Tech Tutorials Database
 GeekArticles Certification Microsoft MCSD

Sponsored Links

 
173 Articles.    Next Page   

Learn how to gather and analyze users specific requirements in .NET Solution Architectures. You will learn the benefits of UML as well as how to use it and you will see how to develop world-ready applications....

In this chapter learn how to rotate and flip photos apply searchable attributes control the sort order for thumbnails and conserve room by stacking related photos into groups....

There are many tools you can use to troubleshoot data failures. David Prowse focuses on the Windows Vista built-in Memory Diagnostic Tool for testing RAM and the chkdsk and SFC commands for checking the hard drive....

In this transcript of an oral history Grady Booch interviews SEI Fellow Watts Humphrey about his early life and formative experiences. In part 2 Humphrey talks about his stint in the Navy during World War II the college years his first job and wrestling....

Scott Seely explains when developers need to create a new endpoint versus just adding data. This higher level non-language specific article explains how to version REST services and when each choice makes sense....

To date most advice for a marriage of methods between experience design and agile development has focused on how experience designers can accommodate agile developers. In Part 2 of his two-part series author Larry Constantine delves in to the ingredients needed for improving the marriage between the two essential parts....

Your icon in a social media community is what identifies you to the members. These 3 tips can help you choose the right icon for engaging in social media....

John Traenkenschuh presents three simple tasks to help you secure your Windows 7 system create backups consider optional security software and control the interfaces to the system....

This chapter provides basic understanding for all types of ports and devices including I O ports input devices display types video connector types printing and multimedia devices....

How do you ensure that your third-party software vendors practice good software security Software security expert Gary McGraw explains how the Building Security In Maturity Model can play a central role in this effort....

When it comes to putting the craft back into programming a handful of names might come to mind and Corey Haines is one of them. Matthew Heusser talked with Corey to talk about software craft his journeyman project and that great big project he is working on next....

Expert programmer Jesse Smith shows you how you can expose parts of your Java application as RESTful Web services. You ll learn to leverage what you already have or with the new classes you create by making their functionality reusable through a JAX-RS Web service....

OpenCL C is based on C99 with some restrictions and specific extensions to the language for parallelism. In this chapter the authors describe how to write data-parallel kernels using OpenCL C and cover the features supported by OpenCL C....

While consumers and the media are increasingly aware of the risks to confidential information over web apps firms still tend to focus on development leaving data security until just before the go-live date. Ajay Gupta points out that last-minute steps are available to improve the security of your apps before launching them onto the Internet....

This chapter covers the characteristics of software engineering and management practices the contexts to consider and the examples that you can apply in Visual Studio VS . In this chapter you learn about the mechanisms that VS primarily Team Foundation Server TFS provides to support the team enacting the process....

173 Articles.    Next Page   

Sponsored Links

Sponsored Links

Subscribe via RSS

Subscribe to GeekArticles.com by Email

Enter your email address:

 Subscribe in a reader



 
 
 

Latest Comments

Sponsored Links