Search Results

Search found 24879 results on 996 pages for 'prime number'.

Page 295/996 | < Previous Page | 291 292 293 294 295 296 297 298 299 300 301 302  | Next Page >

  • Mexico Minimum Wage Changes - Payroll Patches Available

    - by LuciaC
    Mexico has published new Minimum Wage values effective November 27th 2012.  The following Payroll patches have been released to update the Minimum Wages:  Release  Patch Number  11i Patch 15919087  12.0.x Patch 15920839:R12.PAY.A  12.1.x Patch 15920839:R12.PAY.B Please note the following: the Minimum Wage values have been updated and they are effective from November 27th 2012 these patches are different from all other statutory updates (there are additional post installation steps), so please be sure to carefully read the entire patch readme before beginning to install these patches to ensure successful processing.

    Read the article

  • Increasing the Ranking of Sites

    In today's markets the most efficient way to advertise business is through the internet, which has continued to have increasing number of users; therefore more and more business are having websites that show all that the organization has to offer the customers. However, there are some businesses that still don't know the importance of campaign for their business using the SEO. There are numerous companies that offer business free site analysis whereby the business owner is given a step by step guide on what would work best with the site that the business has.

    Read the article

  • Random enemy placement on a 2d grid

    - by Robb
    I want to place my items and enemies randomly (or as randomly as possible). At the moment I use XNA's Random class to generate a number between 800 for X and 600 for Y. It feels like enemies spawn more towards the top of the map than in the middle or bottom. I do not seed the generator, maybe that is something to consider. Are there other techniques described that can improve random enemy placement on a 2d grid?

    Read the article

  • JavaOne 2013: (Key) Notes of a conference – State of the Java platform and all the roadmaps by Amis

    - by JuergenKress
    Last week’s JavaOne conference provided insights in the roadmap of the Java platform as well as in the current state of things in the Java community. The close relationship between Oracle and IBM concerning Java, the (continuing) lack of such a relationship with Google, the support from Microsoft for Java applications on its Azure cloud and the vibrant developer community – with over 200 different Java User Groups in many countries of the world. There were no major surprises or stunning announcements. Java EE 7 (release in June) was celebrated, the progress of Java 8 SE explained as well as the progress on Java Embedded and ME. The availability of NetBeans 7.4 RC1 and JDK 8 Early Adopters release as well as the open sourcing of project Avatar probably were the only real news stories. The convergence of JavaFX and Java SE is almost complete; the upcoming alignment of Java SE Embedded and Java ME is the next big consolidation step that will lead to a unified platform where developers can use the same skills, development tools and APIs on EE, SE, SE Embedded and ME development. This means that anything that runs on ME will run on SE (Embedded) and EE – not necessarily the reverse because not all SE APIs are part of the compact profile or the ME environment. However, the trimming down of the SE libraries and the increased capabilities of devices mean that a pretty rich JVM runs on many devices – such as JavaFX 8 on the Raspberry PI. The major theme of the conference was Internet of Things. A world of things that are smart and connected, devices like sensors, cameras and equipment from cars, fridges and television sets to printers, security gates and kiosks that all run Java and are all capable of sending data over local network connections or directly over the internet. The number of devices that has these capabilities is rapidly growing. This means that the number of places where Java programs can help program the behavior of devices is growing too. It also means that the volume of data generated is expanding and that we have to find ways to harvest that data, possibly do a local pre-processing (filter, aggregate) and channel the data to back end systems. Terms typically used are edge devices (small, simple, publishing data), gateways (receiving data from many devices, collecting and consolidating, pre-processing, sending onwards to back end – typically using real time event processing) and enterprise services – receiving the data-turned-information from the gateways to further consolidate, distribute and act upon. A cheap device like the Raspberry PI is a perfect way to get started as a Java developer with what embedded (device) programming means and how interaction with physical input and output takes place. Roadmaps The over all progress on Java is visualized in this overview: Read the full article here. WebLogic Partner Community For regular information become a member in the WebLogic Partner Community please visit: http://www.oracle.com/partners/goto/wls-emea ( OPN account required). If you need support with your account please contact the Oracle Partner Business Center. Blog Twitter LinkedIn Mix Forum Wiki Technorati Tags: Amis,OOW,Oracle OpenWorld,JavaOne,WebLogic,WebLogic Community,Oracle,OPN,Jürgen Kress

    Read the article

  • How can I use my keyboard as a mouse?

    - by Michael Durrant
    I'm using my keyboard more and more these days for basic command line stuff, vim editing, alt-tab window switching and the like. Q) How can I use my number pad keys to move the cursor around on the screen without using the mouse? I looked to try and install btnx as mentioned by others but it doesn't seem to exist anymore as an available package I also tried shift-numlock as mentioned by another but that didn't work either (just turns numlock on/off).

    Read the article

  • What's the canonical way to acknowledge many FOSS sources in a single project?

    - by boost
    I have a project which uses a large number of LGPL, Artistic and other open-source licensed libraries. What's the canonical (i.e. the "standard") way of acknowledging multiple sources in a single project download? Also, some of the sources I've used are from sites where using the code is okay, but publishing the source isn't. What's the usual manner of attribution in that case, and the usual manner of making the source available in an open-source project?

    Read the article

  • Plays Well With Others - Influence versus Authority

    - by KKline
    Originally appearing on http://KevinEKline.com on Nov 13, 2010 You’ve probably found that the prefix “lead” is a fairly common occurrence in the technology world. We have “lead developers”, “lead DBAs”, “lead architects”, and “lead consultants”. Yet, we don’t have “lead managers”, “lead directors”, or “lead VPs”. Why is that? Well, there are probably a number of different reasons for having “lead” technologist titles depending on who you ask. For example, the HR department might say that adding “lead”...(read more)

    Read the article

  • In-Store Tracking Gets a Little Harder

    - by David Dorf
    Remember how Nordstrom was tracking shopper movements within their stores using the unique number, called a MAC, emitted by the WiFi radio in smartphones?  The phones didn't need to connect to the network, only have their WiFi enabled, as most people do by default.  They did this, presumably, to track shoppers' path to purchase and better understand traffic patterns.  Although there were signs explaining this at the entrances, people didn't like the notion of being tracked.  (Nevermind that there are cameras in the ceiling watching them.)  Nordstrom stopped the program. To address this concern the Future of Privacy, a Washington think tank, created Smart Store Privacy, a do-not-track service that allows consumers to register their MAC address in much the same way people register their phone numbers in the national do-not-call list.  A group of companies agreed to respect consumers' wishes and ignore smartphones listed in the database.  The database includes Bluetooth identifiers as well.  Of course you could simply turn your bluetooth and WiFi off when shopping as well. Most know that Apple prefers to use BLE beacons to contact and track smartphones within their stores.  This feature extends the typical online experience to also work in physical stores.  By identifying themselves, shoppers can expect a more tailored shopping experience much like what we've come to expect from Amazon's website, with product recommendations and offers that are (usually) relevant. But the upcoming release of iOS8 is purported to have a new feature that randomizes the WiFi MAC address of smartphones during the "probing" phase.  That is, before connecting to the WiFi network, a random MAC number is used so as to keep the smartphone's real MAC address secret.  Unless you actually connect to the store's WiFi, they won't recognize the MAC address. The details on this are still sketchy, but if the random MAC is consistent for a short period, retailers will still be able to track movements anonymously, but they won't recognize repeat visitors.  That may be sufficient for traffic analytics, but it will stymie target marketing.  In the case of marketing, using iBeacons with opt-in permission from consumers will be the way forward. There is always a battle between utility and privacy, so I expect many more changes in this area.  Incidentally, if you'd like to see where beacons are being used this site tracks them around the world.

    Read the article

  • What's on Azure right now?

    - by RobbieT
    If you speak to Microsoft, they'll give you a number of active accounts, but what are those accounts actually running? It could be a collection of Hello World ASP.NET sites, or perhaps small exciting web start-ups, or maybe even the beginnings of large corporate moves to the cloud! I guess what I really wanted to know was who is using Azure but that's a much harder question to answer, so we'll stick to what for now. My super awesome comrade Theo Spears attempted to answer this by trawling every...(read more)

    Read the article

  • A Look at Keyword Search Optimization

    With the great influence of the Internet on a growing number of consumers these days, online marketing is now considered one of the best, if not the best, way to promote a business. This strategy offers greater possibilities for a business to be known enough to generate increasing revenues. Pinpointing the exact right techniques, however, will take some brainstorming which could be a critical stage because it requires a lot of time for marketers to determine on which tricks are, indeed, going to work and which will be a waste of time.

    Read the article

  • Path of Replication

    - by geeko
    I'm currently developing a replication system to keep data in-synch between an arbitrary number of servers. Some of these servers exist in one cluster on one LAN. Others exist somewhere else in the world. I'm wondering what are the pros/cons of different paths that we choose to flow replicated data on between servers? In other words, what are the different strategies to load balance the replication process ?

    Read the article

  • Will YouTube (or any video hosting service) provide a mp4 link to an uploaded video? [closed]

    - by DoubleJ
    I've looked into a number of video hosting options, but none seem to provide a .mp4 link to your uploaded video, which I require for use in a project using BigVideo.js. The only service I've found to provide this functionality so far is VimeoPro, which I can't afford. Is there any way to do this for free in YouTube? Or, otherwise, are there any other (preferably low- or no-cost) video hosting providers that will provide a .mp4 link?

    Read the article

  • April 2012 Patch Tuesday

    - by TATWORTH
    Next Tuesday, Microsoft will issue a number of critical patches. I urge you to apply the patches to your desktop PCs A.S.A.P. , then deploy to your test servers, test, get signoff and deploy to production.More information can be obtained at:http://www.computerworld.com/s/article/9225883/Microsoft_slates_critical_Windows_Office_IE_patches_next_week_including_head_scratcher_?taxonomyId=17http://technet.microsoft.com/en-us/security/bulletin/ms12-aprhttp://www.scmagazine.com/microsoft-to-sew-up-11-security-vulnerabilities-next-week/article/235396/http://www.zdnet.com/blog/security/microsoft-readies-patch-for-gaping-ie-browser-security-holes/11366

    Read the article

  • What's the best way to acknowledge many FOSS sources in a single project?

    - by boost
    I have a project which uses a large number of LGPL, Artistic and other open-source licensed libraries. What's the canonical (i.e. the "standard") way of acknowledging multiple sources in a single project download? Also, some of the sources I've used are from sites where using the code is okay, but publishing the source isn't. What's the usual manner of attribution in that case, and the usual manner of making the source available in an open-source project?

    Read the article

  • FTP Logon Restrictions in IIS 8

    - by The Official Microsoft IIS Site
    One of the biggest asks from our customers over the years was to provide a way to prevent brute-force password attacks on the FTP service. On several of the FTP sites that I host, I used to see a large number of fraudulent logon requests from hackers that were trying to guess a username/password combination. My first step in trying to prevent these kinds of attacks, like most good administrators, was to implement strong password requirements and password lockout policies. This was a good first step...(read more)

    Read the article

  • Configure hostgroups for Nagios

    <b>Ghacks:</b> "Say, for instance, you have a number of machines that serve as Web servers or Samba servers. Instead of having to scroll around to find them, you can group those machines together, by service, to make for much easier monitoring."

    Read the article

  • Why Unique and Quality Content?

    Its rightly said in the search engine optimization block that "Content Is King." This term is coined a hell of a lot number of times in the virtual world, then you can count. Let us have a look why is it so?

    Read the article

  • Epidemic 3.1 installation guide

    <b>LinuxBSDOS:</b> "Epidemic is a desktop-oriented, KDE, Debian-based (GNU/Linux) distribution developed in Brazil. Epidemic 3.1, the latest edition, features a number of custom tools and improvements."

    Read the article

  • ASP.NET AJAX MultiHandleSliderExtender - Slide by Year and Month

    In this tutorial, I will demonstrate how to use the MultiHandleSlider extender to select and display both the year and the month in a range. This control eliminates the need to use four DropDownlist controls to hold the range values and the need for a validation control. Then we will use the Column Chart to display number of cars on Sesame Street based on the selected range values. This chart allows the user to drill down into the details for the selected car brands.

    Read the article

  • What is the major stabilization factor in Linux ecosystem?

    - by developer
    The number of components in Linux ecosystem is permanently growing up. There are about thousands libraries, thousands device drivers, tens of thousands applications and tens of millions lines of code in the kernel maintained by thousands of volunteers. What is the greatest invention in the Linux/OSS that simplifies, organizes and stabilizes the development and growth of the platform? What is the major stabilization factor?

    Read the article

< Previous Page | 291 292 293 294 295 296 297 298 299 300 301 302  | Next Page >