|It is currently Thu Mar 28, 2024 11:53 pm Login / Join Codemiles

Java

C/C++

PHP

C#

HTML

CSS

ASP

Javascript

JQuery

AJAX

XSD

Python

Matlab

R Scripts

Weka


Blog Links

Blog Stats
4Total Entries
3Total Comments

Search Blogs


Category Blogs 
General Articles

General blog articles related to forums area or in general things.

1

Programming

Articles related programming (java,c++,csharp,dotNet)

1


 [ 24 blog entries ]  1, 2, 3, 4, 5  Next
Feed Random Blog Entries
how to add multiple clients to the server in java? by artigautam on Sun May 08, 2011 5:10 pm
I ve to add 2 clients to the server,chatting between these clients will be through the server.but after running these following files only Cframe1 got connected to server but second client i.e. Clientframe1 didnt...what changes should I make to connect this second client??

Serverframe.java
Code:
import java.awt.*;
import java.applet.*;
import java.awt.event.ActionEvent;
import java.awt.event.WindowAdapter;
import java.awt.event.WindowEvent;
import java.awt.event.ActionListener;
import java.net.*;
import java.io.*;
import java.lang.*;
class Serverframe extends Frame implements ActionListener
{
   Button b1,b2,b3;

   Label l1,l2,l3;

   TextField t1,t2,t3;

   TextArea t;

    boolean readSocketMem ;

    BufferedReader socketBR;


    BufferedWriter socketBW;

    Socket sref1,sref2;

   Serverframe()
   {


       setVisible(true);

      setSize(500, 500);

      setLayout(null);

      setTitle("Server Window");...


[ Continued ]

pls help me IMP URGENT abt compression in java by tanmay005 on Mon Apr 04, 2011 11:15 am
i am tanmay from india studying in final year computer engineering
my final year mini project is "Multimedia file compressor using netbeans"
we are facing many problems in implementing diff algos such as huffman RLE and etc etc.....
so pls if u r havin any project of image,audio compression using netbeans
pass it to me....i badly need yur help.... pls reply me if u r havin some modules of image n audio compression....
we are also using encryption and decryption algorithms....pls help
pls pass me your email id so dat i can send u some of our GUI images.....

IT Executive / Assistant Manager by ilaowaivisa on Mon May 16, 2011 10:27 am
About us.

Ilaowai.net is the leading company offering a complete range of services for expatriates and foreign companies in China. We pride ourselves as a group offering efficient and high quality services, including but not limited, to the domain of:
Visa related application and consultation services,
Incorporation of corporate identity application and consultation services,
Accounts and Taxation related reports, management and consultation services.
In accordance to our expansion plans, we are currently recruiting dynamic and high caliber personals to join us for an exciting and rewarding career.

About the position.

We are currently recruiting for the position of IT Executive / Assistant Manager for our headquarters based in Guangzhou, China.

Job Description
Developing, maintaining and updating of company website and web based applications.
Maintaining and ensuring that the company’s internet based applications are well protected from various internet security risks.

Requirements
B...

[ Continued ]

Working and Life by DrRakha on Wed Mar 16, 2011 10:06 pm
Well , I started to hate my current job ,programming and solving the same type of bugs , I lost my goal and interest in it , when I think about people around ,I see that most of them work by the relation win-to-win. They always looking for money, but in fact money is not the only thing which will make someone happy. (Yes it is important), but it is not the main reason to be happy in your life, sometimes you see a man has millions then he kills himself. Well don’t that I am rich and I will kill myself: D, actually I don’t have a car. This life is a big race … rate race. Who will win??!

Can Containers Techniques Prevent Unauthorized Data Access? by extendcode on Wed Sep 26, 2012 1:36 pm
The Introduction of Containers

Since the early days of enterprise mobility, IT departments all over the world have grappled with how to control accessibility of emerging mobility devices and what kind of action can help prevent unauthorized access of enterprise data even if a device is lost or stolen. These have been burning questions for IT departments worldwide and many organizational have come up with techniques to handle the possibility of network security breaches. Some of the common methods of combating the risk associated with implementing enterprise mobility at the workplace include: enforcement of password policies for connecting to network and accessing information; configuring a device for remote wipe prior to allowing its use on the enterprise network; enforcement of VPN (Virtual Private Networks) for connections between enterprise servers and mobile devices. However in the ever changing IT and mobile solutions market, the flooding of new devices led...

[ Continued ]

 [ 24 blog entries ]  1, 2, 3, 4, 5  Next

All times are UTC [ DST ]


cron






Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
All copyrights reserved to codemiles.com 2007-2011
mileX v1.0 designed by codemiles team
Codemiles.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com