Archive

I'll let a trip abroad, and I want to present my updated application for review today, because I do not really want to take my laptop with me (even if it seems that I might have to). It is important that I briefly the application before I go back (mid-August) due to rush back to school for educational applications. The application is ready, but my distribution profile has expired. Website developer at the bottom right now, what are my options for the presentation of the application.

Read more

I wrote a small .NET Windows Forms application. And now I am determined to get opinions or comments from users. The user write something in an entry form and click the Send button. I want to take the easiest way. I do not want to host any web or other applications for data collection. Also, I do not have a database. Nothing. I just want to know what people think of the application. How would you?

Read more

According to my hypothesis, there are hundreds of millions of Chinese mobile phones (or clones branded phones) there. And it seems, firmware, and operating system for mobile phones are the same. These phones differ only in their design and can be material. I wonder if there is no software development kit or support the development of mobile telephony. What is the operating system and / or firmware included in these phones are those open source or get anyway available online Perform these phones support Java Where to find more information about these devices and software online.

Read more

I am a student of computer science and now learning about software engineering. I need to know that what is Process Modeling and to what extent we need it for software development and I also need to know what are the draw backs of Water Fall method for process modeling .

Read more

It is not specific to a language or a programming technology, but you know how to use programs such as Wireshark to read packets from your computer (or router, specifically) These packages can send secret information which must be encrypted somehow, like username and password for some systems contain. But even without this information, you can create these packages and receive the same information, right ! A related question type: When a router receives a packet, how does it feel to know what computer when multiple computers, direct connected to a local network.

Read more

I'm an Android VOIP application. I want to choose my type of codec based on processor power. Some audio codecs do not work well on some low-end devices. I want this program and do not decide when compiling. What are the criteria that will help you decide the CPU power and bandwidth available for processing: Here are some of them that I can think of: 1) CPU clock 2) memory Is there a standard method to determine the performance calculation based on statistics of memory / CPU It would be good to know if Android provides APIs for analyzing...

Read more

I modifying a website appearance (css modifications), but can not because of the annoying persistent cache to see the result on Chrome. I tried shift refresh but it does not work. How can I temporarily disable the cache or refresh the page in any way that I can see the changes.

Read more

I have a problem. I bought a small VPS and everything works fine. I have a directory and a password for it. And I have a name entry, see the IP address to another server. So when I click on the IP address: *** *** *** / directory without the username and password that I can go funny ... But when I click on the folder I use A: sitea.xxx.com/directory the protected area works is what I want. How can I fix this because I do not want people to see the files in that directory.

Read more

Is the Liskov Substitution Principle limited to Object Oriented Design (OOD) in C++ only or it has application in other programming languages such as Fortran or JAVA? If this principle cannot be adapted and applied, then which other similar design principle can be used for program design in FORTRAN or JAVA? How important is this principle to code maintenance and upgrade? Is it necessary to follow this principle? Will the work be less efficient if the Liskov principle is not followed?

Read more

I was wondering if some knowledgeable IT expert could give an overview of the potential of cloud computing to become a mainstream computing platform for delivering IT solutions to businesses and individuals. What advantages does cloud computing provide to businesses or the individual? Has cloud computing achieve any advances in terms of patronage and if so, would this trend continue into the future? Is there an alternative competitor to cloud computing?

Read more