Найденные страницы с тегом bubble sort всего 26743

Python filter() function with Examples - Javatpoint

Python filter() function with Examples on append(), clear(), extend(), insert(), pop(), remove(), index(), count(), pop(), reverse(), sort(), copy(), all(), bool(), enumerate(), iter(), map(), min(), max(), sum() etc.

Square executive sees mobile bubble | Network World

There is a venture investment bubble in the mobile industry as countless startups draw interest for what might be the next big application or tool, the chief operating officer of payments vendor Square said Tuesday.

Is the SAP KPI program really dead? | Network World

SAP is still planning to conduct a benchmarking program for its Enterprise Support service, despite words to the contrary from CEO Léo Apotheker last week -- sort of.

Verizon users flock to forums to address iPhone pre-ordering glitches | Network World

Eager Verizon customers are logging onto both Verizon's and Apple's Web sites to preorder a limited inventory of iPhone 4 smartphones. And they're posting at online forums trying to sort out a welter of misinformation, confusion and glitches.

Space agency wants volunteers to fly to Mars. Sort of. | Network World

The European Space Agency wants volunteers to take the 520-day trip to Mars. Well ok, a simulated version of the red planet voyage but you would get to go to Moscow and pretend you were on a spaceship.

Travel help for road warriors part of expanded iPhone apps catalog | Network World

Online tool lets you sort apps by more specific categories than the Apple store provides

iPad App Spotlight: What’s Your House Worth? | Network World

Since the great real estate bubble burst, many people have been keeping a close eye on the sinking valuation of their homes and hoping for an uptick. Others are searching for the best neighborhoods and homes at bargain prices. Nearly everyone has become a trend watcher.

The bankruptcy code can be your friend, sort of | Network World

 Nobody likes to file for reorganization under the bankruptcy laws, but it happens. And while it's usually bad news for a company's stockholders, in the area we're talking about Chapter 11 has one major advantage -- the ability of the bankrupt company to 'reject' executory contracts, a category that includes ongoing IT and network service agreements. 

Twitter Tips: How And Why To Use Hashtags (#) | Network World

While you can use Twitter's search tool to find specific people, companies, and their messages ("tweets") on the service, Hashtags allow users to sort topics into useful categories to revisit later.

Mystery of RealPlayer exploit, hijacked ad server unfolds | Network World

A week after Symantec discovered a zero-day attack based on the RealPlayer media player, a complex maze of investigation is ongoing to sort out what role 24/7 Real Media ad servers played in disseminating RealPlayer ActiveX exploit across the Internet.

China’s grand outsourcing ambitions could be scuppered by its politics | Network World

China wants to be like India...a major destination for services outsourcing. A Shanghai paper recently ran a story on the 25th anniversary of Infosys, the first global outsourcing company in India. This sort of "legend" story telling is a clear sign of respect and flattery for what has been accomplished in the Indian economy. But could China's politics get in the way of its outsourcing aspirations?

Conficker worm still being tracked, but evidence collection slows | Network World

The notorious malware known as the Conficker worm still infects computers, a sort of wild horse with no rider, but investigators appear no closer to finding its creator.

Microsoft’s Private Folder: It seemed like a good idea at the time | Network World

Microsoft introduces a way for users to protect some of their files and corporate America goes crazy - crazy mad. In an era when laptops full of corporate and personal secrets are stolen on a daily basis, you would think this sort of security offering would be welcomed, but that seems not to be the case. It took Microsoft only a week to get the message and remove the application from its download area.

Hackers, Security Pros Talk Penetration Testing, Social Engineering | Network World

CIO.com goes undercover (sort of) at GrrCon, the Midwest's premier conference on penetration testing and software security, to learn about cloud security, hacking, lock picking and more.

Why is it so hard to compare training providers? | Network World

Is there an independent company that provides ratings of training providers – a sort of Consumer Reports of the IT training industry? That was a question that I recently received from a reader who is an IT manager with a construction company. I thought it would be an easy enough question to answer but after asking a number of training providers and a recruiter, I couldn’t pinpoint a company that provided just that. Even the reader couldn’t find anything after a couple of hours searching the Web.

Hadoop gets more search with MapR, Cloudera releases | Network World

Users of the Hadoop data processing platform now have two more search engines to help them sort through their mountains of information.

Rewind and replay what happens on your network | Network World

Have you ever wished for the ability to press a rewind button to back up to a specific point in time to review exactly what was happening on your network at that moment? Maybe there was some sort of major drag on performance around 2:15 last Tuesday afternoon, and you need to diagnose precisely what caused it. Or perhaps you suspect an employee of improperly sending proprietary data outside the firewall a month ago, and you need to confirm your suspicions by viewing the exact network traffic that user gene

Human factors critical to data center management | Network World

We have spoken at length in this forum about the challenges of managing data centers, both as technological ecosystems and as physical entities, in the face of explosive growth in storage and computational demands, heat generation, and power consumption. But does it have to be like that? Does the data center have to experience change of this sort? If not, what are the factors you can change to help avoid the changes, rather than simply coping with them better?

Anti-virus, etc.: Who is going to watch the watchers? | Network World

If you are running a Windows computer and not using some sort of anti-virus package then you are likely not the one really running your computer. It is very likely that some hacker halfway around the world can do anything he wants to with “your” computer. In a Windows environment running anti-virus to protect the computer from worms and viruses is what is euphemistically called “a required option.” So what do you do when the very tool that is supposed to protect you from attacks turns out to be ena

How safe are your files from government inspection? | Network World

The U.S. government believes it can freely search the contents of your laptop or other mobile device upon entering the United States, since it views this practice as conceptually identical to searching your luggage at the airport, which it can do without any sort of probable cause. A federal appeals court agrees with the government’s position and few judges seem to disagree with the practice. The good that comes from this practice is that child pornographers can be thwarted, but the quite serious downsid

The danger of being too nice at work | Network World

If you're a nice person, you probably think that being nice works to your advantage in the office. After all, how could it be any other way? Genuinely nice people are well liked. They're generally easy to work with. They care about others and tend to have good values. In a fair and just world, that sort of behavior should be rewarded. Right?

The real reason behind Brocade’s purchase of McData in not technology | Network World

Last week Brocade announced its intent to acquire McData, an event that is interesting on a number of levels. The stated rationale, that this will create a "broader range of solutions and services that protect and extend customers' existing investments in [storage-area networking] infrastructure," and that it will "accelerate the pace of innovation to deliver next generation solutions to address customers' information management challenges" is of course an industry-standard platitude for this sort of occur

Absence of strategy, or strategy of absence? | Network World

Didn't we once look to giants such as Cisco and Juniper for their insights about how the industry was going to develop? Their rear-view mirrors have taken over for their windshields, vision-wise. Are these two companies so dumbed down by the aftermath of the bubble that they have no idea what's happening in an industry they've largely shaped? Or is it that they don't want to do strategy anymore?

What’s behind the slowing of IT job losses? | Network World

Recently, there's been some good news - sort of. According to the latest data, the loss of IT jobs has slowed to the lowest level since 2000. Losing less isn't the same as gaining more, but it's at least movement in the right direction, and it makes one wonder what's behind it.