These days we have a lot of available tools to create responsive courses on the Web and in this article we will review a few of them, considering their features, advantages and disadvantages.
When I started to test these tools I had to choose from a list of 26 comercial and open-source tools (link). In this list you can find that only 2 are open-source, so we will first take a look at these. After that we will focus our attention on a comercial tool from Adobe. Read the rest of this entry »
Epson Moverio glasses are perfect for a developer who wants to play with augmented reality. Although the glasses are not really a consumer product (seems like an experimental platform) they can be used in industry, museums or even for entertainment.
Read the rest of this entry »
This eclipse project is a modelling framework which also provides application building tools.
In short, it offers you the tools to create your data model and then generate code based on it.
IBM introduced with Lotus Notes Version 8.x the Eclipse-based extension that comes with many new features and functions. A world of new opportunities for software failures appears.
Lotus Notes present a Fault Reports database that made it easier to gather crash information, but doesn’t provide any tools for fixing the issues or identifying the cause of many errors in the Eclipse configuration information that is stored in the \Workspace directory located in the Notes data directory.
It could present a variety of errors from the client closing as soon as it is launched to crashing whenever the user tries to send an email with an attachment.
You have an awesome app with some awesome design elements, the last step in making your app really stand out is typography. The fonts you use in your app can make a really big impact so, naturally, you choose and apply some awesome fonts and then you realize: there’s one part of your app that doesn’t quite match the style – that’s right – the text from the Toolbar. Keep reading to find out how to fix this Read the rest of this entry »
If you have ever designed an XML layout, I am certain that you used some hard coded values at least once. How many times have you forgotten to remove those values and they ended up in your final product ? Yeah, I don’t like that answer either ! Continue reading if you want to know how to avoid this pitfall… Read the rest of this entry »
Over the years large amounts of data have been stored for business purposes. To turn this data into consistent and accurate information for a specific use, it somehow needs to be transformed.
And so we get to the ETL concept …
In Oracle Database 11g , when you need to update values of certain records from one table, and the value and the records to update are determined by a second table, you can use a subquery in the update statement to achieve the update.
Using “EMPLOYEE” and “EMPLOYEE_STAGING” tables as an example , we want to update field “SALARY” – table “EMPLOYEE” with the values from field “SALARY” – table “EMPLOYEE_STAGING”.
Yii is an open source, object-oriented, component-based MVC PHP web application framework. Yii is pronounced as “Yee” or [ji:] and it’s an acronym for “Yes It Is!
The first thing you need in order to use the Yii Framework is access to a Web server with PHP installed, of course. But if you’re reading this, I’m going to assume you have access to a PHP-enabled server. Note that the Yii Framework does require PHP 5.1 or above.
Installing Yii framework
Get the Yii framework from the site http://www.yiiframework.com/download/
Extract the compressed files into XAMPP htdocs folder, e.g. C:\xampp\htdocs\yii.
SQL injection as a matter of security can be approached from multiple angles. One must first be sure that the targeted application has a confidential database structure, since this is the main thing that makes SQL injection possible.
Also, it’s important to notice that SQL injection is not something that happens arbitrary or from time to time, it takes place on most known websites. In figure 1 are illustrated the results of a study realized by Ponemon Institute about the intensity at which SQL injection takes place on most websites (year 2013):