programming4us
programming4us
ENTERPRISE
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 5 of 44, items 161 to 200 of 1740.
Group Test – Computer Desks – March 2014 (Part 1) - Vivo ll Ergo
The review sample in this case is the Vivo II Oak Collection, Ergo Right Hand desk. It measures in at a considerable 800/600 x 725 x 1800mm, which we found more than enough to accommodate a dual 23" monitor setup, along with keyboard, mouse and so on and with enough space left over to comfortably fit an A4 writing pad and plenty of elbow room.
Tech Of The Year 2013 (Part 4) - Samsung 840 EVO 250GB, NVIDIA GTX 780 Ti, ASRock Fatality H87
When PC PowerPlay conducted a pre-built gaming PC roundup, one component in particular seemed to be present in nearly every PC submitted – Samsung’s 840 EVO SSD. There’s a reason this SSD is one of the most popular on the market, and it’s not just because the price per Gigabyte is so competitive.
Tech Of The Year 2013 (Part 3) - Corsair RM750, Intel 4th Gen Core I7-4770K, ASUS GTX780TI-3GD5
Intel wins CPU of the year by default, as once again AMD failed to deliver a processor with compelling single threaded performance. Until Mantle arrives to make the most of AMD’s octacore processors, Intel’s quad core chip is the one to beat, and the 4770K is the mainstream model of choice.
Tech Of The Year 2013 (Part 2) - NZXT Phantom 530, Corsair Vengeance K70, Razer Ouroboros, Gigabyte P25W
Combine these with twin SSDs and 16GB of memory, and this gaming laptop does the one thing that most gaming laptops fail at; it can actually run games at playable framerates, without compromising on the detail.
Tech Of The Year 2013 (Part 1) - BenQ XL2420T, Audio Technica ATH-ADG1, Creative ZX, Linksys EA6500 Router
Audio Technica takes out this award for the second year running, but 2013’s offering was very different to the year prior. Audio Technica finally realised how many gamers were buying its music headphones, and delivered the first range of custom-made gaming-cans.
SMC Networks SMCWTVA100 Multimedia Adapter
Enter the SMC Networks SMCWTVA100 wireless TV adapter, a device which aims to let you stream media content such as music, photos and movies from your PC, smartphone or tablet, to your TV.
Oculus Rift Developer Kit
Virtual Reality is finally becoming less virtual, and more real, with 2013’s release of the Oculus Rift Developer Kit. This $300 headset of silicon wizardry finally proved that we’re at the doorstep of a gaming world based around working virtual reality, and we’ve got the mobile phone industry to thank for it.
Labs Briefs Review March 2014 - Lenovo Yoga Tablet 8, Asrock Fatality Z87 Killer
The most important thing to remember with the Yoga Tablet is that it has little to do with the Ultrabook of the same name. Instead it is an 8in Android model, built around a folding hinge designed to act as an integrated stand. At first blush it looks like a great device, with a decent 1280 x 800 resolution IPS screen and Android 4.2.2.
Hotware With Terrence Jarrad 03-2014
Imagine if upgrading your PC was as simple as pulling out the bit you want to upgrade, and plugging in a faster one. That’s Razer’s dream, as displayed at CES this year.
D-Link DGL-5500 Router
D-Link gets credit for tying up that loose end with the DGL-5500, a dual-band AC1300 wireless router built specifically for gamers. What makes the DGL-5500 different from all the other 802.11ac models, including D-Link's own DIR-868L (reviewed in our February issue), is the inclusion of Qualcomm’s StreamBoost technology.
Elgato Eye Netstream 4Sat Review (Part 2)
Click on the channel, and it starts streaming to the device. PVR functionality is included. Hit 'pause' and a buffer starts filling up - pressing play continues from where you left off. Soundtrack selection is provided, and you can record programs for viewing later, too.
Elgato Eye Netstream 4Sat Review (Part 1)
The solid wall-mountable metal box the Netstream 4Sat is built into can be installed 'out of the way; provided the necessary cabling can be routed there and a mains point (for the 'wall-wart' power supply) is available.
Charging Ahead With AMD’s Kaveri (Part 2)
The A8-7600 comes in two versions whereby one version has a lower power envelope than the other. They also differ in the base and peak operating frequencies of their CPU compute cores. The other two are the top-end, K-series APUs have higher operating frequencies for their processor cores.
Charging Ahead With AMD’s Kaveri (Part 1)
Intel may be the current dominant player in the CPU space, pushing CPU compute performance as well as the boundaries of integrated graphics capabilities with its Core processor family, but AMD’s approach to the unification of CPU and GPU cores is proving more holistic.
How The Internet Of Things Will Change Your Life (Part 2) - Samsung T9000 Refrigerator
Besides having all the features expected from a traditional refrigerator, this version comes with a touchscreen and a wide selection of applications. These apps include popular note taking options such as Evernote, allowing grocery lists to be made while looking inside your fridge. These can then be quickly and seamlessly shared across multiple devices. The touchscreen also allows for the display of recipes.
How The Internet Of Things Will Change Your Life (Part 1)
There’s a reason why mobile phones today come with the ‘smart’ prefix. They don’t just serve as devices that are used to make calls but also as personal assistants, workout trainers, weathermen, navigators and more.
Windows 7 : Interacting with the Built-In Security Features - ACCESSING APPLOCKER (part 3) - Creating an AppLocker Entry
Creating an AppLocker entry is a difficult and error-prone process because the entries appear in so many registry keys. You literally have to search the registry looking for the proper places to put the keys. Consequently, this part of the application starts with the recursive search routine shown in Listing 2.
Windows 7 : Interacting with the Built-In Security Features - ACCESSING APPLOCKER (part 2) - Reading AppLocker Entries
Reading the AppLocker entries means locating the entries in the registry and then parsing them. You have no way of knowing how many entries the registry will contain (if it contains any entries at all). Listing 2 parses the entries using the assumption that the registry might not contain any entries.
Windows 7 : Interacting with the Built-In Security Features - ACCESSING APPLOCKER (part 1) - Seeing the AppLocker Entries in the Registry
The AppLocker entries are part of a GPO. Unfortunately, in this case there isn't a convenient COM object you can use to access the information you need.
Windows 7 : Interacting with the Built-In Security Features - WORKING WITH AUTOMATIC UPDATES (part 2)
Once you know whether the user's system is healthy from an update check and download perspective, you need to know which updates the user has actually installed.
Windows 7 : Interacting with the Built-In Security Features - WORKING WITH AUTOMATIC UPDATES (part 1)
One of the first things you'll want to do is view the Windows Update settings, but this task can prove difficult if you follow the clues online. A number of Websites discuss the contents of the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update key.
Windows 8 Architecture from a Developer’s Point of View : Understanding Windows Runtime (part 5) - What’s not in Windows Runtime
Applications written in the C or C++ programming languages are compiled directly to CPU-specific machine instructions that can be directly executed on the CPU.
Windows 8 Architecture from a Developer’s Point of View : Understanding Windows Runtime (part 4) - Language Projections
Programming languages have their own characteristics. Fans of a particular programming language like to work with the language because of its attributes, such as readability, high-performance constructs, functionality, low syntax noise, and so on.
Windows 8 Architecture from a Developer’s Point of View : Understanding Windows Runtime (part 3) - Metadata in Windows Runtime - Namespaces
As you experienced in the previous exercise, Windows Runtime types have hierarchical names. For example, the enumeration with the resolution scale values has the full name of Windows.Graphics.Display.ResolutionScale.
Windows 8 Architecture from a Developer’s Point of View : Understanding Windows Runtime (part 2) - Metadata in Windows Runtime - Metadata Format
The designers of Windows Runtime were inspired by the .NET Framework when architecting the metadata subsystem. They decided to use the metadata format utilized by .NET assemblies, which has already proven its adequacy over the past ten years.
Windows 8 Architecture from a Developer’s Point of View : Understanding Windows Runtime (part 1) - Windows Runtime Architecture Overview
Just as Windows 8 was designed with the user experience in mind, Windows Runtime was designed with a focus on the developer experience. Modern development environments such as Visual Studio provide great tooling to make developers more productive.
Windows 8 Architecture from a Developer’s Point of View : Windows 8 Development Architecture
Windows 8 enables you to develop a new kind of application — Windows 8 style applications — while traditional desktop applications still run on Windows. Moreover, you can still use your favorite tools and technologies to develop Windows 8 style applications.
Windows 7 : Programming KMDF Hardware Driver - Mapping Resources - Code to Map Resources
The PCI device supported by the sample driver has three base address registers (BARs): BAR 0 is memory mapped, BAR 1 is I/O mapped, and BAR 3 is flash-memory mapped. The driver determines whether to use the I/O-mapped BAR or the memory-mapped BAR to access the control and status registers.
Windows 7 : Programming KMDF Hardware Driver - Handling Interrupts (part 2) - Deferred Processing for Interrupts
When the DPC runs, KMDF calls the driver’s EvtInterruptDpc callback. This function performs device-specific interrupt processing and reenables the interrupt for the device.
Windows 7 : Programming KMDF Hardware Driver - Handling Interrupts (part 1) - Code for EvtInterruptIsr Callback
The PCIDRV sample’s first step is to determine whether its device is interrupting. To do so, it must check its device registers. It gets a handle to the device object that is associated with the interrupt object by calling the WdfInterruptGetDevice method and then passes that handle to FdoGetData to get a pointer to the device context area.
Windows 7 : Programming KMDF Hardware Driver - Support Device Interrupts (part 2) - Post-Interrupt Enable and Pre-Interrupt Disable Processing
Some devices cause interrupt storms if they are initialized after their interrupts are enabled. The driver for such a device must therefore be able to perform initialization after the device enters DO but before its interrupt is enabled.
Windows 7 : Programming KMDF Hardware Driver - Support Device Interrupts (part 1) - Creating an Interrupt Object,Enabling and Disabling Interrupts
A driver typically creates its interrupt objects (WDFINTERRUPT) in its EvtDriverDeviceAdd callback. The driver must have an interrupt object for each interrupt vector or message-signaled interrupt (MSI) that each of its devices support.
Microsoft Exchange Server 2010 : Managing Data and Database Availability Groups - Content Indexing
Content indexing is a built-in Exchange feature. Every Exchange server in your organization supports and uses some type of indexing. To manage indexing more effectively, use the techniques discussed in this section.
Microsoft Exchange Server 2010 : Creating and Managing Database Availability Groups (part 5) - Switching over Servers and Databases
The Microsoft Exchange Information Store service manages the active and passive databases configured on a Mailbox server. To improve performance, the service running on each server maintains a database cache of changes to active databases that haven't been applied to passive copies.
Microsoft Exchange Server 2010 : Creating and Managing Database Availability Groups (part 4) - Configuring Database Availability Group Properties
You can use the Exchange Management Console or the Exchange Management Shell to configure the properties of a database availability group, including the witness server and witness directory used by the database availability group.
Microsoft Exchange Server 2010 : Creating and Managing Database Availability Groups (part 3) - Managing Database Availability Group Networks
Each database availability group must have a minimum of two networks: one for replication traffic, referred to as the group's replication network, and one for MAPI and other traffic, referred to as the group's messaging network.
Microsoft Exchange Server 2010 : Creating and Managing Database Availability Groups (part 2) - Managing Availability Group Membership
Each server that you want to add to the database availability group must have two network adapter cards. The first network adapter, referred to as the replication adapter, handles replication traffic, and the second adapter, referred to as the messaging adapter, handles MAPI network traffic and other traffic originating outside the replication network.
Microsoft Exchange Server 2010 : Creating and Managing Database Availability Groups (part 1) - Creating Database Availability Groups
A database availability group defines a set of servers that provide automatic database-level recovery from database failures. Only members of the Organization Management group can create database availability groups.
Microsoft Exchange Server 2010 : Navigating the Information Store (part 2) - Improving Availability, Introducing Active Manager
Exchange 2010 allows you to protect mailbox databases and the data they contain by configuring your mailbox databases for high availability automatically when you use database availability groups.
Microsoft Exchange Server 2010 : Navigating the Information Store (part 1) - Using Databases, Understanding Database Structures
Mailbox databases continue to be the primary type of database used with Exchange Server. Exchange Server 2010 also supports public folder databases.
 
Top 10
Free Mobile And Desktop Apps For Accessing Restricted Websites
MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
TOYOTA CAMRY 2; 2.5 : Camry now more comely
KIA SORENTO 2.2CRDi : Fuel-sipping slugger
How To Setup, Password Protect & Encrypt Wireless Internet Connection
Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
Backup & Restore Game Progress From Any Game With SaveGameProgress
Generate A Facebook Timeline Cover Using A Free App
New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
- Messages forwarded by Outlook rule go nowhere
- Create and Deploy Windows 7 Image
- How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
- Creating and using an unencrypted cookie in ASP.NET
- Directories
- Poor Performance on Sharepoint 2010 Server
- SBS 2008 ~ The e-mail alias already exists...
- Public to Private IP - DNS Changes
- Send Email from Winform application
- How to create a .mdb file from ms sql server database.......
programming4us programming4us
programming4us
 
 
programming4us