Archive

I am a student of computer science and now learning about software engineering. I need to know that what is Process Modeling and to what extent we need it for software development and I also need to know what are the draw backs of Water Fall method for process modeling .

Read more

It is not specific to a language or a programming technology, but you know how to use programs such as Wireshark to read packets from your computer (or router, specifically) These packages can send secret information which must be encrypted somehow, like username and password for some systems contain. But even without this information, you can create these packages and receive the same information, right ! A related question type: When a router receives a packet, how does it feel to know what computer when multiple computers, direct connected to a local network.

Read more

I'm an Android VOIP application. I want to choose my type of codec based on processor power. Some audio codecs do not work well on some low-end devices. I want this program and do not decide when compiling. What are the criteria that will help you decide the CPU power and bandwidth available for processing: Here are some of them that I can think of: 1) CPU clock 2) memory Is there a standard method to determine the performance calculation based on statistics of memory / CPU It would be good to know if Android provides APIs for analyzing...

Read more

I modifying a website appearance (css modifications), but can not because of the annoying persistent cache to see the result on Chrome. I tried shift refresh but it does not work. How can I temporarily disable the cache or refresh the page in any way that I can see the changes.

Read more

I have a problem. I bought a small VPS and everything works fine. I have a directory and a password for it. And I have a name entry, see the IP address to another server. So when I click on the IP address: *** *** *** / directory without the username and password that I can go funny ... But when I click on the folder I use A: sitea.xxx.com/directory the protected area works is what I want. How can I fix this because I do not want people to see the files in that directory.

Read more

Is the Liskov Substitution Principle limited to Object Oriented Design (OOD) in C++ only or it has application in other programming languages such as Fortran or JAVA? If this principle cannot be adapted and applied, then which other similar design principle can be used for program design in FORTRAN or JAVA? How important is this principle to code maintenance and upgrade? Is it necessary to follow this principle? Will the work be less efficient if the Liskov principle is not followed?

Read more

I was wondering if some knowledgeable IT expert could give an overview of the potential of cloud computing to become a mainstream computing platform for delivering IT solutions to businesses and individuals. What advantages does cloud computing provide to businesses or the individual? Has cloud computing achieve any advances in terms of patronage and if so, would this trend continue into the future? Is there an alternative competitor to cloud computing?

Read more

I need someone to help me understand the concept of virtual machines or virtual drives. Are these two terms the same? How can I create a virtual machine or drive on my windows computer? What is the purpose of having a virtual machine and how does it work? What kind of virtual machine is suitable for installing on a computer running window OS?

Read more

I need some guidelines to help me install OpenMPI for windows. I have tried a few times but it seems this software was primarily designed for Linux machines. Has anyone made an attempt to install this software on windows and did you succeed? Please feel free to give me some directions and advice on potential pitfalls I need to avoid, during the installation and test run, to ensure this system works

Read more

I am having difficulty gaining access to Mysql database tables. The database is managed with EasyPHPDevServer which appears to be working alright, but unfortunately, I cannot connect to the database using normal log in procedure. How can I identify the cause of this incident? Which areas of the database system should I start the forensic investigations in order to identify the root cause?

Read more