Ask a question
3 days ago
I overheard a conversation today where two programmers were talking and one used the term “semaphore.” The only way I’ve ever heard the work semaphore used...
1 week ago
I had taken a backup of my SQL Server database, but now I'm unable to restore data from it or somehow it has got corrupted. Is there any solution to recover...
9 Answers |
2 weeks ago
If I don’t want to use an “off-the-shelf” theme with Wordpress, what’s the easiest way to effectively customize a theme? I’m not sure I’m ready to build one...
1 Answer |
4 weeks ago
My company wants us to start providing our services through Android apps. What's the best book for learning Android development?
6 Answers |
4 weeks ago
There have been indications that Google will be replacing Dalvik with ART in the next version of Android. What difference will this make to developers and...
4 weeks ago
I’m assuming that there will be a new Nexus tablet announcement, which is good, because I’m ready for a new toy. I also expect some Android OS announcements...
6 weeks ago
I don’t have any plans to become a programmer, but I do think it would be beneficial to know a programming language, both for...
4 Answers |
Did Microsoft make its biggest mistake by saving Apple? Plus: The best desktop environments for Linux, and the horror game Darkwood comes to Linux.
Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.
Samsung Electronics said Monday that it would postpone the release of its first smartphone running the Tizen OS, the Samsung Z, which was set to launch first in Russia.
Social networking sites in China that are modeled on Facebook are having a hard time holding on to users, with customers like Beijing resident Shi Yunfeng, drifting away to newer services.
Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions.
The organizers of the FirstNet LTE public safety network have the frequencies and standards they need to build the system, and they know where the money's coming from. They know how to get there from here, but it won't be a quick trip.
Oracle is the latest in a string of firms getting a custom fit instead of off the shelf.
IT leaders need to learn how to manage the evolving legal, privacy and compliance issues of SMAC contracts.
Financial institutions use many technologies to fight crime, but much of the work comes too late, focusing on suspicious activity, like uncharacteristic charges or money transfers, after it happens.
Nearly 90 percent of IT executives expect tech spending to either increase or hold steady. And only 12 percent report budget decreases.
White Papers & Webcasts