Search Results

Search found 1211 results on 49 pages for 'lie ryan'.

Page 36/49 | < Previous Page | 32 33 34 35 36 37 38 39 40 41 42 43  | Next Page >

  • Google I/O 2010 - Fireside chat with the GWT team

    Google I/O 2010 - Fireside chat with the GWT team Google I/O 2010 - Fireside chat with the GWT team Fireside Chats, GWT Bruce Johnson, Joel Webber, Ray Ryan, Amit Manjhi, Jaime Yap, Kathrin Probst, Eric Ayers, lan Stewart, Christian Dupuis, Chris Ramsdale (moderator) If you're interested in what the GWT team has been up to since 2.0, here's your chance. We'll have several of the core engineers available to discuss the new features and frameworks in GWT, as well as to answer any questions that you might have. For all I/O 2010 sessions, please go to code.google.com From: GoogleDevelopers Views: 140 0 ratings Time: 58:32 More in Science & Technology

    Read the article

  • Google sort « Artic Sea », un SDK pour faire tourner du code natif dans Chrome

    Google sort « Artic Sea » Un SDK pour faire tourner du code natif dans Chrome Google voit le futur des applications en 100 % Cloud, ou presque. C'est donc tout naturellement qu'il décide de promouvoir une technologie que d'autres (Mozilla ou Opera) goutent assez peu : permettre d'exécuter du code natif (lié à une machine donnée donc), à travers le navigateur. L'intérêt pour Google est assez clair. Les applications Web ou une partie des applications) peuvent par exemple être écrites en C (mixant ainsi JavaScript et d'autres langages). En sortant son Native Client (dit « NaCl »), bapt...

    Read the article

  • Cosmic Journeys – Supermassive Black Hole at the Center of the Galaxy

    - by Akemi Iwaya
    Even though the center of our galaxy is obscured by thick dust and blinding starlight, that has not stopped scientists from piecing together clues about what may lie there. Sit back and enjoy a ‘cosmic journey’ with this excellent half-hour video from YouTube channel SpaceRip discussing what scientists have learned about the supermassive black hole at the center of our galaxy, and their work on getting a ‘direct image’ of it. Cosmic Journeys: Supermassive Black Hole at the Center of the Galaxy [YouTube]     

    Read the article

  • Google I/O 2012 - OAuth 2.0 for Identity and Data Access

    Google I/O 2012 - OAuth 2.0 for Identity and Data Access Ryan Boyd Users like to keep their data in one place on the web where it's easily accessible. Whether it's YouTube videos, Google Drive files, Google contacts or one of many other types of data, users need a way to securely grant applications access to their data. OAuth is the key web standard for delegated data access and OAuth 2.0 is the next-generation version with additional security features. This session will cover the latest advances in how OAuth can be used for data access, but will also dive into how you can lower the barrier to entry for your application by allowing users to login using their Google accounts. You will learn, through an example written in Python, how to use OAuth 2.0 to incorporate user identity into your web application. Best practices for desktop applications, mobile applications and server-to-server use cases will also be discussed. From: GoogleDevelopers Views: 11 1 ratings Time: 58:56 More in Science & Technology

    Read the article

  • Code Reuse and Abstraction in FP vs OOP

    - by Electric Coffee
    I've been told that code reuse and abstraction in OOP is far more difficult to do than it is in FP, and that all the claims that have been made about Object Orientedness (for lack of a better term) being great at reusing code have been flat out lies So I was wondering if anyone here could tell me why that is, and perhaps show me some code to back up these claims, I'm not saying I don't believe you Functional programmers, it's just that I've been "indoctrinated" to think Object Orientedly, and thus can't (yet) think Functionally enough to see it myself To quote Jimmy Hoffa (from an answer to one of my previous questions): The cake is a lie, code reuse in OO is far more difficult than in FP. For all that OO has claimed code reuse over the years, I have seen it follow through a minimum of times. (feel free to just say I must be doing it wrong, I'm comfortable with how well I write OO code having had to design and maintain OO systems for years, I know the quality of my own results) That quote is the basis of my question, I want to see if there's anything to the claim or not

    Read the article

  • A Six Step Plan for Introducing Kids to Tabletop RPGs

    - by Jason Fitzpatrick
    Introducing your kids, nieces and nephews, or other budding geeks to your geeky hobbies like role-playing games can be tricky. This handy plan lays out some simple steps to make RPGs fun for younger kids. Courtesy of Ryan Carlson over at Geek Dad, the six-step primer covers topics like simplifying the rules, varying task difficulty, fun character creation ideas, and ensuring there are adequate opportunities for in-game success. Hit up the link below for the full guide. Have a RPG-introduction success story or tip to share? Add to the conversation in the comments below. Running an Introductory Roleplaying Game for Kids [GeekDad] How To Use USB Drives With the Nexus 7 and Other Android Devices Why Does 64-Bit Windows Need a Separate “Program Files (x86)” Folder? Why Your Android Phone Isn’t Getting Operating System Updates and What You Can Do About It

    Read the article

  • Connect to new wireless network

    - by Shawn de Wet
    Wireless networking was working perfectly on my old adsl router. Then I moved to a new home that does not have adsl, and the router has been replaced with a new 3G one. I have worked through the following links: Connecting to a wireless network and http://ubuntuforums.org/showthread.php?t=571188 I have set the router from it's default WPA-PSK encryption to WEP encryption and also to No Encryption. But when I get to dhclient -wlan0, I keep getting No DHCPOFFERS received. Yet the 2 windows machines in my home connect fine to this wirelesss network (in all encryption settings). If I try iwlist scan I can see that the wireless network is indeed visible. Where do I start scratching to see where the problem may lie.

    Read the article

  • Google I/O 2010 - OpenID-based SSO & OAuth for Google Apps

    Google I/O 2010 - OpenID-based SSO & OAuth for Google Apps Google I/O 2010 - OpenID-based single sign on and OAuth data access for Google Apps Enterprise, Google APIs 201 Ryan Boyd, David Primmer A discussion of all the auth tangles you've encountered so far -- OpenID, SSO, 2-Legged OAuth, 3-Legged OAuth, and Hybrid OAuth. We'll show you when and where to use the APIs, code some example apps, and demonstrate how they all integrate with Google APIs and other developer products. We'll also talk about how these technologies relate to apps sold on the Google Apps Marketplace. For all I/O 2010 sessions, please go to code.google.com From: GoogleDevelopers Views: 8 0 ratings Time: 01:11:01 More in Science & Technology

    Read the article

  • Google I/O 2010 - Keynote Day 1

    Google I/O 2010 - Keynote Day 1 Google I/O 2010 - Keynote Day 1 Video footage from Day 1 keynote at Google I/O 2010 Vic Gundotra, Engineering Vice President, Google Sundar Pichai, Vice President, Product Management, Google Charles Pritchard, Founder, MugTug Jim Lanzone, CEO, Clicker Mike Shaver, VP Engineering, Mozilla Corporation Håkon Wium Lie, CTO, Opera Software Kevin Lynch, CTO, Adobe Systems Terry McDonell, Editor, Sports Illustrated Group Lars Rasmussen, Manager, Google Wave David Glazer, Engineering Director, Google Paul Maritz, President & CEO, VMware Ben Alex, Senior Staff Engineer, SpringSource Division of VMware, Bruce Johnson, Engineering Director, Google Kevin Gibbs, Software Engineer, Google For all I/O 2010 sessions, please go to code.google.com From: GoogleDevelopers Views: 2 1 ratings Time: 02:05:08 More in Science & Technology

    Read the article

  • Help identifying device and driver for 0bda:1724

    - by user104547
    I've got a new Lenovo Ideapad Yoga 13. The onboard lan/bluetooth device is identified in Linux as 0bda:1724 (via lsusb). No network peripherals are reported from lspci. From the interwebs, the vendor:product above looks to be RT2573, however, in Windows, the device is identified as RTL8723A. Unfortunately, I have followed both roads, trying rt2500usb, rt2x00usb, and rtl8723e. I have emailed Realtek asking them for help but so far my email has fallen on deaf ears. I've posted the output of lspci -nn -v and lsusb -v to: http://pastebin.com/dqvTSVjF Any help at all would be appreciated. Thank you, Ryan

    Read the article

  • Google I/O 2010 - GWT's UI overhaul

    Google I/O 2010 - GWT's UI overhaul Google I/O 2010 - GWT's UI overhaul: UiBinder, ClientBundle, and Layout Panels GWT 201 Joel Webber, Ray Ryan There have been some really huge improvements in GWT's UI fundamentals over the past year. We've introduced features such as UiBinder, ClientBundle, CssResource, and über layout panels that allow you to build fast UIs in a sane manner. Come see how fun/easy/fast it can be to use these technologies in harmony to overhaul your UI. For all I/O 2010 sessions, please go to code.google.com From: GoogleDevelopers Views: 9 1 ratings Time: 01:00:11 More in Science & Technology

    Read the article

  • How to make people new to programming stop asking me questions and distracting me?

    - by Radek S
    I am at secondary school right now and I'm the only one in my class who is experienced with programming. Because of that, people are constantly distracting me while I'm writing code to ask me to solve a problem. Usually I reply with something like 'I don't know, I never use that' but I don't want to lie to people. Another problem is that I became so well known for this that even students from other classes are asking me questions. I find this damn annoying. Thirdly, if I solve a problem for them they don't learn anything from it. How can I stop people from asking me programming-related questions in a kind way? I really don't like the lessons anymore (I am also punished with the need to use Windows, but that's less of an issue), but just don't visiting them is illegal by law.

    Read the article

  • BigQuery - Best Practices for Running Queries on Massive Datasets

    BigQuery - Best Practices for Running Queries on Massive Datasets Join Michael Manoochehri and Ryan Boyd from the big data Developer Relations team on Friday, September 21th, at 10am PDT, as they discuss best practices for answering questions about massive datasets with Google BigQuery. They'll explore interesting Big Data use cases with some of our public datasets, using BigQuery's SQL-like language to return query results in seconds. They will also cover some of BigQuery's unique query functions as well. For a general overview of BigQuery, watch our overview video: youtu.be Please use the moderator below (goo.gl to ask your questions, which will be answered live! More info here: developers.google.com From: GoogleDevelopers Views: 0 0 ratings Time: 00:00 More in Science & Technology

    Read the article

  • Setting up Windows Azure PowerShell

    - by Sahil Malik
    SharePoint, WCF and Azure Trainings: more information Azure is in the cloud, PowerShell is on my machine, between the two lie vast oceans and dragons. What is a developer to do, to use PowerShell to work with Azure? Here is what you do, Install Windows Azure PowerShell Start WebPI, search for “Windows Azure PowerShell” – choose to add and install it. Run Windows Azure PowerShell This is easy, click on start (or whatever the hell you do in Windows 2012), and search for Windows Azure PowerShell. Connect your subscription  Read full article ....

    Read the article

  • How can I test if a point lies between two parallel lines?

    - by Harold
    In the game I'm designing there is a blast that shoots out from an origin point towards the direction of the mouse. The width of this blast is always going to be the same. Along the bottom of the screen (what's currently) squares move about which should be effected by the blast that the player controls. Currently I am trying to work out a way to discover if the corners of these squares are within the blast's two bounding lines. I thought the best way to do this would be to rotate the corners of the square around an origin point as if the blast were completely horizontal and see if the Y values of the corners were less than or equal to the width of the blast which would mean that they lie within the effected region, but I can't work out

    Read the article

  • SilverlightShow for 20-26 Dec 2010

    - by Dave Campbell
    Check out the Top Five most popular news at SilverlightShow for last week (20 - 26 Dec 2010). The most popular news for last week is Ryan Alford's solution on handling an error in Silverlight 4 when using Entity Framework 4, followed by Jeremy Likness' video on building an RSS Feed Reader in Silverlight. Here is SilverlightShow's weekly top 5: Silverlight 4 - Productivity Power Tools and EF4 A Silverlight MVVM Feed Reader from Scratch in 30 Minutes Resizable Grid Using Thumb Controls A Simplified Grid Markup for Silverlight and WPF Announcing the Winner of Telerik Silverlight controls in SilverlightShow Post-webinar Survey Visit and bookmark SilverlightShow. Stay in the 'Light

    Read the article

  • Intel prévoit de lancer des smartphones tournant sous Windows 8, contrairement aux voeux de Microsoft

    Intel prévoit de lancer des smartphones tournant sous Windows 8, contrairement aux voeux de Microsoft Juste après avoir annoncé ses profits records pour 2010, Intel a donné quelques informations sur son futur, et une partie de celui-ci sera lié à Microsoft. En effet, Paul Otellini (CEO de la compagnie) a réagit au portage de la prochaine génération de Windows sur la plateforme ARM, action dans laquelle il perçoit des avantages pour sa propre société. "Le plus pour Intel, c'est qu'avec l'unification de leurs systèmes d'exploitation, nous avons désormais pour la première fois avoir un OS tactile pour tablettes compatible avec nos produits. Nous pourrons insérer nos processeurs low-power tournant sous Windows 8 dans des téléphone...

    Read the article

  • Did Microsoft Add Wiretapping Capability to Skype?

    Ryan Gallagher, writing for Slate, put two and two together from a lot of no comments. He noted that back in 2007, German police forces said that they couldn't tap into Skype calls because of of its strong encryption and complicated peer-to-peer network connections; in fact, Skype bluntly stated at the time that, due to its encryption and architecture techniques, it couldn't conduct wiretaps. But that may have changed. Gallagher cited a Forbes article that claims the hacker community is talking about recent changes to Skype's architecture and whether they will allow users to be wiretapped. ...

    Read the article

  • Google I/O 2010 - Architecting GWT apps

    Google I/O 2010 - Architecting GWT apps Google I/O 2010 - Architecting GWT applications for production at Google GWT 301 Ray Ryan For large GWT applications, there's a lot you should think about early in the design of your project. GWT has a variety of technologies to help you, but putting it all together can be daunting. This session walks you through how teams at Google architect production-grade apps, from design to deployment, using GWT. For all I/O 2010 sessions, please go to code.google.com From: GoogleDevelopers Views: 8 1 ratings Time: 01:00:05 More in Science & Technology

    Read the article

  • Google BigQuery - Best Practices for Loading your Data and open Office Hours

    Google BigQuery - Best Practices for Loading your Data and open Office Hours Michael Manoochehri and Ryan Boyd from the DevRel team for cloud data services will be streaming to you live! They'll be discussing how to load your data into BigQuery and the various options available -- from commercial ETL tools to App Engine's Pipeline API and MapReduce frameworks, to simple UNIX command-line tools. They'll then open it up for a general office hours on ingestion and other topics. Please use the moderator link to ask your questions. From: GoogleDevelopers Views: 0 0 ratings Time: 00:00 More in Science & Technology

    Read the article

  • Google I/O 2012 - Crunching Big Data with BigQuery

    Google I/O 2012 - Crunching Big Data with BigQuery Jordan Tigani, Ryan Boyd Google BigQuery is a data analysis tool born from Google internal technologies. It enables developers to analyze terabyte data sets in seconds using a RESTful API. This session will dive into best practices for getting fast answers to business questions. We'll provide insight into how we process queries under the hood and how to construct SQL queries for complex analysis. For all I/O 2012 sessions, go to developers.google.com From: GoogleDevelopers Views: 1 0 ratings Time: 01:03:04 More in Science & Technology

    Read the article

  • BigQuery: Simple example of a data collection and analysis pipeline + Your questions

    BigQuery: Simple example of a data collection and analysis pipeline + Your questions Join Michael Manoochehri and Ryan Boyd live to talk about Google BigQuery. We'll give an overview of how we're using our cars, phones, App Engine and BigQuery to collect and analyze data. We'll be discussing our trusted tester feature which allows analyzing data from the App Engine datastore. We'll also review some of the more interesting questions from Stack Overflow and take questions via Google Moderator. From: GoogleDevelopers Views: 250 16 ratings Time: 26:53 More in Science & Technology

    Read the article

  • What can I do when the interviewer doesn't know the answer to his/her own question?

    - by bjskishore123
    Yesterday I had a terrible experience in an interview. Interviewer asked me about pure virtual function. I said, It may or may not have definition in base class, but derived classes should provide definition unless they also want to be abstract class. But interviewer kept on asking that "Can pure virtual have definition !!! ???"... I said yes. Again he said "Pure ?" I said yes. It is allowed, derived classes can explicitly call that function if they want that particular behavior. He sent me out. I am sure that he doesn't know the fact that pure virtual function can have definition. How to deal with this kind of Interviewers ? After asking 2nd time, should i lie that it can't have definition ? :) Or i should stick to my words and loose the job opportunity ?

    Read the article

  • Internet Explorer 9 téléchargé plus de 2,3 millions de fois en 24 heures, depuis son lancement

    Internet Explorer 9 téléchargé plus de 2,3 millions de fois En 24 heures, depuis son lancement Microsoft se félicite des premiers résultats de son nouveau navigateurs. Internet Explorer 9 a été téléchargé plus de 2,3 millions de fois en 24 heures (2,35 millions de fois pour être précis) depuis son lancement officiel. « Cela représente 27 téléchargements par secondes... Woua ! », se réjouit Ryan Gavin de l'équipe Windows de Microsoft. Ce démarrage est deux fois plus rapide que celui de la beta de IE9 et quatre fois plus que ce...

    Read the article

  • LOPPSI 2 adoptée par l'Assemblée Nationale, le filtrage des sites se fera sans regard de la CNIL ou d'un juge

    LOPPSI 2 adoptée par l'Assemblée Nationale, le filtrage des sites se fera sans regard de la CNIL ou d'un juge Mise à jour du 22.12.2010 par Katleen Hier, l'Assemblée Nationale a adopté le projet de loi LOPPSI 2, dont son sulfureux article 4, dans une nouvelle version (le tout devra encore être définitivement approuvé par le Sénat en janvier pour être promulgué). L'article qui fait polémique porte sur le filtrage administratif du Net, pour "lutter contre la pédopornographie", et inquiète fortement internautes et certains acteurs du Web. Il est jugé dangereux (nous vous en parlions déjà, voir news précédentes). C'est l'OCLCTIC (Office Central de Lutte contre la Criminalité lié...

    Read the article

< Previous Page | 32 33 34 35 36 37 38 39 40 41 42 43  | Next Page >