Skip to main content

Home/ ACSE Discussion/ Group items tagged methods

Rss Feed Group items tagged

Doug Peterson

Overview of Authorization Options | dev.twitter.com - 0 views

  •  
    Twitter supports a few authentication methods and with the shift from basic authentication to OAuth you may be wondering which method you should be using. When choosing which authentication method to use you should understand the way that method will affect your users experience and the way you write your application.
Doug Peterson

A Periodic Table of Visualization Methods - 1 views

  •  
    A Periodic Table of Visualization Methods - mouse over each element to see the original.  Very cool.
Peter McAsh

Java Basics: GUI: Lesson 1 - Introduction - 0 views

  • Giving up control - Event-driven programming. The GUI programming style is referred to as event-driven programming. In this style of programming you set up the graphical user interface and initialize things. It appears that the program just stops and sits there doing nothing! There is no input loop; your program isn't trying to read from the user. You, the programmer, have to learn to give up control in two ways. Your program gives control to the GUI system, and you only get control back to when your listeners are called. At an even higher level, your program has given control to the user. It's the user who selects which of your methods to call by their choice of buttons to click on, menu items to select, etc. Listeners. When the user clicks a button (or uses another GUI component), an event is sent to listener method. Your job as a programmer is to write a listener method for each component. It's the user, not the programmer, who has control, indirectly choosing methods in your program to execute by interacting with graphical user interface components.
Mike McIlveen

Lightweight Java Game Library - 0 views

  •  
    The whole point of LWJGL was to bring the speed of Java rendering into the 21st century. This is why we have: Thrown out methods designed for efficient C programming that make no sense at all in java, such as glColor3fv. Made the library throw an exception when hardware acceleration is not available on Windows. No point in running at 5fps is there?
tech vedic

How to sync an Android phone to your Mac? - 0 views

  •  
    It is common to sync an iPhone with a Mac. But, syncing an Android phone with OS X is not very easy. Let's discuss the method below.
Doug Peterson

Building Secure Web Applications Infographic - 0 views

  •  
    "Neglecting to take proper security measures at the application layer is one of the most common causes of data breaches, yet many companies still leave their applications unprotected. Securing your applications begins with developer training on the risks applications face and the methods required for vulnerability prevention. This infographic focuses on defining these risks and combating common flaws."
tech vedic

How to know that my computer is virus or malware infected? - 0 views

  •  
    Malware, as you know is a class of malicious software such as spyware, adware, or viruses that compromise with the system's performance and security. And in majority of cases they infiltrate through general Internet activities --- browsing, surfing, and downloading, or executing programs or files. Hence, most of the virus or malware defense methods are based on encouraging secure Internet access. Though, virus or malware authors are using astute development techniques, keeping a keen eye on the behavior of your machine, can be helpful in winning the battle of computer security. Following are a few notable symptoms, which can be perceived as an indication of virus or malware attack:
Peter Beens

Use command line parameters with Remote Desktop Connection - 1 views

  •  
    Instead of starting Remote Desktop Connection from the Start menu, you can start it from the search box in this version of Windows, from the Run dialog box, or from a command line. With these methods, you can use additional command line parameters to control how Remote Desktop Connection looks or behaves.
Doug Peterson

What's the Difference Between 3G and 4G? - Life Scoop - 0 views

  •  
    If you've ever researched a smartphone purchase, the terms 3G and 4G have probably shown up on your radar at some point. Both refer to a connection method for mobile devices and a "generation" of mobile technology.
Peter Beens

Project Euler - 1 views

  •  
    Project Euler is a series of challenging mathematical/computer programming problems that will require more than just mathematical insights to solve. Although mathematics will help you arrive at elegant and efficient methods, the use of a computer and programming skills will be required to solve most problems. The motivation for starting Project Euler, and its continuation, is to provide a platform for the inquiring mind to delve into unfamiliar areas and learn new concepts in a fun and recreational context.
Peter Beens

Linear search - Wikipedia, the free encyclopedia - 0 views

  •  
    In computer science, linear search or sequential search is a method for finding a particular value in a list, that consists of checking every one of its elements, one at a time and in sequence, until the desired one is found.
1 - 12 of 12
Showing 20 items per page