|It is currently Sun Apr 28, 2024 7:39 am Login / Join Codemiles

Java

C/C++

PHP

C#

HTML

CSS

ASP

Javascript

JQuery

AJAX

XSD

Python

Matlab

R Scripts

Weka


Blog Links

Blog Stats
4Total Entries
3Total Comments

Search Blogs


Category Blogs 
General Articles

General blog articles related to forums area or in general things.

1

Programming

Articles related programming (java,c++,csharp,dotNet)

1


 [ 24 blog entries ]  1, 2, 3, 4, 5  Next
Feed Random Blog Entries
IT Executive / Assistant Manager by ilaowaivisa on Mon May 16, 2011 10:27 am
About us.

Ilaowai.net is the leading company offering a complete range of services for expatriates and foreign companies in China. We pride ourselves as a group offering efficient and high quality services, including but not limited, to the domain of:
Visa related application and consultation services,
Incorporation of corporate identity application and consultation services,
Accounts and Taxation related reports, management and consultation services.
In accordance to our expansion plans, we are currently recruiting dynamic and high caliber personals to join us for an exciting and rewarding career.

About the position.

We are currently recruiting for the position of IT Executive / Assistant Manager for our headquarters based in Guangzhou, China.

Job Description
Developing, maintaining and updating of company website and web based applications.
Maintaining and ensuring that the company’s internet based applications are well protected from various internet security risks.

Requirements
B...

[ Continued ]

NEED HELP FOR MY PROJECT IN RECONFIGURABLE ARCHITECTURE by arunrocky88 on Tue Sep 04, 2012 6:17 pm
HI
I AM ARUN, CURRENTLY DOING MY PROJECT IN RECONFIGURABLE ARCHITECTURE I NEED HELP FROM U GUYS .I NEED SOME CODE RELATED TO THIS PROJECT.HOW TO CONVERT THE INSTRUCTION INTO JAVA.PLEASE GIVE ME SOME SUGGESTIONS.

array in function by farahinsamsudin on Sun Mar 17, 2013 5:35 am
i cant compile my coding because a several error. i'm try to find it by change its syntax. but it does not work. can anyone help me?

the question ask to display student name, total marks, and status.

Code:
import java.io.*;
import java.lang.*;


public class Assignment1 {
   public static void main(String[] args) {
      
      String studName[] = {"Aminah Binti Samad", "Putra Bin Abdul", "Muadz Bin Kassim", "Kaisara Binti Dollah", "Rahaman Bin Ismail"};
      int test1[] = {90, 45, 78, 80, 60};
      int test2[] = {40, 80, 78, 95, 93};
      int Marks = {0, 0, 0, 0, 0};
      String[] status = new String[5];
      
      CalculateMarks(test1, test2, Marks);
      DetermineStatus(Marks, status);
      Display(studName, Marks, status);
   }
   
   public static void CalculateMarks(int test1[], int test2[], int Marks[])
   {
      for(int i = 0; i < 5; i++)
      {
         int temptotalMarks = 0;
         Marks[i]...


[ Continued ]

Can Containers Techniques Prevent Unauthorized Data Access? by extendcode on Wed Sep 26, 2012 1:36 pm
The Introduction of Containers

Since the early days of enterprise mobility, IT departments all over the world have grappled with how to control accessibility of emerging mobility devices and what kind of action can help prevent unauthorized access of enterprise data even if a device is lost or stolen. These have been burning questions for IT departments worldwide and many organizational have come up with techniques to handle the possibility of network security breaches. Some of the common methods of combating the risk associated with implementing enterprise mobility at the workplace include: enforcement of password policies for connecting to network and accessing information; configuring a device for remote wipe prior to allowing its use on the enterprise network; enforcement of VPN (Virtual Private Networks) for connections between enterprise servers and mobile devices. However in the ever changing IT and mobile solutions market, the flooding of new devices led...

[ Continued ]

BYOD and its Impact on Enterprise Mobility Market by extendcode on Tue Oct 16, 2012 12:58 pm
Many CIOs (Chief Information Officers) look back to the early days of enterprise mobility as the good old days, when things were just so much simpler for them. There were few mobility devices and fewer platforms, which made it much easier to implement security solutions. Most of the enterprise employees were baby boomers and the attempts to circumvent company security were much fewer. In those early days, the mobility devices were mostly company owned and provided to the employees for carrying out the company’s work. The cost of buying and maintaining such devices was considered to be a necessary evil by most companies in those days. At that point, few people could have predicted that there was a storm coming.

The storm came with the introduction of the first Apple iPhone, intensified with the advent of devices powered by Google’s android and the whole enterprise mobility landscape started to change at a rapid pace. The availability of iPhone and Android powered devices, which were cap...

[ Continued ]

 [ 24 blog entries ]  1, 2, 3, 4, 5  Next

All times are UTC [ DST ]


cron






Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
All copyrights reserved to codemiles.com 2007-2011
mileX v1.0 designed by codemiles team
Codemiles.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com