This is a mirror of official site: http://jasper-net.blogspot.com/

100 High Quality PSD Files Extremely Useful for Web Designers

| Thursday, February 16, 2012
682-600x285.jpg 817-600x300.jpg

Every designer must be efficient in his work, so if you are one, I guess you know what I mean. If you need to create, let’s say, a vintage ribbon but you have no idea how to start or you don’t have the time to make it, then you search for one. The internet is full of free .PSDs ready to be used by everyone in various projects. In this article you can see a collection of 100 high quality .PSD files that every web designer must have in their “toolbox”. If you like one (or more, I hope), click on the image.

Read more: top-design mag
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=www.topdesignmag.com/100-high-quality-psd-files-extremely-useful-for-web-designers/

Posted via email from Jasper-net

Arbor Networks

|
logo.png

Protecting your business, protecting the world. Real-time intelligence into threat activity from both a global and local perspective

   From the Internet data center edge to the service provider core, the world’s leading network operators and Internet service providers turn to Arbor Networks to proactively fend off malicious threats such as botnets and distributed denial of service (DDoS) attacks, while strengthening the availability and quality of their services. In addition to being the de facto standard for network security and availability solutions, Arbor enables its customers to reduce costs by improving IPv4 and IPv6 traffic engineering, peering and other operational efficiencies.  Additionally, Arbor’s solutions are a strategic investment for service providers, allowing them to utilize the same solution for infrastructure visibility and security to deliver new, differentiated, revenue-generating managed services such as MPLS VPN visibility and DDoS managed security services.

Read more: Arbor Networks
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.arbornetworks.com/

Posted via email from Jasper-net

C# Language Features, From C# 2.0 to 4.0

| Wednesday, February 15, 2012
  • Partial Types
  • Anonymous Methods
  • Iterators
  • Nullable Types
  • Private Setters (properties)
  • Method Group Conversions (delegates)
  • C# 3.0 Features
  • Object and Collection Initializers
  • Auto-Implemented Properties
  • Anonymous Types
  • Extension Methods
  • Query Expressions
  • Lambda Expressions
  • Expression Trees
  • C# 4.0 Features
  • Generic Covariance and Contravariance
  • Conclusion
  • Introduction

    This article discusses the language features introduced in C# 2.0, 3.0, and 4.0. The purpose of writing this article is to have a single repository of all the new language features introduced over the last seven years and to illustrate (where applicable) the advantages of the new features. It is not intended to be a comprehensive discussion of each feature, for that I have links for further reading. The impetus for this article is mainly because I could not find a single repository that does what this article does. In fact, I couldn't even find a Microsoft webpage that describes them. Instead, I had to rely on the universal authority for everything, Wikipedia, which has a couple nice tables on the matter.


    Read more: Codeproject
    QR: C-Language-Features-From-C-2-0-to-4-0

    Posted via email from Jasper-net

    Общаемся с SIM-картой на низком уровне

    |
    7673df1f39de13dcc75bd48057a74e00.jpg

    Ну а если вам все-таки интересно узнать больше о сим-картах, протоколах передачи и их файловой структуре, прошу под кат. Ну и куда же без кода…

    1. Введение

    Начать стоит с того, что сим-карта является разновидностью смарт-карт, поэтому она полностью подчиняются стандарту ISO-7816. Я не буду говорить, какие выводы она имеет (об этом уже подробно говорили в предыдущей статье).

    На процессор некоторых симок (если точнее — смарт-карт) можно подавать синхронизирующий сигнал до 20 МГц. Но ведь при включении симки терминал не знает ее параметров, поэтому общение начинается с, максимум, 4 МГц. Впоследствии, терминал узнает симку получше и может изменить параметры передачи.

    К выводу I/O должен быть подключен pull-up резистор номиналом 20 КОм. В те моменты, когда терминалу и симке нечего сказать друг другу (т.е. они оба находятся в Z-состоянии) этот резистор обеспечит на выводе логическую единицу.

    2. Активация/деактивация

    Активация сим-карты и последующий cold reset

    7e4d87b5d473695f570ad092f705a131.png

    Read more: Habrahabr.ru
    QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://habrahabr.ru/blogs/telecom/137963/

    Posted via email from Jasper-net

    C# for Gaming: AltDevConf This Weekend

    |
    It is a great honor to participate this weekend on the online AltDevConf conference. This is an online two-day event

        Our goal is twofold: To provide free access to a comprehensive selection of game development topics taught by leading industry experts, and to create a space where bright and innovative voices can also be heard. We are able to do this, because as an online conference we are not subject to the same logistic and economic constrains imposed by the traditional conference model.

    I will be participating in the talk on Cross Platform Game Development using C# with Matthieu Laban and Philippe Rollin.

    Read more: Personal blog of Miguel de Icaza
    QR: Feb-09.html

    Posted via email from Jasper-net

    MonoTouch 5.2 is Here!

    |
    Build Great iOS Apps in C#

    We’re very proud to announce the availability of MonoTouch 5.2. This release represents months of improvements, with over 300 new features, bugfixes, and enhancements. This is without question the best release of MonoTouch to date.

    Here’s a quick rundown of some of the new features in MonoTouch 5.2.

    Read more: Xamarin
    QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://blog.xamarin.com/2012/02/08/monotouch-5-2-is-here/

    Posted via email from Jasper-net

    Fancy use of exception handling in FormatMessage leads to repeated "discovery" of security flaw

    |
    Every so often, somebody "discovers" an alleged security vulnerability in the Format­Message function. You can try it yourself:

    #include <windows.h>
    #include <stdio.h>

    char buf[2048];
    char extralong[128*1024];

    int __cdecl main(int argc, char **argv)
    {
     memset(extralong, 'x', 128 * 1024 - 1);
     DWORD_PTR args[] = { (DWORD_PTR)extralong };
     FormatMessage(FORMAT_MESSAGE_FROM_STRING |
                   FORMAT_MESSAGE_ARGUMENT_ARRAY, "%1", 0, 0,
                   buf, 2048, (va_list*)args);
     return 0;
    }


    Read more: The old new thing
    QR: 10266256.aspx

    Posted via email from Jasper-net

    Wayback gaming today... Warzone 2100 (free, cross platform and OSS too)

    |
    file.php?id=4047&mode=view

        I love freeware games – especially once store-bought titles gone public domain. That is, you once had to shell out money for ‘em. Now, gratis. Well, if you’re any kind of fan of strategy, I have a pretty good pick for this week – Warzone 2100. Rebuild civilization and design your own weapons of mass destruction along the way. ...

        Real-time strategy games have been kicking around for well over a while now and this lesser known title had some unique stuff going for it back in the day. This game was kind of a builder’s paradise – with a focus on finding ancient relics, researching them and using the design pieces to mix-and-match and create a mobile machine gun turret tank….or whatever else you can dream up. With over 400 technologies you can develop and the unit design system, there’s a surprisingly vast choice of units and tactics you can try.

        I actually remember playing the original game when it came out in 1999 – yep, I feel old. ANYhow, the game went public domain around 2004 and since then, it’s been an on again, off again labor of love to update the open code.

        One of the nice benefits of how it worked out: You get a full retail game – granted, it’s over 12 years old – but that just means you can play it on just about any computer out there, without a problem. ...


    Read more: Greg's Cool [Insert Clever Name] of the Day
    Read more: Freeware Friday: Warzone 2100
    QR: 76611

    Posted via email from Jasper-net

    Code signing for the independent developer

    |
    One of the features introduced with Silverlight 4 was the out-of-browser feature, enabling you to create an application that can be installed, run offline, automatically updated, etc.  As a part of that feature, some of the major code signing certificate vendors (for Authenticode certs) provided our team with test certificates so that we could go through the same process as a developer would to acquire the cert and apply it to an app…and, of course, validate it works.

    During that time some of those vendors had promotional codes for the first year for Silverlight developers, providing reduced-rate (but not reduced quality) code-signing certificates for their apps.  Still during this time there were a lot that questioned why some providers were still expensive and didn’t value “the little guy.”  By that I mean that there are a lot of smaller firms or independent personal developers.  The thought of dropping a few hundred dollars on a cert is sometimes tough.

    Last week a representative contacted me about their offerings as a premier partner of one of those providers.  Certs4less.com is now offering Thawte code-signing certificates for individual developers.  They are doing this at a price of $99 per year (less for multi-year).

        NOTE: As a part of this, like before with SL4, Certs4Less graciously offered a promotional cert for me to validate the end-to-end process so that I could speak accurately about it.  I do not use any of these certs provided by these companies for testing purpose toward any production application and they are for testing purposes only.  Besides, I’ve not found the time to write production code for apps lately ;-).  I am not getting paid for this post, nor am I getting another promo code for personal use myself.  I am simply providing what I think is valuable information and get no compensation from Thawte or Certs4Less.

    I went through the process of obtaining this cert from Certs4Less.com and it produced exactly what you’d expect, a valid Authenticode code-signing certificate I can use for my Silverlight and Windows 8 application packages!  I shared a few points of feedback with the contact there and will enumerate them here for you as well (as well as some tips)

    Read more: Method ~ of ~ failed
    QR: code-signing-for-independent-developer.aspx

    Posted via email from Jasper-net

    HttpRequests using HTTP verbs, headers and cookies in Silverlight

    |
    When working with Silverlight, we often end up communicating with some form of services. They might be SOAP-based WCF services, which Silverlight handles fine, but lately REST-like services have become a lot more popular, and Silverlight doesn’t always handle them as nicely… They often rely on headers and HTTP verbs other than GET and POST, which Silverlight doesn’t handle very well by default.

    In my world, I am currently spending a lot of time working with a Silverlight client that is used in a situation where we use federated security. This requires the client to carry around a token that tells the service who he/she is, and what claims are being made.

    In this case, we are using the thinktecture IdentityServer, which after a bit of configuration works very well. It makes it very easy to integrate with using Silverlight, which is nice. All you need to do is do is to make an HTTP GET call to the identity server, passing along the credentials in the form of a basic authentication header. The identity server in turn replies with a token that identifies the client (at least if the credentials are valid). The client can then POST that token to the the service (relying party) who will then use that token to authenticate the client. And after that, everyone is happy, and the service can trust the client being who he/she says he/she is…

    So in theory, this all just works, no problems at all. And to be honest, it pretty much does! The actual “session”, and by session I mean the period when the service trusts the client, is limited by the token and kept alive using a cookie. What this means, is that the service puts the token in a cookie which is passed back and forth to the server with every request. The token in turn contains a date and time that defines when it is no longer valid. So all the server has to do is to look at that token every request, and make sure it is still valid…

    Read more: DarksideCookie
    QR: HttpRequests-using-HTTP-verbs-headers-and-cookies-in-Silverlight.aspx

    Posted via email from Jasper-net

    Apache Subversion 1.7.3 Released

    |
    The first Apache Subversion release of 2012 is now available! Subversion 1.7.3 builds on the long-awaited enhancements of the recent Subversion 1.7 release, by introducing even more improvements. Subversion 1.7.3 improves the SASL error messages, allows committing the result of some copy operations, and fixes a source of possible FSFS corruption.

    More information on what’s new and noteworthy in this release, is available at the Changes file. The latest binaries can be downloaded for free from the WANdisco website. As ever, our 1.7.3 binaries undergo the same rigorous quality assurance process as our Enterprise Subversion products.

    Read more: Blogging from Disco
    QR: ?kt_

    Posted via email from Jasper-net

    WCF Extensibility – Initializers (instance context, channel, call context)

    |
    This post is part of a series about WCF extensibility points. For a list of all previous posts and planned future ones, go to the index page.

    And we’re reaching the end of this series. To close it, I’ll cover some of the lesser used extensibility points in WCF, which would be too short for a full post. This time I’ll cover the “initializer” interfaces, which can be used to, well, initialize some component of the WCF runtime. Those are the IInstanceContextInitializer, ICallContextInitializer and IChannelInitializer, which will be covered in detail below.

    And since there will be multiple samples in this post, the usual disclaimer goes ahead: they are simple samples for illustrating the topics of this post, not production-ready code. I tested them for a few contracts and they worked, but I cannot guarantee that they will work for all scenarios – please let me know if you find a bug or something missing. There are some shortcuts I did in them to make the sample smaller, such as not using real resource files in the call context initializer sample, and, as usual, error checking has been kept to a minimum.


    IInstanceContextInitializer

    The example from the previous post showed how we can completely control the instance context life cycle with the IInstanceContextProvider interface. There are some scenarios, however, where all we want is to simply perform some initialization code when a new instance context is created – essentially, only implement the InitializeInstanceContext method in the instance context provider. Such scenarios can involve attaching an extension to the instance context, or possibly doing some custom throttling. For those cases, having to implement the whole instance context provider is a lot of work, so for this scenario WCF also provides (yet) another extensibility point, the IInstanceContextInitializer interface, which is called whenever a new instance context is created. The interface declaration is shown below.

        public interface IInstanceContextInitializer
        {
            void Initialize(InstanceContext instanceContext, Message message);
        }


    Read more: Carlos' blog
    QR: wcf-extensibility-initializers-instance-context-channel-call-context.aspx

    Posted via email from Jasper-net

    February 2012 Security Release ISO Image

    |
    This DVD5 ISO image file contains the security updates for Windows released on Windows Update on February 14, 2012.

    Read more: MS Download
    QR: details.aspx?id=28924

    Posted via email from Jasper-net

    Center for Internet Security

    |
       The Center for Internet Security (CIS) is a not-for-profit organization focused on enhancing the cyber security readiness and response of public and private sector entities, with a commitment to excellence through collaboration. Through its three divisions--Security Benchmarks, Multi-State ISAC and Cybersecurity Workforce Development--CIS serves as a central resource in the development and delivery of high-quality, timely products and services to assist our partners in government, academia, the private sector and the general public in improving their cyber security posture.

    Read more: Center for Internet Security
    QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://cisecurity.org/

    Posted via email from Jasper-net

    A TOOL TO DECEIVE AND SLAUGHTER

    | Tuesday, February 14, 2012
    9_fall200820.jpg

        Combining Robert Morris' Box With the Sound of Its Own Making with Baudrillard's writing on the art auction this sculpture exists in eternal transactional flux. It is a physical sculpture that is perpetually attempting to auction itself on eBay.
    Every ten minutes the black box pings a server on the internet via the ethernet connection to check if it is for sale on the eBay. If its auction has ended or it has sold, it automatically creates a new auction of itself.
       If a person buys it on eBay, the current owner is required to send it to the new owner. The new owner must then plug it into ethernet, and the cycle repeats itself.

    Read more: Caleb Larsen
    QR: a-tool-to-deceive-and-slaughter

    Posted via email from Jasper-net

    25 сервисов для продуктивной работы с Gmail

    |
    Gmail был запущен в 2004 году и предлагал пользователям 1 Гб для электронной почты. Это было неслыханно по тем временам, к примеру, крупнейший сервис электронной почты Hotmail предлагал лишь несколько мегабайт. В настоящее время Gmail предлагает 7 Гб, Hotmail — 5 Гб, а Yahoo — не ограничивает размер ящика.

    Gmail также пользуется популярностью среди коммерческих пользователей из-за того, что быстро работает, надежный и легко настраиваемый. Помимо экспериментальных функций, которые предлагает Google через Google Labs, есть сервисы от сторонних разработчиков, которые улучшают работу с Gmail.

    Я составил подборку 25 лучших сервисов, которые сделают более эффективной вашу работы с лучшей почтовой службой от Google и вы сами заметите как увеличится ваша продуктивность работы с Gmail.

    * Интересный факт: Google купил домен Gmail у компании Garfield, которая использовала его в качестве сервиса бесплатной электронной почты для своих пользователей.


    findbigmail-1.png
    1. Find Big Mail
    Онлайн сервис

    Find Big Mail удивительный бесплатный сервис, который ищет письма большого размера в вашем ящике. Вам нужно лишь указать email адрес и предоставить для сервиса доступ к аккаунту.


    Read more: Habrahabr.ru
    QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://habrahabr.ru/blogs/GMail/138003/

    Posted via email from Jasper-net

    Using the Windows System State Analyzer utility to compare before/after system snapshots (pre/post install/config/uninstall etc)

    |
    image%25255B7%25255D.png?imgmax=800

    There often arises a need to figure out what may have changed on a system, either due to a specific issue or even to compare the difference between two systems. Today I would like to introduce you to the Windows System State Analyzer utility. Unless you are a developer or tester, you probably have never heard of this tool, as it is part of the Windows 2008 R2 Logo Software Certification and Windows 2008 R2 Logo Program Software Certification toolkits.

    The basic functionality of the System State Analyzer tool is to allow you to compare two snapshots taken at different points in time. This allows you to compare the state of a machine both before and after an application install for instance. Today I will give you a run-through of what the tool looks like while doing a compare of a system both before and after installing a software package, in this case Virtual PC 2007. The initial UI will look something like this:

    Read more: Greg's Cool [Insert Clever Name] of the Day
    Read more: An Introduction to the Windows System State Analyzer
    QR: an-introduction-to-the-windows-system-state-analyzer.aspx

    Posted via email from Jasper-net

    Calling a WCF service from a client without having the contract interface

    |
    I was asked yesterday in the Hebrew C#/.NET Framework MSDN forums a tough question – is it possible to dynamically call a WCF service using only the contract name, operation name, and metadata address?

    At first, I agreed with the answer given in the forum – move from SOAP bindings to WebHttpBinding (“REST”). This of course makes things a lot easier, only requiring you to create a WebHttpRequest and parse the response. However the question remains - is it possible to do this in the case of a SOAP-based service endpoint?

    The short answer is – YES!

    The full answer is – YES, but you’ll need to do a lot of coding to make it work properly, and even more coding for complex scenarios (who said passing a data contract?)

    How is it done you ask?

    First let’s start with the contract – you have a simple contract that looks like so:


    [ServiceContract]
    public interface ICalculator
    {
       [OperationContract]
       double Add(double n1, double n2);
      
       [OperationContract]
       double Subtract(double n1, double n2);

       [OperationContract]
       double Multiply(double n1, double n2);

       [OperationContract]
       double Divide(double n1, double n2);
    }


    At this point, the implementation doesn’t matter, but you can assume the service compiles and loads successfully.

    Second, make sure your service has either a MEX endpoint or metadata exposed over HTTP GET. Read here for more info about the difference between the two.

    Third – do the client coding!!! To create the client code, I took some ideas from the following links:

        http://msdn.microsoft.com/en-us/library/ms733780.aspx – Generating client-side type information for WCF contracts
        http://www.codeproject.com/Articles/42278/Call-a-Web-Service-Without-Adding-a-Web-Reference – The same concept of dynamic calls, but for ASP.NET web services (ASMX)


     using System;
     using System.Collections.Generic;
     using System.Linq;
     using System.ServiceModel;
     using System.ServiceModel.Description;
     using System.Globalization;
     using System.Collections.ObjectModel;
     using System.CodeDom.Compiler;
     
     namespace Client
     {
         class Program
         {
             static void Main(string[] args)
             {
                 // Define the metadata address, contract name, operation name,
                 // and parameters.
                 // You can choose between MEX endpoint and HTTP GET by
                 // changing the address and enum value.
                 Uri mexAddress = new Uri("http://localhost:8732/CalculatorService/?wsdl");
                 // For MEX endpoints use a MEX address and a
                 // mexMode of .MetadataExchange
                 MetadataExchangeClientMode mexMode = MetadataExchangeClientMode.HttpGet;
                 string contractName = "ICalculator";
                 string operationName = "Add";
                 object[] operationParameters = new object[] { 1, 2 };
     
                 // Get the metadata file from the service.
                 MetadataExchangeClient mexClient = new MetadataExchangeClient(mexAddress, mexMode);
                 mexClient.ResolveMetadataReferences = true;
                 MetadataSet metaSet = mexClient.GetMetadata();
     
                 // Import all contracts and endpoints
                 WsdlImporter importer = new WsdlImporter(metaSet);
                 Collection<ContractDescription> contracts =  importer.ImportAllContracts();
                 ServiceEndpointCollection allEndpoints = importer.ImportAllEndpoints();
     
                 // Generate type information for each contract
                 ServiceContractGenerator generator = new ServiceContractGenerator();
                 var endpointsForContracts = new Dictionary<string, IEnumerable<ServiceEndpoint>>();
     
                 foreach (ContractDescription contract in contracts)
                 {
                     generator.GenerateServiceContractType(contract);
                     // Keep a list of each contract's endpoints
                     endpointsForContracts[contract.Name] = allEndpoints.Where(
                         se => se.Contract.Name == contract.Name).ToList();
                 }
     

    Read more: Codeproject
    QR: Calling-a-WCF-service-from-a-client-without-having

    Posted via email from Jasper-net

    Resin: We Were Fast Before NginX

    |
    Netcraft's February 2012 Web Server Survey was released recently, and Caucho's Resin Application Server continued to see strong growth, gaining over 4.2M hostnames in the past twelve months and acquiring a market share of 0.77%.

        The Netcraft Web Server Survey has run since August 1995, exploring the Internet to find new websites. Every month, an HTTP request is sent to each site, determining the Web server software used to support the site, and, through careful inspection of the TCP/IP characteristics of the response, the operating system.

        -- Netcraft

    Read more: DZne Javalobby
    QR: resin-we-were-fast-nginx

    Posted via email from Jasper-net

    EnterpriseDB Announces General Availability of Postgres Plus Advanced Server 9.1

    |
    Thu Feb 9, 2012 12:51pm EST

      BEDFORD, MA, Feb 09 (MARKET WIRE) --
    EnterpriseDB, the leading worldwide provider of PostgreSQL and Oracle compatibility products and services, today announced general availability of Postgres Plus Advanced Server 9.1. The release features significant performance enhancements, including the option to free even more processing power for some applications with the industry's only synchronous replication control on a per-transaction basis. This latest version also speeds read performance and write scalability, enables unlogged tables for greater performance and flexibility and expands the Oracle-compatible feature set.

        "Our newest version of Postgres Plus Advanced Server adds new, high-end capabilities for performance, reliability, security and scalability. With this release we are enabling our end users to accelerate the expansion of their Postgres Plus deployments at a price point exponentially less than the traditional proprietary databases," said Ed Boyajian, president and CEO of EnterpriseDB. "These enhancements also give new users even more reason to start looking at Postgres Plus as an alternative for their data centers."

        Postgres Plus Advanced Server 9.1 includes the following enterprise-class enhancements:


    --  Synchronous Replication - Provides maximum control over transaction
        environments by enabling end users to activate synchronous replication
        on a per-transaction basis (or per connection or per user) -- a level
        of flexibility and control not available in any other database. This
        ensures no data is lost should a master fail, and provides performance
        gains by allowing the application or end user to select what
        transactions are replicated. This process confirms a transaction has
        been successfully applied to the slave server's journal before it is
        committed to the master.
    --  Unlogged Tables - Gives end users the option to maximize performance
        by choosing 'unlogged' when creating tables, thus no write-ahead
        logging (WAL) records are kept. This becomes useful when applications
        must perform quickly and data loss, should the system fail, is not a
        concern, such as an online store where the emphasis is on preserving
        purchase data, but other information like the product reviews a
        customer viewed, which can generate significantly more data, is less
        critical.


    Read more: Reuters
    QR: idUS216706+09-Feb-2012+MW20120209

    Posted via email from Jasper-net

    How to write and run a C Program in Visual Studio 2010

    |
    Today I was recalling good days of language C and got tempted to play around POINTERS, STRUCTURE, and DATA STRUCTURE etc. I started to write some C code and as soon as I started, the first hurdle came that where to write code? I was running on 64 bit Windows 7 machine with Visual Studio 2010. I binged and found much suggestion to download this and install that etc. However being fan and loyal user of Visual Studio, I was more desired to use rich IDE of Visual studio for my C program. To my surprise it is quite possible to use Visual Studio 2010 to write and compile code in C language.

    In this post I am going to walkthrough writing C program in Visual Studio 2010. Follow the steps as below,

        Create a new project by clicking File->New->Project.
        From Installed Template choose other language
        Choose language Visual C++
        In Visual C++ choose tab Win32
        Choose project type Win32 Console Application

    See the image below,

    image_thumb24.png?w=594&h=375

    Read more: DZone .NET zone
    QR: how-write-and-run-c-program

    Posted via email from Jasper-net

    Difference between a cross join and a full outer join

    |
    We are interviewing for some SQL developer positions and it seems that most people that I interviewed the past 3 weeks do not know the difference between a full outer join and a cross join.
    Cross join

    A cross join produces the Cartesian product of the tables involved in the join. The size of a Cartesian product result set is the number of rows in the first table multiplied by the number of rows in the second table

    Here what Wikipedia has to say about it: http://en.wikipedia.org/wiki/Cartesian_product

        For example, the Cartesian product of the 13-element set of standard playing card ranks {Ace, King, Queen, Jack, 10, 9, 8, 7, 6, 5, 4, 3, 2} and the four-element set of card suits {♠, ♥, ♦, ♣} is the 52-element set of all possible playing cards: ranks × suits = {(Ace, ♠), (King, ♠), ..., (2, ♠), (Ace, ♥), ..., (3, ♣), (2, ♣)}. The corresponding Cartesian product has 52 = 13 × 4 elements. The Cartesian product of the suits × ranks would still be the 52 pairings, but in the opposite order {(♠, Ace), (♠, King), ...}. Ordered pairs (a kind of tuple) have order, but sets are unordered. The order in which the elements of a set are listed is irrelevant; the deck can be shuffled and it is still the same set of cards.


    Read more: LessThanDot
    QR: difference-between-a-cross-join

    Posted via email from Jasper-net

    שאלות נפוצות ב Word

    |
    שלום לכולם,

    כאן יובל וולדמן, והיום נעבור על 10 שאלות נפוצות בתוכנת Microsoft Office Word 2010, ותשובות אליהם.

    1. שאלה ראשונה: הצילו! מופיעים לי קווי רשת על כל המסמך!

    gridlines_thumb_2C9750B5.png

    תשובה: יש לגשת ללשונית תצוגה (View), ובפנים להסיר את ה V מתיבת הסימון בשם קווי רשת (Grid Lines).

    GridLinesA_thumb_4EBF366E.png

    2. שאלה: אני רוצה לכתוב קישורית (Link) והיא יוצאת לי מוזר, מה עושים?

    Read more: MS Support
    QR: Word-Q-and-A.aspx

    Posted via email from Jasper-net

    Дешёвые RFID напечатали на бумаге

    |
    09312460ff28ab18245574b3ceba264f.jpg

    Группа учёных под руководством Камиля Рамада (Camille Ramade) из института электроники при университете Монпелье нашли способ наносить радиочипы RFID на бумагу методом выпаривания на высоких температурах, при сохранении хорошей электропроводности металла. Если инновационный техпроцесс удастся реализовать в промышленных масштабах, то это означает удешевление RFID примерно на 80% и кардинальное расширение сферы их применения. Фактически, антенны можно будет приклеивать куда угодно, как бумажные марки, так что RFID наконец-то вытеснят с рынка неудобные штрих-коды и QR-коды.

    Read more: Habrahabr.ru
    QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=habrahabr.ru/blogs/wireless/138059/

    Posted via email from Jasper-net

    SQL Server Service Broker "At a Glance"

    |
    SQL Server Service Broker provides the SQL Server Database Engine native support for messaging and queuing applications. This makes it easier for developers to create sophisticated applications that use the Database Engine components to communicate between disparate databases. Developers can use Service Broker to easily build distributed and reliable applications." This is according to the Technet reference found here.

    SQL Server Service broker was introduced in SQL Server 2005. After more than 7 years of its existence SQL Server Service broker remains a gray area to most SQL Server developers. Below are cases where service broker can be use.

    Table of Contents

        Introduction
        Real Life Scenario.
        Service Broker to the rescue.
        Why not SSIS?
        Why not Replication then?
        Service Broker Step By Step
            1. Know Where Service Broker is in SQL Server Management Studio?
            2. How to Enable Service broker in the Database?
            3. How to create a message type?
            4. Create a Contract
            5. Create Sender and Receiver Queue
            6. Create Sender and Receiver Services
            7. Send a message to the Queue.
            7. View the message without removing it from the Queue

    Real Life Scenario.

    You are an IT professional in a department store industry named “My-mall”. “My-mall” have 100 point of sale(POS) terminals sitting on top of a SQL Server “sales” database. Sales database is owned by “sales Department”. Sales department critical task is accommodating sales from customer either by payment through credit card, cash, debit card or gift certificates . “My-mall” also have an “inventory” database owned by the “inventory department”. Inventory department critical task is replenishing stocks in the store in a timely manner as well as maintaining the correct inventory of the product. My-mall also has an accounting database owned by the accounting department.

    Read more: Greg's Cool [Insert Clever Name] of the Day
    Read more: SQL Server Service Broker at a Glance
    QR: 6598.sql-server-service-broker-at-a-glance.aspx

    Posted via email from Jasper-net

    Silverlight Debug Helper

    |
    Project Description
    The Silverlight Debug Helper installs as a Visual Studio Add-in and runs in the background. When a debug operation is started, it checks whether Visual Studio is already attached to the correct process(es) to debug Silverlight projects, and tries to do that if it's not.

    Read more: Codeplex
    QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://sldebughelper.codeplex.com/

    Posted via email from Jasper-net

    TextGlow

    |
    Download?ProjectName=textglow&DownloadId=66026&Build=18398

    Project Description
    TextGlow is a Silverlight 2.0 demo application for viewing Word 2007 documents in the browser.

    Demo
    See TextGlow in action at http://www.textglow.com.

    Requirements
    TextGlow requires Silverlight 2.0.

    Read more: Codeplex
    QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://textglow.codeplex.com/

    Posted via email from Jasper-net

    GFI LanGuard

    |
    Complete network security for SMBs

    GFI LanGuard™ is an award-winning network security and vulnerability scanner used by small and medium-sized businesses (SMBs) all over the world. GFI LanGuard provides a complete network security overview with minimal administrative effort, while also providing remedial action through its patch management features. Easy to set up and use, GFI LanGuard acts as a virtual consultant to give you a complete picture of your network set-up, provide risk analysis and help you to maintain a secure and compliant network state faster and more effectively. GFI LanGuard assists you in patch management, vulnerability assessment, network and software auditing, asset inventory, change management, risk analysis and compliance.

    Read more: GFI
    QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.gfi.com/network-security-vulnerability-scanner/

    Posted via email from Jasper-net

    6 important .NET concepts: - Stack, heap, Value types, reference types, boxing and Unboxing.

    |

    2.jpg

    Introduction
    What goes inside when you declare a variable?
    Stack and Heap
    Value types and reference types
    So which data types are ref type and value type?
    Boxing and Unboxing
    Performance implication of Boxing and unboxing
    Source code


    What goes inside when you declare a variable?

    When you declare a variable in a .Net application, it allocates some chunk of memory in to the RAM. This memory has 3 things first the name of the variable, second data type of the variable and finally the value of the variable.

    That was a simple explanation of what happens in the memory, but depending on what kind of data type your variable is allocated on that type of memory. There are two types of memory allocation stack memory and heap memory. In the coming sections we will try to understand these two types of memory in more details.

    Read more: Codeproject
    QR: 6-important-NET-concepts-Stack-heap-Value-types-re

    Posted via email from Jasper-net

    Introduction to Multi Binding and Multi value converter using IMultiValueConverter & MultiBinding

    |
    image_thumb6.png?w=500

    For Introduction to Value Converters, see the post here.

    For more information on mode property, see the the post on mode here.

    MultiBinding allows us to bind a binding target property to a list of source properties and then apply logic to produce a value with the given inputs. This example demonstrates how to use MultiBinding. The following example produces a TextBox that adds the numbers in TextBox1 and TextBox2 and puts the result into TextBox3. Here we have two source properties and the one target property. When you enter numbers in the TextBox1 and TextBox2 , the converter comes into play and automatically adds them and puts the result into TextBox3. The values of the Mode and UpdateSourceTrigger properties determine the functionality of the MultiBinding and are used as the default values for all the bindings in the collection unless an individual binding overrides these properties. For example, if the Mode property on the MultiBinding object is set to TwoWay, then all the bindings in the collection are considered TwoWay unless you set a different Mode value on one of the bindings explicitly.

    In the following code, AddConverter implements the IMultiValueConverter interface. AddConverter takes the values from the individual bindings and stores them in the values object array. The order in which the Binding elements appear under the MultiBinding element is the order in which those values are stored in the array.

    Read more: Codeproject
    QR: Introduction-to-Multi-Binding-and-Multi-value-conv

    Posted via email from Jasper-net

    New Silverlight Video Tutorial: Importing Photoshop Files into Expression Blend

    |
    Hello All!

    In this new video tutorial I show you how you can easily import Photoshop PSD files into Expression Blend 3.  I show you how you can import the entire flattened image,  called a Compatibility Image or you can import only certain Photoshop Layers.  Enjoy:

    Video: http://tinyurl.com/7agvz55

    Read more: Victor Gaudioso's Silverlight Blog
    QR: ?p=85

    Posted via email from Jasper-net

    How To Build a Handwritten Letter Style Contact Form

    |
    01.jpg

    Follow this step by step tutorial to create a traditional pen & paper inspired contact form in HTML and CSS. We’ll use a mix of basic and intermediate CSS techinques to give the form the appearance of a letter, then use the @font-face CSS property to transform the digital text into handwriting.

    Read more: Line25
    QR: how-to-build-a-handwritten-letter-style-contact-form

    Posted via email from Jasper-net

    Знакомство с TCP стеком для микроконтроллеров фирмы Microchip

    | Monday, February 13, 2012
    image022cv.jpg

    Предположим, у нас возникла необходимость в создании устройства с возможностью подключения к сети Ethernet. Вариантов имеется довольно много, но все их можно условно разделить на 3 вида.


    •Преобразователь RS-232—Ethernet, обычно представляющий собой виртуальный COM-порт, преобразующий поток данных RS-232 в IP-пакеты на одном конце, и неким устройством, которое занимается приёмом и раскодированием этих пакетов, и отдающее контроллеру в виде RS-232 на другом конце. Пример подобного устройства: Tibbo EM100. Достоинства такого решения—простота программирования. Не нужно вникать в тонкости протоколов, подключаемое устройство может вообще быть не в курсе, что данные ему приходят не напрямую с последовательного порта, а, например, из Интернета. Недостатки у такого решения тоже имеются—не получится использовать протоколы более высоких уровней, такие, как SNMP, HTTP и прочие, т.е. о WEB-интерфейсе, к примеру, можно забыть.

    •Некое продвинутое устройство, «чёрный ящик», который обладает своим процессором, памятью, стеком протоколов, сам занимается обработкой Ethernet-пакетов, и наружу отдаёт опять же RS-232 или SPI. Примеры таких решений: Lantronix XPort, представляющий собой законченный ультракомпактный встраиваемый сервер размером чуть больше разъёма RG-45:

    image007he.png

    Read more: Habrahabr.ru
    QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://habrahabr.ru/blogs/controllers/138081/

    Posted via email from Jasper-net