Archive

Using X API I wrote an EXTMGR_ADDINS. It used to send messages to my other application while creating and editing a meeting. I recorded the EM_NSFNOTECREATE and EM_NSFNOTEUPDATEXTENDED events. I receive the note information if the file is “Appointment” and able to send it. But when I create and edit a new Note I can't get the Note Information (I can get the note handle but its file name isn't "Appointment"). By deleting event in the EM_NSFNOTEDELETE I can get the note info.

I find out that while editing it will create and update event, and it will also copy...

Read more

I have a pair of Universal Serial Bus (USB) micro Bluetooth adapters that can be used to accompany phones and so on. I wanted to know if the adapter can be configured to act as a Bluetooth hub/access point in a visible place outside BT devices such as mobile. Are there any alternative options that phone(s) can be seen the adapter before you can begin a process of association with the adapter itself?

Read more

I just wanted to have better understanding of this software....

Is really Joomla a powerful software/tool???

Read more

I have a Universal Serial Bus (USB) flash drive. I need to have a wireless available either via Wi-Fi or Bluetooth. The backpack has to be mobile with a battery. The worst situation is to get a Raspberry Pi. I have to connect a battery, a Wi-Fi adapter and USB memory device. How can it be done?

Read more

 I created a java consumer web service. This web service then, created a Java Agent Calling. Then the Java imported by the Web Service Consumer. I describe the web service system just like in the java agent method. Below is a sample result of the number of data gathered from the web service. The web service process only returns documents based from its time stamp. I expect that it will only return one (1) document from the next identified web service but it also includes the documents previously gathered by the java agent. I tried using JAX-WS and Apache...

Read more

Our company is trying to run a security script on individual user accounts on Windows NT.

However, we are having difficulty in creating a systematic individual variables for the user logins.

Could you walk me through with the processes of creating a windows security script?

And how could we deactivate the batch files in order for this customize script to run smoothly on individual user accounts?

Read more

I have run an anti-spyware but the pop-up still appears saying that my system is being attacked by a spyware. But why does it seem that I need more anti-spyware on my system now than before? Can anyone send me some ideas?

Read more

I was wondering if it’s okay to leave the computer open (I'm pointing to desk)? I've been doing this for the past 10 days. Is it protected or can cause possible damages to the hardware? Any suggestions?

Read more

I transferred the computer name with a few prefix computers. But Windows Explorer objects are still showing few computer username /password instead of few prefix computer username/password. Any solution or any way to resolve this through instruction line? I am running Windows XP Home Edition so you cannot connect to Local Users and Groups.

Read more

What are the method of computability and complication of calculation of the keys to Artificial Intelligence (AI)? [Note to the layman as for novice in computer science: These are the technicality branch of mathematical sense and computer science, and the solution to the issue has to be a little technique].

Read more