Search Results

Search found 29354 results on 1175 pages for 'scala 2 10'.

Page 35/1175 | < Previous Page | 31 32 33 34 35 36 37 38 39 40 41 42  | Next Page >

  • C++ Tutorial: 10 New STL Algorithms That Will Make You A More Productive Developer

    Unquestionably, the most effective tool for a C++ programmer's productivity is the Standard library's rich collection of algorithms. In 2008, about 20 new algorithms were voted into the C++0x draft standard. These new algorithms let you among the rest copy n elements intuitively, perform set theory operations, and handle partitions conveniently. Find out how to use these algorithms to make your code more efficient and intuitive.

    Read the article

  • Top 10 MySQL GUI Tools

    <b>Database Journal:</b> "Many third parties create rich applications to facilitate database management, database development and database administration. Here are ten outstanding graphical interfaces for MySQL."

    Read the article

  • Top 10 MySQL GUI Tools

    Many third parties create rich applications to facilitate database management, database development and database administration. Here are ten outstanding graphical interfaces for MySQL.

    Read the article

  • Top 10 MySQL GUI Tools

    Many third parties create rich applications to facilitate database management, database development and database administration. Here are ten outstanding graphical interfaces for MySQL.

    Read the article

  • O'Reilly Deal of the day - 10/June/2012 - Introducing HTML5 Game Development

    - by TATWORTH
    Today's deal of the day from O'Reilly at http://shop.oreilly.com/product/0636920022633.do?code=DEAL is Introducing HTML5 Game Development"Making video games is hard work that requires technical skills, a lot of planning, and—most critically—a commitment to completing the project. With this hands-on guide, you’ll learn step-by-step how to create a real 2D game from start to finish. In the process, you’ll use Impact, the JavaScript game framework that works with HTML5’s Canvas element. Not only will you pick up important tips about game design, you’ll also learn how to publish Impact games to the Web, desktop, and mobile—including a method to package your game as a native iOS app. Packed with screen shots and sample code, this book is ideal for game developers of all levels."

    Read the article

  • Dell Mini 10 Mouse Pad Problems

    - by MetaDark
    After going from 10.04 - 10.10 (not upgraded, completely reinstalled because of upgrade issues) I found a weird problem with my mouse pad. Whenever I clicked on the left or right mouse buttons (integrated into the touch pad) when I released them, it seemed like it was detecting a double click and ended up choosing the option the mouse was hovering over. Has anyone else experienced issues like this, and if it is possible, could I fix it?

    Read the article

  • 10 Steps to Optimizing Your Website

    Years ago, when I first started doing SEO work, I remember being frustrated by thousands of articles which offered little to no information on how to optimize a web site. Since that time, I have learned a lot through trial and error.

    Read the article

  • Winforms Release History : Q1 2010 SP2 (version 2010.1.10.504)

    Telerik Presentation Framework ADDED: VS2010 support for the examples ADDED: Base line support FIXED: A memory leak in some controls which support UI virtualization.Visual Style Builder ADDED: Association for *.tssp files, which are now automatically loaded in the VSB when double-clicked. ADDED: Drag-and-drop support in VSB for *.tssp files. ADDED: All dialogs support default buttons, that is, they can be closed with the Escape or Enter keys. ADDED: States and repository items can be removed with...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • The Ultimate Tar Command Tutorial with 10 Practical Examples

    <b>The Geek Stuff:</b> "In this article, let us review various tar examples including how to create tar archives (with gzip and bzip compression), extract a single file or directory, view tar archive contents, validate the integrity of tar archives, finding out the difference between tar archive and file system, estimate the size of the tar archives before creating it"

    Read the article

  • Top 10 Things to do to Prepare for Fusion Applications

    Cliff speaks with Nadia Bendjedou, Product Strategy Director for Oracle's Fusion Upgrade Office, about ways customers can prepare their current Oracle investment for Fusion by leveraging best practices, taking advantage of Oracle's Fusion Architecture and Fusion Middleware, and moving to SOA-based Integration.

    Read the article

  • Moving Data From Excel to SQL Server - 10 Steps to Follow

    SQL Server Integration Services provide a versatile way of reading Excel files into SQL Server. A task like this illustrates the advantages of the graphical approach of SSIS. Andy Brown explains. Want to work faster with SQL Server?If you want to work faster try out the SQL Toolbelt. "The SQL Toolbelt provides tools that database developers as well as DBAs should not live without." William Van Orden. Download the SQL Toolbelt here.

    Read the article

  • 10 Ways to Explore Linux

    <b>Daniweb:</b> "When I started exploring Linux back in 1994-1995, there were very few resources available and many of the problems I experienced didn't have solutions. That was a long time ago. The situation has changed for the better."

    Read the article

  • 10 Steps to Optimizing Your Website

    Years ago, when I first started doing SEO work, I remember being frustrated by thousands of articles which offered little to no information on how to optimize a web site. Since that time, I have learned a lot through trial and error.

    Read the article

  • UK Data Breaches Up by 10 fold in 10 years.

    - by TATWORTH
    At http://www.v3.co.uk/v3-uk/news/2201863/uk-data-breaches-rocket-by-1-000-percent-over-past-five-years there is an interesting report on the increase in data breaches reported in the UK.A lot of this increase may simply a change in legislation that has made reporting a statutory obligation.Some questions to ask yourself:Are server logs checked for untoward activity?Do you have a reporting policy if something is amiss?Did you design security in for the start of your application design?Do you log for example failed logons?Do you run tools to check for code integrity?Is my defense, a strategy of defense in depth?Do you realise that 60% of hack attacks are internal?Whilst SQL Injection is a problem that affects practically all application code platforms, within Microsoft Applications do you run FXCOP? Do you run any of the other free tools for checking?

    Read the article

< Previous Page | 31 32 33 34 35 36 37 38 39 40 41 42  | Next Page >