|It is currently Fri Apr 19, 2024 12:47 am Login / Join Codemiles

Java

C/C++

PHP

C#

HTML

CSS

ASP

Javascript

JQuery

AJAX

XSD

Python

Matlab

R Scripts

Weka


Blog Links

Blog Stats
4Total Entries
3Total Comments

Search Blogs


Category Blogs 
General Articles

General blog articles related to forums area or in general things.

1

Programming

Articles related programming (java,c++,csharp,dotNet)

1


 [ 24 blog entries ]  1, 2, 3, 4, 5  Next
Feed Random Blog Entries
BizTalk Server Services by Microsoft Gold Certified Company by JohnnyCash on Thu Nov 22, 2012 9:40 am
BizTalk is a powerful software developed by Microsoft to bring all the enterprise activities on single platform. It offers high-end interactive and sharing features for internal and external users. Microsoft BizTalk Server allows to automate your business processes with advanced integration and updation functionalities. These days, it is a highly emerging enterprise information sharing technology to connect inside and outside users.

Hire BizTalk Experts India for Collaborative Application Development
Build an effective and efficient application with BizTalk for rapid business expansion. You can hire BizTalk developers to create shared application that links up your management, executive staff, suppliers, partners, and customers. The solution permits for information exchange that enhances communication across users. You can also build Enterprise Application Integration (EAI) and Business Process Management (BPM) solutions.

Build Microsoft BizTalk...

[ Continued ]

array in function by farahinsamsudin on Sun Mar 17, 2013 5:35 am
i cant compile my coding because a several error. i'm try to find it by change its syntax. but it does not work. can anyone help me?

the question ask to display student name, total marks, and status.

Code:
import java.io.*;
import java.lang.*;


public class Assignment1 {
   public static void main(String[] args) {
      
      String studName[] = {"Aminah Binti Samad", "Putra Bin Abdul", "Muadz Bin Kassim", "Kaisara Binti Dollah", "Rahaman Bin Ismail"};
      int test1[] = {90, 45, 78, 80, 60};
      int test2[] = {40, 80, 78, 95, 93};
      int Marks = {0, 0, 0, 0, 0};
      String[] status = new String[5];
      
      CalculateMarks(test1, test2, Marks);
      DetermineStatus(Marks, status);
      Display(studName, Marks, status);
   }
   
   public static void CalculateMarks(int test1[], int test2[], int Marks[])
   {
      for(int i = 0; i < 5; i++)
      {
         int temptotalMarks = 0;
         Marks[i]...


[ Continued ]

Google's Social Network Better Than Expected by GGen on Mon Apr 09, 2012 8:53 am
According to reports, Google Inc. has achieved greater success in its social networking feature than had been initially predicted and has enabled the company to atone for its alleged inattention in assisting their customers to connect with others online. According to reports, the average Google social network user averaged 3.3 minutes online, versus, Facebook
users, 7 ½ hours. The company alleges that in their efforts to become the leading Web-search provider, they failed to be competitive in the growing area of people connecting to one another socially via the internet.

Reportedly, in January, Google considered linking information from Google+ into search queries used by their customers. It has been reported that this generated unexpected challenges from privacy groups as well as competitors who claimed that by including the links, Google’s products were unfairly being promoted over other available resources online. This reportedly led to the U.S. Federal Trade Commission expanding it...

[ Continued ]

NEED HELP FOR MY PROJECT IN RECONFIGURABLE ARCHITECTURE by arunrocky88 on Tue Sep 04, 2012 6:17 pm
HI
I AM ARUN, CURRENTLY DOING MY PROJECT IN RECONFIGURABLE ARCHITECTURE I NEED HELP FROM U GUYS .I NEED SOME CODE RELATED TO THIS PROJECT.HOW TO CONVERT THE INSTRUCTION INTO JAVA.PLEASE GIVE ME SOME SUGGESTIONS.

Can Containers Techniques Prevent Unauthorized Data Access? by extendcode on Wed Sep 26, 2012 1:36 pm
The Introduction of Containers

Since the early days of enterprise mobility, IT departments all over the world have grappled with how to control accessibility of emerging mobility devices and what kind of action can help prevent unauthorized access of enterprise data even if a device is lost or stolen. These have been burning questions for IT departments worldwide and many organizational have come up with techniques to handle the possibility of network security breaches. Some of the common methods of combating the risk associated with implementing enterprise mobility at the workplace include: enforcement of password policies for connecting to network and accessing information; configuring a device for remote wipe prior to allowing its use on the enterprise network; enforcement of VPN (Virtual Private Networks) for connections between enterprise servers and mobile devices. However in the ever changing IT and mobile solutions market, the flooding of new devices led...

[ Continued ]

 [ 24 blog entries ]  1, 2, 3, 4, 5  Next

All times are UTC [ DST ]









Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
All copyrights reserved to codemiles.com 2007-2011
mileX v1.0 designed by codemiles team
Codemiles.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com