Programming4us
         
 
 
Programming
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 >  |  Displaying page 9 of 14, items 241 to 270 of 398.
Security Management in the Cloud - Security Vulnerability, Patch, and Configuration Management (part 2)
The ability for malware (or a cracker) to remotely exploit vulnerabilities of infrastructure components, network services, and applications remains a major threat to cloud services.
Security Management in the Cloud - Security Vulnerability, Patch, and Configuration Management (part 1)
The ability for malware (or a cracker) to remotely exploit vulnerabilities of infrastructure components, network services, and applications remains a major threat to cloud services.
Security Management in the Cloud - Access Control
Generally speaking, access control management is a broad function that encompasses access requirements for your users and system administrators (privileged users) who access network, system, and application resources
Security Management in the Cloud - IaaS Availability Management
Availability considerations for the IaaS delivery model should include both a computing and storage (persistent and ephemeral) infrastructure in the cloud. IaaS providers may also offer other services such as account management, a message queue service, an identity and authentication service, a database service, a billing service, and monitoring services
Security Management in the Cloud - PaaS Availability Management
In a typical PaaS service, customers (developers) build and deploy PaaS applications on top of the CSP-supplied PaaS platform. The PaaS platform is typically built on a CSP owned and managed network, servers, operating systems, storage infrastructure, and application components (web services)
Security Management in the Cloud - SaaS Availability Management
By virtue of the service delivery and business model, SaaS service providers are responsible for business continuity, application, and infrastructure security management processes.
Security Management in the Cloud - Availability Management
Cloud services are not immune to outages, and the severity and scope of impact to the customer can vary based on the outage situation. Similar to any internal IT-supported application, business impact due to a service outage will depend on the criticality of the cloud application and its relationship to internal business processes
Security Management in the Cloud
The Information Technology Infrastructure Library (ITIL) is a set of best practices and guidelines that define an integrated, process-based approach for managing information technology services.
The Art of SEO : Trending, Seasonality, and Seasonal Fluctuations in Keyword Demand
One of the subtleties of keyword research, and of any fully developed SEO strategy, is that the use of keywords varies significantly over time. For instance, major holidays inevitably lead to bursts of keyword volume related to those holidays.
The Art of SEO : Leveraging the Long Tail of Keyword Demand
The long tail of search queries in a given industry is typically not visible via any of the major keyword research services or search engine ad databases. In these instances, there is a research method to find those terms that can carry value, but it requires a good amount of research and analysis.
The Art of SEO : Determining Keyword Value/Potential ROI
Once you have the raw keyword data from the research with your favorite tools, you need to analyze which tools have the highest value and the highest ROI. Unfortunately, there are no simple ways to do this, but we will review some of the things you can do in this section.
Identity and Access Management : Cloud Service Provider IAM Practice
Medium-size and large organizations usually have specific requirements for authorization features for their cloud users (i.e., assignment of privileges, or entitlements, to users based on their job functions)
Identity and Access Management : Cloud Authorization Management
Medium-size and large organizations usually have specific requirements for authorization features for their cloud users (i.e., assignment of privileges, or entitlements, to users based on their job functions)
Identity and Access Management : IAM Practices in the Cloud (part 2) - Federated Identity
In this architecture, cloud services will delegate authentication to an organization’s IdP. In this delegated authentication architecture, the organization federates identities within a trusted circle of CSP domains
Identity and Access Management : IAM Practices in the Cloud (part 1) - Cloud Identity Administration
In the current state of IAM technology, standards support by CSPs (SaaS, PaaS, and IaaS) is not consistent across providers. Although large providers such as Google, Microsoft, and Salesforce.com seem to demonstrate basic IAM capabilities, our assessment is that they still fall short of enterprise IAM requirements for managing regulatory, privacy, and data protection requirements
iPad SDK : Keyboard Extensions and Replacements (part 4) - Creating the Calculator
We're now going to define our app's view controller, which does the actual work of being a calculator.
iPad SDK : Keyboard Extensions and Replacements (part 3) - Creating the Keyboard Input View
Now let's create the GUI. Use the New File Assistant once again to make a new view .xib resource, naming it RpnKeyboard. Open the RpnKeyboard.xib file in Interface Builder, select the File's Owner proxy icon, and use the identity inspector to set its class to InputView.
iPad SDK : Keyboard Extensions and Replacements (part 2)
We're going to implement a simple calculator that uses a normal UITextView object as an input field. Instead of letting the users enter any sort of text they want, we'll present an input view that contains buttons for numbers, as well as buttons for the calculator functions.
iPad SDK : Keyboard Extensions and Replacements (part 1) - Adding a Keyboard Button in Dudel
To demonstrate how to extend the keyboard, we're going to add something that has been missing from the FileRenameViewController in Dudel: the ability to cancel the renaming operation. We'll do this by adding a Cancel button to the keyboard.
iPad SDK : New Input Methods - Gesture Recognition
Starting with iOS 3.2, UIViews can handle not only individual touch events, but they can also look for particular kinds of touch actions and let your code know when they occur.
iPad SDK : New Input Methods - Menu Additions
Anyone who has edited text on an iOS device is probably familiar with the text-editing menu that appears at various times, hovering over the text area in response to user actions
iPad SDK : Implementing an About Panel in a Modal Way (part 2)
We'll present a UIWebView with information about Dudel and links at the bottom to get additional information. This web view will be presented modally, just like the file-renaming view.
iPad SDK : Implementing an About Panel in a Modal Way (part 1) - Creating the Modal Web View Controller
We'll present a UIWebView with information about Dudel and links at the bottom to get additional information. This web view will be presented modally, just like the file-renaming view.
Parallel Programming with Microsoft .Net : Dynamic Task Parallelism - Variations
The examples shown so far in this chapter use techniques that are the parallel analogs of sequential depth-first traversal. There are also parallel algorithms for other types of traversals.
Keyword Research Tools (part 7) - comScore Marketer
Like Hitwise, comScore Marketer is a tool that provides a range of data as a result of monitoring the behavior of actual users on the Internet. This data includes details on search terms used, as well as competitive search term analysis.
Keyword Research Tools (part 6)
Trellian derives its keyword data primarily from aggregated Historical Global data purchased from ISPs. Trellian also uses a panel of 4.4 million users to collect its Global Premium data. The company touts that the Global Premium data removes the bias that various spiders introduce into data from other sources
Keyword Research Tools (part 5)
Entering a keyword in the search bar will return data that is divided into two tabs: Contains Term and Similar Terms. The Contains Term tab includes search phrases that contain the keyword you provided, along with the preceding month and the current month of search data figures.
Keyword Research Tools (part 4)
Entering a keyword in the search bar will return data that is divided into two tabs: Contains Term and Similar Terms. The Contains Term tab includes search phrases that contain the keyword you provided, along with the preceding month and the current month of search data figures.
Keyword Research Tools (part 3)
It is great to get this data from search engine queries, and it can certainly help you get a sense of the importance of a given keyword.
Keyword Research Tools (part 2)
It is great to get this data from search engine queries, and it can certainly help you get a sense of the importance of a given keyword.
 
 
Most View
- Windows Server 2008 : Managing Terminal Services User Connections
- A Brief History of Legacy .NET Distributed Technologies : .NET Remoting
- SharePoint 2010 : Modify the Top or Left Navigation Bar (part 1)
- Windows Azure : Understanding Message Operations
- Windows 7 : Removing an Icon from Control Panel
- The Art of SEO : Trending, Seasonality, and Seasonal Fluctuations in Keyword Demand
- SharePoint 2010 : Organizing Information - Building an Information Architecture
- Adding iPad to the Mix
- Developing an SEO-Friendly Website : Creating an Optimal Information Architecture (part 1)
- Auditing an Existing Site to Identify SEO Problems (part 3) - Fixing an Internal Linking Problem
Top 10
- Implementing Edge Services for an Exchange Server 2007 Environment : Utilizing the Basic Sender and Recipient Connection Filters (part 3) - Configuring Recipient Filtering
- Implementing Edge Services for an Exchange Server 2007 Environment : Utilizing the Basic Sender and Recipient Connection Filters (part 2)
- Implementing Edge Services for an Exchange Server 2007 Environment : Utilizing the Basic Sender and Recipient Connection Filters (part 1)
- Implementing Edge Services for an Exchange Server 2007 Environment : Installing and Configuring the Edge Transport Server Components
- What's New in SharePoint 2013 (part 7) - BCS
- What's New in SharePoint 2013 (part 6) - SEARCH
- What's New in SharePoint 2013 (part 6) - WEB CONTENT MANAGEMENT
- What's New in SharePoint 2013 (part 5) - ENTERPRISE CONTENT MANAGEMENT
- What's New in SharePoint 2013 (part 4) - WORKFLOWS
- What's New in SharePoint 2013 (part 3) - REMOTE EVENTS