Search Results

Search found 17770 results on 711 pages for 'repository design'.

Page 396/711 | < Previous Page | 392 393 394 395 396 397 398 399 400 401 402 403  | Next Page >

  • Good Introductory Books on Writing Secure Software

    - by cosmic.osmo
    What are some good introductory books about writing secure software? Specifically, one that covers basic strategies and design patterns for writing a secure software and surveys common security vulnerabilities, how they're exploited, and how you can protect against them. Personally, I've picked up bits of security know-how here and there over my career, but now I'd like a more systematic overview.

    Read the article

  • Does Using ASP Or PHP Affect Your SEO Strategies?

    We most often hear web developers as well as website design development companies asking in forums and developer boards about use of ASP, PHP & other scripting language and its possible negative effects on search engine optimization and effective SEO strategies for the website. There are many server side based scripting languages such as ASP, PHP, Cold Fusion, Python, and Pearl; among which PHP & ASP are more common.

    Read the article

  • Fedora 13 in detail

    <b>The H Open:</b> "Known as "Goddard", Fedora 13 not only boasts a current software selection and a modernised design, it also offers an extensive range of technological improvements."

    Read the article

  • 3 Important Questions to Ask Google Analytics

    With dozens of free web analytics tools available in the market, Google Analytics stands out because it provides data like no other tool does. Just add a few lines of JavaScript code to your website';... [Author: Debbie Everson - Web Design and Development - April 02, 2010]

    Read the article

  • Using WF4 WorkflowInvoker

    This article describes a design, implementation and usage of the custom service operation invoker for invoking a xaml workflow. It is based on the upcoming Microsoft .NET 4 Technology.

    Read the article

  • Software Agent construction guidelines

    - by lsoto
    I'm currently studying a Master in Computer Science and I am interested in working with Software Agents and C#. I have found so much information regarding theoretical aspects but just a few articles focused on practical programming aspects such as architecture, design or implementation. Could anybody suggest any good source that I could explore? I wouldn't like to "reinvent the wheel" but to contribute with something better to the current state of the art.

    Read the article

  • Access Control Lists for Roles

    - by Kyle Hatlestad
    Back in an earlier post, I wrote about how to enable entity security (access control lists, aka ACLs) for UCM 11g PS3.  Well, there was actually an additional security option that was included in that release but not fully supported yet (only for Fusion Applications).  It's the ability to define Roles as ACLs to entities (documents and folders).  But now in PS5, this security option is now fully supported.   The benefit of defining Roles for ACLs is that those user roles come from the enterprise security directory (e.g. OID, Active Directory, etc) and thus the WebCenter Content administrator does not need to define them like they do with ACL Groups (Aliases).  So it's a bit of best of both worlds.  Users are managed through the LDAP repository and are automatically granted/denied access through their group membership which are mapped to Roles in WCC.  A different way to think about it is being able to add multiple Accounts to content items...which I often get asked about.  Because LDAP groups can map to Accounts, there has always been this association between the LDAP groups and access to the entity in WCC.  But that mapping had to define the specific level of access (RWDA) and you could only apply one Account per content item or folder.  With Roles for ACLs, it basically takes away both of those restrictions by allowing users to define more then one Role and define the level of access on-the-fly. To turn on ACLs for Roles, there is a component to enable.  On the Component Manager page, click the 'advanced component manager' link in the description paragraph at the top.   In the list of Disabled Components, enable the RoleEntityACL component. Then restart.  This is assuming the other configuration settings have been made for the other ACLs in the earlier post.   Once enabled, a new metadata field called xClbraRoleList will be created.  If you are using OracleTextSearch as the search indexer, be sure to run a Fast Rebuild on the collection. For Users and Groups, these values are automatically picked up from the corresponding database tables.  In the case of Roles, there is an explicitly defined list of choices that are made available.  These values must match the roles that are coming from the enterprise security repository. To add these values, go to Administration -> Admin Applets -> Configuration Manager.  On the Views tab, edit the values for the ExternalRolesView.  By default, 'guest' and 'authenticated' are added.  Once added, you can assign the roles to your content or folder. If you are a user that can both access the Security Group for that item and you belong to that particular Role, you now have access to that item.  If you don't belong to that Role, you won't! [Extra] Because the selection mechanism for the list is using a type-ahead field, users may not even know the possible choices to start typing to.  To help them, one thing you can add to the form is a placeholder field which offers the entire list of roles as an option list they can scroll through (assuming its a manageable size)  and view to know what to type to.  By being a placeholder field, it won't need to be added to the custom metadata database table or search engine.  

    Read the article

  • non randomic enemy movement implementation

    - by user601836
    I would like to implement enemy movement on a X-Y grid. Would it be a good idea to have a predefined table with an initial X-Y position and a predefined "surveillance path"? Each enemy will follow its path until it detects a player, at this point it will start chasing it using a chasing algorithm. According to a friend of mine this implementation is good because the design of a good path will provide to the user a sort of reality sensation.

    Read the article

  • Separating logic and data in browser game

    - by Tesserex
    I've been thinking this over for days and I'm still not sure what to do. I'm trying to refactor a combat system in PHP (...sorry.) Here's what exists so far: There are two (so far) types of entities that can participate in combat. Let's just call them players and NPCs. Their data is already written pretty well. When involved in combat, these entities are wrapped with another object in the DB called a Combatant, which gives them information about the particular fight. They can be involved in multiple combats at once. I'm trying to write the logic engine for combat by having combatants injected into it. I want to be able to mock everything for testing. In order to separate logic and data, I want to have two interfaces / base classes, one being ICombatantData and the other ICombatantLogic. The two implementers of data will be one for the real objects stored in the database, and the other for my mock objects. I'm now running into uncertainties with designing the logic side of things. I can have one implementer for each of players and NPCs, but then I have an issue. A combatant needs to be able to return the entity that it wraps. Should this getter method be part of logic or data? I feel strongly that it should be in data, because the logic part is used for executing combat, and won't be available if someone is just looking up information about an upcoming fight. But the data classes only separate mock from DB, not player from NPC. If I try having two child classes of the DB data implementer, one for each entity type, then how do I architect that while keeping my mocks in the loop? Do I need some third interface like IEntityProvider that I inject into the data classes? Also with some of the ideas I've been considering, I feel like I'll have to put checks in place to make sure you don't mismatch things, like making the logic for an NPC accidentally wrap the data for a player. Does that make any sense? Is that a situation that would even be possible if the architecture is correct, or would the right design prohibit that completely so I don't need to check for it? If someone could help me just layout a class diagram or something for this it would help me a lot. Thanks. edit Also useful to note, the mock data class doesn't really need the Entity, since I'll just be specifying all the parameters like combat stats directly instead. So maybe that will affect the correct design.

    Read the article

  • New Interaction Hub Statement of Direction Published

    - by Matthew Haavisto
    The latest PeopleSoft Interaction Hub Statement of Direction is now available on My Oracle Support.  We think this subject will be particularly interesting to customers given the impending release of the PeopleSoft Fluid User Experience and all that offers.  The Statement of Direction describes how we see the Interaction Hub being used with the new user experience and the Hub's continued place in a PeopleSoft environment.  This paper also discusses subjects like branding, content management, easier design/deployment, and the optional restricted use license.

    Read the article

  • A Website With Smartly Placed Content In It

    Quality website as well as blog content has the ability to attract many unexpected visitors to your sites and if you spice your fresh content with the right keywords then you can be almost confident ... [Author: Alan Smith - Web Design and Development - May 13, 2010]

    Read the article

  • Why doesn't InkScape recognize the Ubuntu color palettes?

    - by Octavian Damiean
    InkScape 0.48.2 refuses to show my newly added Ubuntu color palettes in the color palettes selection menu. I have downloaded the Ubuntu color palettes for GIMP/InkScape from design.canonical.com, extracted the files and copied them to /usr/share/inkscape/palettes/ where all the other color palettes are. I've even made sure that all the files have the same rights, just in case. What am I missing?

    Read the article

  • Vattenfall Accelerates Projects and Cuts Costs with AutoVue Document Visualization

    Ringhals, a Swedish nuclear power plant, part of the Vattenfall Group, produces 20 percent of the country's electricity and is the largest power station in the Nordic region. Ringhals has standardized on AutoVue for most of their engineering and asset document visualization requirements throughout their plant maintenance, design and engineering operations. As a result, they have cut IT maintenance costs, increased productivity, and improved maintenance operations.

    Read the article

  • Does Your Website Have ?Calls to Action??

    Does your website have ?Calls to Action?? If your answer is ?NO? then you have greatly diminished the ?Goal Realization Capability? of your website. Think about an interested visitor to your websit... [Author: Neil Paige - Web Design and Development - September 03, 2009]

    Read the article

  • Le Lumia 635 débarque en France avec Windows Phone 8.1 et la 4G pour un petit prix

    Le Lumia 635 débarque en France avec Windows Phone 8.1 et la 4G pour un petit prixDévoilé en avril dernier lors de la conférence Build de Microsoft, le Lumia 635 débarque en France avec le système d'exploitation mobile Windows Phone 8.1.Nokia revient au devant de la scène avec un smartphone low cost (169 euros TTC), qui bénéficie de l'expertise du constructeur et des spécificités (design et fonctionnalités des smartphones Lumia haut de gamme) de la gamme Lumia.Le Lumia 635 repose sur un processeur...

    Read the article

  • Graphic Designing in the Corporate Business World

    Every company or business organization wants to craft a positive brand identity of their own in the market and make people brand aware so that desired profits are gained. We all identify our favorite... [Author: Alan Smith - Web Design and Development - June 11, 2010]

    Read the article

  • I Have A Website, Why Do I Need A Blog?

    A website is a great tool to have, however while I believe it is the most important tool of your online marketing, it should not stand alone. Social media, and specifically a blog should be used in c... [Author: Eric Schuster - Web Design and Development - April 21, 2010]

    Read the article

  • Download Singularity Source Code

    - by Editor
    The Singularity Research Development Kit (RDK) is based on the Microsoft Research Singularity project. It includes source code, build tools, test suites, design notes, and other background materials. The Singularity RDK is for academic non-commercial use and is governed by this license. Singularity is a research project focused on the construction of dependable [...]

    Read the article

  • Windows Web Hosting: Why Go There?

    I work in the IT field over the last six years. I';ve always been confused about web hosting, especially on the types of hosting. This always used to confuse me, what is the best Linux or Windows? M... [Author: Danny Higson - Web Design and Development - June 09, 2010]

    Read the article

  • What legal considerations do I need to have when programming?

    - by JustJohn
    Recently I worked with a group to create a logging system for tutoring labs to track Tutor hours, and usage of the labs. We had to change the design a fair amount to be in compliance with FERPA. My question stems from the curiosity that in my course of study there has never been a real mention of how people in this field have to deal with complying with the law in their work. So I would like to know how much programmers have to consider the law in the work they do.

    Read the article

< Previous Page | 392 393 394 395 396 397 398 399 400 401 402 403  | Next Page >