|It is currently Thu Mar 28, 2024 11:54 pm Login / Join Codemiles

Java

C/C++

PHP

C#

HTML

CSS

ASP

Javascript

JQuery

AJAX

XSD

Python

Matlab

R Scripts

Weka


Blog Links

Blog Stats
4Total Entries
3Total Comments

Search Blogs


Category Blogs 
General Articles

General blog articles related to forums area or in general things.

1

Programming

Articles related programming (java,c++,csharp,dotNet)

1


 [ 24 blog entries ]  1, 2, 3, 4, 5  Next
Feed Random Blog Entries
Urgently Require an iPhone Developer for Islamabad Office by itgeneration on Wed Mar 14, 2012 5:19 pm
Mobile Media City c/o Itgenerations a boutique of Iphone/ Ipad Applications having awesome Applications on App Store with amazing ratings. We provide awesome applications for the web, mobile and tablet platforms using a range of technologies. We are headquartered in Toronto, Canada and have an offshore development and support facility in South Asia. We deliver awesome Apps and ensure they deliver beyond your expectations.

The Jobs Details are:
Number of Posts: 2
Relevant Experience Required: 1 to 2 years
Education: Software Engineer (minimum)



The responsibilities are as below:

• Must be very strong in Objective-C, Cocoa, CocoaTouch, and XCode
• Excellent knowledge of the iPhone iOS SDK
• Excellent knowledge in UI design
• Application on AppStore is a plus
• Good communication skill is mandat...

[ Continued ]

Common Techniques used by Enterprises to Secure Data by extendcode on Fri Sep 07, 2012 1:58 pm
In today’s digital age information is power and all critical information is currently stored on protected servers operated by companies themselves or by 3rd party operators. If a company cannot protect its data from access by unauthorized individuals, the result can be devastating for the company itself as well as all vendors and stakeholders involved with the company. Such critical data which are usually protected using leading information security services can be used by unauthorized individuals to commit crimes such as insider trading, tender fixing etc. Countries all over the world have laws to prevent such unauthorized data access and non-compliance with the guidelines is cognizable offence with the companies paying hefty fines to the government, if the data security measures are breached. However, a common question that arises is how to companies ensure that their data stays protected from access by unauthorized individuals. Some of the security solutions designed to ensure proper d...

[ Continued ]

Blog feature added by codemiles on Fri Mar 11, 2011 10:54 pm
1 out of 52 out of 53 out of 54 out of 55 out of 5
Dear members,
Today, we have integrated a blog module to CODEMILES community .Blog module provides a big set features to each users. Users have the full control over their blogs. They can customize its content and share it with CODEMILES visitors. Users can comment on blog topics and also rank it. CODEMILES community has a good search Google rank, which means that CODEMILES bloggers can see their own posts ranked well over the web.
Come on, we are waiting your contribution…

CODEMILES TEAM.

4 things to note down while using wait and notify method in java by javabuddy on Fri Jun 03, 2011 2:35 pm
while using wait and notify or notifyAll method in Java following things must be remember :

1) use notifyAll instead of notify if you expect more than one thread is waiting for lock.
2)wait() and notify() method must be called from synchronized context, see the link for more detailed explanation http://javarevisited.blogspot.com/2011/05/wait-notify-and-notifyall-in-java.html.
3) Always call wait() method in loop because if multiple threads are waiting for lock and one of them got lock and reset the condition and other thread needs to check the condition after they got wake up to see whether they need to wait again or can start processing.
4) use same object for calling wait() and notify() method, every object has its own lock so calling wait() on objectA and notify() on object B will not make any sense.

BYOD and its Impact on Enterprise Mobility Market by extendcode on Tue Oct 16, 2012 12:58 pm
Many CIOs (Chief Information Officers) look back to the early days of enterprise mobility as the good old days, when things were just so much simpler for them. There were few mobility devices and fewer platforms, which made it much easier to implement security solutions. Most of the enterprise employees were baby boomers and the attempts to circumvent company security were much fewer. In those early days, the mobility devices were mostly company owned and provided to the employees for carrying out the company’s work. The cost of buying and maintaining such devices was considered to be a necessary evil by most companies in those days. At that point, few people could have predicted that there was a storm coming.

The storm came with the introduction of the first Apple iPhone, intensified with the advent of devices powered by Google’s android and the whole enterprise mobility landscape started to change at a rapid pace. The availability of iPhone and Android powered devices, which were cap...

[ Continued ]

 [ 24 blog entries ]  1, 2, 3, 4, 5  Next

All times are UTC [ DST ]


cron






Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
All copyrights reserved to codemiles.com 2007-2011
mileX v1.0 designed by codemiles team
Codemiles.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com