learning how to use the source\target systems and investigations into where things go wrong in these systems will slow down the BizTalk development effort. By the time the data is visible in a UI it may have undergone further transformations. In larger development teams working together, do you all use the same source and target instances. How do you know which data was created by whose tests? How do you know which event log error message are whose?  Another developer may have “cleaned up” your data. It is harder to write BizUnit tests that clean up the data\logs after each test run. What if your B2B partners' source or target system cannot support the sort of testing you want to do. They may not even have a development or test instance that you can work with. Their single test instance may be used by the SIT\UAT teams. There may be licencing costs of setting up an instances of the external system. The stubs I like to use are generic stubs that can accept\return any message type.  Usually I need to create one per protocol. They should be driven by BizUnit steps to: validates the data received; and select a response messages (or error response). Once built, they can be re-used for many integration tests and from project to project. I’m not saying that developers should never test against a real instance.  Every so often, you still need to connect to real developer or test instances of the source and target endpoints\services. The interface developers may ask you to send them some data to see if everything still works.  Or you might want some messages sent to BizTalk to get confidence that everything still works beyond BizTalk. Tests Automated “Stubbed Integration Tests” are usually built using the BizUnit framework. These facilitate testing of the entire integration process from source stub to target stub. It will ensure that all of the BizTalk components are configured together correctly to meet all the requirements. More fine grained unit testing of individual BizTalk components is still encouraged.  But BizUnit provides much the easiest way to test some components types (e.g. Orchestrations). Using BizUnit with the Behaviour Driven Development approach described by Mike Stephenson delivers the following benefits: source: http://biztalkbddsample.codeplex.com – Video 1. Requirements can be easily defined using Given/When/Then Requirements are close to the code so easier to manage as features and scenarios Requirements are defined in domain language The feature files can be used as part of the documentation The documentation is accurate to the build of code and can be published with a release The scenarios are effective to document the scenarios and are not over excessive The scenarios are maintained with the code There’s an abstraction between the intention and implementation of tests making them easier to understand The requirements drive the testing These same tests can also be used to drive load testing as described here. If you don't do this ... If you don't follow the above “Stubbed Integration Tests” approach, the developer will need to manually trigger the tests. This has the following risks: Developers are unlikely to check all the scenarios each time and all the expected conditions each time. After the developer leaves, these manual test steps may be lost. What test scenarios are there?  What test messages did they use for each scenario? There is no mechanism to prove adequate test coverage. A test team may attempt to automate integration test scenarios in a test environment through the triggering of tests from a source system UI. If this is a replacement for BizUnit tests, then this carries the following risks: It moves the tests downstream, so problems will be found later in the process. Testers may not check all the expected conditions within the BizTalk infrastructure such as: event logs, suspended messages, etc. These automated tests may also get in the way of manual tests run on these environments.

    Read the article

  • Single or multiple return statements in a function [on hold]

    - by Juan Carlos Coto
    When writing a function that can have several different return values, particularly when different branches of code return different values, what is the cleanest or sanest way of returning? Please note the following are really contrived examples meant only to illustrate different styles. Example 1: Single return def my_function(): if some_condition: return_value = 1 elif another_condition: return_value = 2 else: return_value = 3 return return_value Example 2: Multiple returns def my_function(): if some_condition: return 1 elif another_condition: return 2 else: return 3 The second example seems simpler and is perhaps more readable. The first one, however, might describe the overall logic a bit better (the conditions affect the assignment of the value, not whether it's returned or not). Is the second way preferable to the first? Why?

    Read the article

  • What's the difference between 'killall' and 'pkill'?

    - by jgbelacqua
    After using just plain kill <some_pid> on Unix systems for many years, I learned pkill from a younger Linux-savvy co-worker colleague1. I soon accepted the Linux-way, pgrep-ing and pkill-ing through many days and nights, through slow-downs and race conditions. This was all well and good. But now I see nothing but killall . How-to's seem to only mention killall, and I'm not sure if this is some kind of parallel development, or if killall is a successor to pkill, or something else. It seems to function as more targeted pkill, but I'm sure I'm missing something. Can an Ubuntu/Debian-savvy person explain when (or why) killall should be used, especially if it should be used in preference to pkill (when pkill often seems easier, because I can be sloppier with name matching, at least by default). 1 'colleague' is free upgrade from 'co-worker', so might as well.

    Read the article

  • What is considered to be a "modification" of sources under the BSD license?

    - by Den
    I have a question about the 3-clause BSD license based on it's Wiki description. It states: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: ... What is understood by "modification"? Specifically I am interested whether any/all of the following is considered as such modification: 1) reading the original sources and then re-implementing; 2) reading the original sources, waiting for a year and then re-implementing something based on whatever you could remember; 3) direct and very significant "complete" refactoring of the original sources.

    Read the article

  • Is a finite state machine an appropriate solution for this situation?

    - by user1936
    I was writing some test code as an example where I had a washing machine class. It has a door state that should be open or closed, and also a running state, either on or off. I want to prevent the running state from changing from 'off' to 'on' when the door is 'open', and also prevent the door from being set to 'open' while the machine is 'on'. I have this functionality rigged up with a bunch of if statements. It feels inelegant and it could quickly turn into spaghetti code if I want to add another state that puts additional conditions on the changes of other states. I wonder, is a finite state machine a solution for this situation? Would it simplify adding states and defining valid transitions?

    Read the article

  • PEX - are you licenced for it?

    - by TATWORTH
    There is an interesting artcile about PEX at http://blogs.msdn.com/b/ukmsdn/archive/2011/02/22/featured-article-pex-and-visual-studio.aspx PEX can be downloaded from http://research.microsoft.com/en-us/projects/pex/downloads.aspx The licence conditions are: "Pex and Moles are Power Tools available for commercial use for MSDN subscribers. Moles is also available separately for commercial use without requiring an MSDN subscription. Pex and Moles are also available for academic and non-commercial use." I note with interest that it is now available to MSDN subscribers. If I recall correctly it used to be only available to VS Team versions.

    Read the article

  • Liskov substitution principle with abstract parent class

    - by Songo
    Does Liskov substitution principle apply to inheritance hierarchies where the parent is an abstract class the same way if the parent is a concrete class? The Wikipedia page list several conditions that have to be met before a hierarchy is deemed to be correct. However, I have read in a blog post that one way to make things easier to conform to LSP is to use abstract parent instead of a concrete class. How does the choice of the parent type (abstract vs concrete) impacts the LSP? Is it better to have an abstract base class whenever possible?

    Read the article

  • Resolving a collision between point and moving line

    - by Conundrumer
    I am designing a 2d physics engine that uses Verlet integration for moving points (velocities mentioned below can be derived), constraints to represent moving line segments, and continuous collision detection to resolve collisions between moving points and static lines, and collisions between moving/static points and moving lines. I already know how to calculate the Time of Impact for both types of collision events, and how to resolve moving point static line collisions. However, I can't figure out how to resolve moving/static point moving line collisions. Here are the initial conditions in a point and moving line collision event. We have a line segment joined by two points, A and B. At this instant, point P is touching/colliding with line AB. These points have unit mass and some might have an initial velocity, unless point P is static. The line is massless and has no explicit rotational component, since points A and B could freely move around, extending or contracting the line as a result (which will be fixed later by the constraint solver). Collision is inelastic. What are the final velocities of the points after collision?

    Read the article

  • Over-Current condition on port 7 or 8

    - by Dymatic
    I am having a problem with my USB ports. It shows over-current conditions on ports 7 and 8. I have heard that this is caused by a damaged USB port, and since it is detecting it on two ports it seems that I have two that are broken. I do indeed have two that do not work, so that is not the issue. What I would like to do is disable whatever program is running over-current condition checks. tty's are unusable at this point. Every few second a new over-current condition occurs. Here is the output of dmesg: http://pastebin.com/CuFKRGue Is there an easy way to disable these checks or damage the ports to a point where it will no longer check? Fixing them is not important or an option.

    Read the article

  • Microsoft propose le Lumia 800 à 1Euro pour l'achat de Visual Studio et des réductions sur MSDN pour les utilisateurs de son EDI

    Microsoft propose le Lumia 800 à 1€ pour l'achat de Visual Studio Et des réductions sur MSDN pour les utilisateurs de son EDI Alors que des augmentations viennent d'être annoncées sur les licences de Visual Studio, Microsoft lance des offres intéressantes à saisir rapidement. Pour tout achat de Visual Studio, le Nokia Lumia 800 (objectivement un très bon smarthpone sous l'OS mobile de Microsoft) pourra en effet être ajouté à la commande pour 1 €. Le prix nu de l'appareil est autour des 450 €. Un projecteur Ultramobile de Dell peut remplacer le Lumia aux mêmes conditions. Sur cette offre, Dell rajoute pour sa part un coupon de réduction de 35 % ...

    Read the article

  • Apple soupçonné d'anti-compétitivité avec sa régie publicitaire iAd, une investigation d'antitrust p

    Mise à jour du 14.06.2010 par Katleen Apple soupçonné d'anti-compétitivité avec sa régie publicitaire iAd, une investigation d'antitrust pourrait bientôt être lancée D'après le très sérieux Financial Times, Apple pourrait écoper très bientôt d'une enquête pour Antitrust, afin de déterminer si l'iAd serait trop préjudiciable à des sociétés comme Microsoft ou Google au niveau de la publicité sur iPhone et iPad. Les régulateurs américains s'interessent de près aux agissements de la firme à la pomme. On ne sait pas encore qui de la Federal Trade Commission ou de l'U.S. Department of Justice investiguera l'affaire. Les nouvelles conditions d'utilisation du service pour les développeurs ajo...

    Read the article

  • Is possible to write too many asserts?

    - by Lex Fridman
    I am a big fan of writing assert checks in C++ code as a way to catch cases during development that cannot possibly happen but do happen because of logic bugs in my program. This is a good practice in general. However, I've noticed that some functions I write (which are part of a complex class) have 5+ asserts which feels like it could potentially be a bad programming practice, in terms of readability and maintainability. I think it's still great, as each one requires me to think about pre- and post-conditions of functions and they really do help catch bugs. However, I just wanted to put this out there to ask if there is a better paradigms for catching logic errors in cases when a large number of checks is necessary.

    Read the article

  • Do reactive extensions and ETL go together?

    - by Aaron Anodide
    I don't fully understand reactive extensions, but my inital reading caused me think about the ETL code I have. Right now its basically a workflow to to perform various operations in a certain sequence based on conditions it find as it progresses. I can also imagine an event driven way such that only a small amount of imperative logic causes a chain reaction to occur. Of course I don't need a new type of programming model to make an event driven collaboration like that. Just the same I am wondering if ETL is a good fit for potentially exploring Rx further. Is my connection in a valid direction even? If not, could you briefly correct the error in my logic?

    Read the article

  • L'AppStore dans le collimateur des autorités américaines ? Steve Jobs répond par ailleurs à une question sur les applications SaaS

    Les nouvelles conditions de l'AppStore dans le viseur des autorités américaines ? Steve Jobs répond à une question sur les applications SaaS Mise à jour du 23/02/2011 par Idelways La Commission Fédérale américaine du Commerce (FTC) serait sur le point de lancer une enquête sur la gestion des paiements à partir des applications de l'App Store d'Apple. Cette initiative surgit après la publication par le Washington Post d'un rapport traitant les cas de parents forcés de payer des factures prohibitives générées par les achats de leurs enfants à partir des applications de l'iPhone, iPad et iPod. Selon les plaig...

    Read the article

  • Apple veut contrôler toutes les applications de ventes de contenus de ses AppStores et expulse l'application de Sony

    Apple veut contrôler toutes les applications de ventes de contenus de ses AppStores Et expulse l'application de Sony L'application de Sony a fait les frais des nouvelles conditions des AppStores d'Apple. Selon le New York Times, l'application de Sony permettant d'acheter et de lire des contenus en ligne (Sony Reader) aurait été rejetée de l'App Store sous prétexte que celle-ci ne respectait pas les règles d'achat de la plate-forme. Quelles règles ? Celles, nouvelles, qui stipulent que toutes les applications utilisant une solution de paiement tierce (à l'acte ou par abonnement) autre que l'API In App Purchase(IAP) seraient refusées et/ou expulsées.

    Read the article

  • Is there any advantage/disadvantage to using robots.txt to disallow access to legal pages such as terms, privacy policy, etc.?

    - by CaptainCodeman
    As I understand, having repetitive content is a detriment to search engine placement. Given that many websites that use similar or even identical "Terms and Conditions" and "Privacy Policy" pages due to similar legal wording or due to copy & pasting from the same source, would it be a good idea to disallow access to these pages via robots.txt, in order to avoid being penalized for "non-original content"? Or, on the contrary, could the search engines identify this as circumvention and penalize the site for trying to hide content? Or does it not matter?

    Read the article

  • What do you look for when debugging deadlocks?

    - by Michael K
    Recently I've been working on projects that heavily use threading. I think that I'm OK at designing them; use stateless design as much as possible, lock access to all resources that more than one thread needs, etc. My experience in functional programming has helped that immensely. However, when reading other people's thread code, I get confused. I am debugging a deadlock right now, and since the coding style and design are different from my personal style, I am having a difficult time seeing potential deadlock conditions. What do you look for when debugging deadlocks?

    Read the article

  • Organic Business Networks -Don't Miss This Webcast!

    - by Michael Snow
    TUNE IN TODAY!! Oracle Social Business Thought Leaders Webcast Series Thursday, June 21st 10am PST  Organic Business Networks: Doing Business in a Hyper-Connected World Organic business networks connect people, data, content, and IT systems in a flexible, self-optimizing, self-healing, self-configuring and self-protecting system. Join us for this webcast and hear examples of how businesses today can effectively utilize the interconnectedness of emerging business information environments, adapt to changing conditions, and leverage assets effectively to thrive in a hyper-connected, globally competitive, information driven world. Listen as Featured Speaker, Michael Fauscette, GVP, Software Business Solutions, IDC, discusses: Emerging trends in social business that are driving transformative changes today The dynamic characteristics that make up social, collaborative, and connected enterprises Effective ways that technology combined with culture and process provide unique competitive advantage through new organic networked business models. Register now for the fifth Webcast in the Social Business Thought Leaders Series,“Organic Business Networks: Doing Business in a Hyper-Connected World.”

    Read the article

  • Security Alert for CVE-2011-5035 Updated

    - by Eric P. Maurice
    Hi, this is Eric Maurice again.  Oracle has just updated the Security Alert for CVE-2011-5035 to announce the availability of additional fixes for products that were affected by this vulnerability through their use of the WebLogic Server and Oracle Container for J2EE components.  As explained in a previous blog entry, a number of programming language implementations and web servers were found vulnerable to hash table collision attacks.  This vulnerability is typically remotely exploitable without authentication, i.e., it may be exploited over a network without the need for a username and password.  If successfully exploited, malicious attackers can use this vulnerability to create denial of service conditions against the targeted system. A complete list of affected products and their versions, as well as instructions on how to obtain the fixes, are listed on the Security Alert Advisory.  Oracle highly recommends that customers apply these fixes as soon as possible.

    Read the article

  • Le rachat de McAfee par Intel validé par la Commission européenne, sous réserve d'une garantie "d'interopérabilité des produits"

    Le rachat de McAfee par Intel validé par la Commission européenne, sous réserve d'une garantie de l'interopérabilité "des produits issus de cette concentration" Mise à jour du 28.01.2011 par Katleen Ca y est, la Commission européenne a finalement statué sur l'acquisition de McAfee par Intel, et a décide de l'autoriser, tout en y mettant des conditions. En effet, cette validation est « accordée sous réserve d'un ensemble d'engagements garantissant une concurrence équitable entre les parties et leurs concurrents dans le domaine de la sécurité informatique ». Intel a donc du s'engager a garantir que ses processeurs équipés des technologies de protection de McAfee seront compatib...

    Read the article

  • Automate XML : Xproc devient une recommandation du W3C

    Automate XML : Xproc devient une recommandation du W3C Depuis le 11 mai, les technologies XML peuvent enfin compter dans leur rang un standard consacrer à la production de XML. Xproc est un langage permettant de décrire les différentes étapes d'une chaîne de production de XML. On savait inclure des XML avec Xinclude, faire des liens avec Xlink,poser des conditions en Xpath,valider en XML Schema,requêter en Xquery, transformer en XSLT, ce nouveau langage vous permettra enfin d'organiser et d'automatiser ces différentes opérations (et bien d'autres...) en les séquençant et les conditionnant . Il a toujours été possible de programmer ces différentes opérations,de les combiner, mais aujourd'hui vous dipos...

    Read the article

  • Attention All Procurement Buyers!

    - by LuciaC
    Have you discovered the power of the Buyer Work Center?   Released in Procurement 12.0 the Professional Buyer Work Center (BWC) is a web based interface that provides a central 'launch pad' from which you can efficiently perform your daily tasks, including:  You can manage your requisitions and create them to Purchase Orders (like manual autocreate) Create new standard purchase orders, blanket purchase agreements, or contract purchase agreements Create and maintain supplier information If Oracle Sourcing is licensed and implemented, you can create buyer's auctions or sourcing RFQs If Oracle Services Procurement is licensed and implemented you can create and maintain purchase orders for complex work payments If Oracle Procurement Contracts is licensed and implemented you can handle author contract terms and manage deliverables Globally for the BWC: Create and personalize your own document views including list of columns, where conditions and sort sequences. You can additionally use predefined document views. Accessed from the Purchasing responsibility as we see in the screenshot here, the Buyer Work Center has links to launch to the areas you want to access. See these documents for more information on the BWC: Doc ID 1301969.1: FAQ - Buyer Work CenterDoc ID 1394392.1: Assistant: Oracle Purchasing Purchasing Buyer Work Center Search Helper.

    Read the article

  • Is it possible to give an animated GIF a transparent background?

    - by Phil
    I'm making a Fire Emblem-esque game. There are very cute 2D frames I made for each character, and, like a game like Fire Emblem, I want these characters to animate constantly. To circumvent the graphics programming involved I came up with a novel idea! I would make each character an animated gif, and only in special conditions ever halt their constant movement - in that case just change what image is being displayed. Simple enough. But I have a dilemma - I want the background of my .gifs to be transparent (so that the "grass" behind each character naturally shows, as per the screenshot - which has them as still images with transparent backgrounds). I know how to make a background transparent in numerous tools (GIMP, Photoshop). But it seems every .gif creator replaces the transparent background with something and I can't edit it back to transparent. Is it possible to have a .gif with a transparent "background"? Perhaps my knowledge of file formats is limiting me here.

    Read the article

  • Qu'est-ce qu'une carrière de développeur réussie ? Un bloggeur imagine la carrière catastrophe, un billet qui pousse à réflechir

    Qu'est-ce qu'une carrière de développeur réussie ? Un bloggeur imagine la carrière catastrophe, un billet qui pousse à réflechir Dans les métiers de l'informatique, les développeurs, un peu comme tous les employés, sont de plus en plus amenés à changer régulièrement d'entreprise, à la recherche de meilleures rémunérations, de meilleures conditions de travail ou de nouveaux défis. Durant sa carrière, le développeur risque donc de passer par des postes qu'il pense, avec du recul, n'avoir jamais du accepter. C'est en tout cas ce que relate Scott C. Reynolds, un bloggeur qui se définit lui-même comme "un collectionneur de rêves de carrières brisées".

    Read the article

< Previous Page | 25 26 27 28 29 30 31 32 33 34 35 36  | Next Page >