|It is currently Wed Apr 24, 2024 3:47 am Login / Join Codemiles

Java

C/C++

PHP

C#

HTML

CSS

ASP

Javascript

JQuery

AJAX

XSD

Python

Matlab

R Scripts

Weka


Blog Links

Blog Stats
4Total Entries
3Total Comments

Search Blogs


Category Blogs 
General Articles

General blog articles related to forums area or in general things.

1

Programming

Articles related programming (java,c++,csharp,dotNet)

1


 [ 24 blog entries ]  1, 2, 3, 4, 5  Next
Feed Random Blog Entries
Working and Life by DrRakha on Wed Mar 16, 2011 10:06 pm
Well , I started to hate my current job ,programming and solving the same type of bugs , I lost my goal and interest in it , when I think about people around ,I see that most of them work by the relation win-to-win. They always looking for money, but in fact money is not the only thing which will make someone happy. (Yes it is important), but it is not the main reason to be happy in your life, sometimes you see a man has millions then he kills himself. Well don’t that I am rich and I will kill myself: D, actually I don’t have a car. This life is a big race … rate race. Who will win??!

Uregently Require an iPhone Developer for Home by itgeneration on Wed Mar 14, 2012 5:49 pm
Mobile Media City c/o Itgenerations a boutique of Iphone/ Ipad Applications having awesome Applications on App Store with amazing ratings. We provide awesome applications for the web, mobile and tablet platforms using a range of technologies. We are headquartered in Toronto, Canada and have an offshore development and support facility in South Asia. We deliver awesome Apps and ensure they deliver beyond your expectations.


The Job Details are

Number of Posts: 3
Relevant Experience Required: 1 to 2 years
Education: Software Engineer (minimum)

The responsibilities are as below:
• Must be very strong in Objective-C, Cocoa, CocoaTouch, and XCode
• Excellent knowledge of the iPhone iOS SDK
• Excellent knowledge in UI design
• Application on AppStore is a plus
• Good communication skill is mandatory as regular interaction with foreign clients will be involved.

You can contact us on [email protected] or visit ...

[ Continued ]

BizTalk Server Services by Microsoft Gold Certified Company by JohnnyCash on Thu Nov 22, 2012 9:40 am
BizTalk is a powerful software developed by Microsoft to bring all the enterprise activities on single platform. It offers high-end interactive and sharing features for internal and external users. Microsoft BizTalk Server allows to automate your business processes with advanced integration and updation functionalities. These days, it is a highly emerging enterprise information sharing technology to connect inside and outside users.

Hire BizTalk Experts India for Collaborative Application Development
Build an effective and efficient application with BizTalk for rapid business expansion. You can hire BizTalk developers to create shared application that links up your management, executive staff, suppliers, partners, and customers. The solution permits for information exchange that enhances communication across users. You can also build Enterprise Application Integration (EAI) and Business Process Management (BPM) solutions.

Build Microsoft BizTalk...

[ Continued ]

Can Containers Techniques Prevent Unauthorized Data Access? by extendcode on Wed Sep 26, 2012 1:36 pm
The Introduction of Containers

Since the early days of enterprise mobility, IT departments all over the world have grappled with how to control accessibility of emerging mobility devices and what kind of action can help prevent unauthorized access of enterprise data even if a device is lost or stolen. These have been burning questions for IT departments worldwide and many organizational have come up with techniques to handle the possibility of network security breaches. Some of the common methods of combating the risk associated with implementing enterprise mobility at the workplace include: enforcement of password policies for connecting to network and accessing information; configuring a device for remote wipe prior to allowing its use on the enterprise network; enforcement of VPN (Virtual Private Networks) for connections between enterprise servers and mobile devices. However in the ever changing IT and mobile solutions market, the flooding of new devices led...

[ Continued ]

Common Techniques used by Enterprises to Secure Data by extendcode on Fri Sep 07, 2012 1:58 pm
In today’s digital age information is power and all critical information is currently stored on protected servers operated by companies themselves or by 3rd party operators. If a company cannot protect its data from access by unauthorized individuals, the result can be devastating for the company itself as well as all vendors and stakeholders involved with the company. Such critical data which are usually protected using leading information security services can be used by unauthorized individuals to commit crimes such as insider trading, tender fixing etc. Countries all over the world have laws to prevent such unauthorized data access and non-compliance with the guidelines is cognizable offence with the companies paying hefty fines to the government, if the data security measures are breached. However, a common question that arises is how to companies ensure that their data stays protected from access by unauthorized individuals. Some of the security solutions designed to ensure proper d...

[ Continued ]

 [ 24 blog entries ]  1, 2, 3, 4, 5  Next

All times are UTC [ DST ]


cron






Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
All copyrights reserved to codemiles.com 2007-2011
mileX v1.0 designed by codemiles team
Codemiles.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com