Найденные страницы с тегом programming examples всего 447277

MongoDB Aggregation Commands - javatpoint

MongoDB Aggregation Commands with MongoDB Tutorial, Examples on CRUD, insert document, query document, update document, delete document, use database, projection etc.

MongoDB Delete Documents - javatpoint

MongoDB Delete Documents for beginners and professionals with examples on CRUD, insert document, query document, update document, delete document, use database, projection etc.

MongoDB Update Documents - javatpoint

MongoDB Update Documents for beginners and professionals with examples on CRUD, insert document, query document, update document, delete document, use database, projection etc.

MongoDB Query Documents - javatpoint

MongoDB Query Documents for beginners and professionals with examples on CRUD, insert document, query document, update document, delete document, use database, projection etc.

MongoDB Insert Documents - javatpoint

MongoDB Insert Documents for beginners and professionals with examples on CRUD, insert document, query document, update document, delete document, use database, projection etc.

MongoDB Create Collection - javatpoint

MongoDB Create Collection for beginners and professionals with examples on CRUD, insert document, query document, update document, delete document, use database, projection etc.

MongoDB Create Database - javatpoint

MongoDB Create Database for beginners and professionals with examples on CRUD, insert document, query document, update document, delete document, use database, projection etc.

MongoDB Connection Methods - javatpoint

MongoDB Connection Methods with MongoDB Tutorial, Examples on CRUD, insert document, query document, update document, delete document, use database, projection etc.

How to install MongoDB on Windows - javatpoint

How to install MongoDB on Windows for beginners and professionals with examples on CRUD, insert document, query document, update document, delete document, use database, projection etc.

iter() in Python | Python iter() Function with Examples - Javatpoint

iter() in Python | Python iter() Function with Examples with Examples on Python, Built in, Functions, abs Function, all Function, bin Function, bool Function, python Functions, new sum Function, bytes Function, new callable Function etc.

Python filter() function with Examples - Javatpoint

Python filter() function with Examples on append(), clear(), extend(), insert(), pop(), remove(), index(), count(), pop(), reverse(), sort(), copy(), all(), bool(), enumerate(), iter(), map(), min(), max(), sum() etc.

map() in Python | Python map() Function with Examples - Javatpoint

map() in Python | Python map() Function with Examples with Examples on Python, Built in, Functions, abs Function, all Function, bin Function, bool Function, python Functions, new sum Function, bytes Function, new callable Function etc.

Websense touts data-leak prevention endpoint control | Network World

Websense says it will release an endpoint security product for content protection in the first half of next year, along with an extended set of open Application Programming Interfaces for it, which third-party vendors can use to work with it.

Nations, companies should prepare for cyberwar, experts say | Network World

The world hasn't yet seen examples of true cyberwar, although governments around the world need to prepare for it, an expert in cybersecurity law from Estonia said Monday.

Intel unveils energy-efficient 48-core chip | Network World

Intel today unveiled an experimental 48-core chip that will be distributed to about 100 researchers to help develop programming models and software.

Programming languages cannot be copyrighted, says senior EU court adviser | Network World

The functionalities of a computer program and the programming language cannot be protected by copyright according to the European Court of Justice’s senior advisor.

How to Achieve More ‘Agile’ Application Security | Network World

Application security has become a critical component of all software development efforts. It includes all measures taken throughout the software development lifecycle to prevent programming flaws from being exploited. The flaws that creep in during the requirements, design, development, deployment, upgrades, or maintenance stages of applications become the basis of cyber attacks.

Japan plans 3D broadcasts as Sony preps 3D truck | Network World

Television broadcasting in 3D took a couple of steps further towards reality on Wednesday when Japan joined the list of countries planning to launch the new format and Sony said it will soon deliver a truck equipped to broadcast 3D programming on the go.

Security Experts ID Top 25 Programming Errors | Network World

A group of security experts and luminaries have created a list of the 25 most significant programming errors that can lead to serious software vulnerabilities.

iPhone gets Microsoft OneNote app | Network World

Microsoft’s release of OneNote for iPhone is one of the first examples of Microsoft making a portion of Office available on non-Windows phones.

Xamarin expands Android, iPhone cross-platform development kit | Network World

On Thursday, Xamarin added an API (application programming interface) for contacts to its new cross-platform Mobile development kit, with which the company aims to make it easier for C# users to develop applications for Android and iOS at the same time.

Multicore chips pose next big challenge for industry | Network World

Adding more processing cores has emerged as the primary way of boosting performance of server and PC chips, but the benefits will be greatly diminished if the industry can't overcome certain hardware and programming challenges, participants at the Multicore Expo in Santa Clara, California, said this week.

Microsoft rallies businesses to start Win 7 migrations now | Network World

In a last promotional run-up to the Windows 7 release next month, Microsoft is urging business customers to start their upgrades now with examples of customers already using the software, and another acknowledgement that the company learned lessons from how it handled Vista's release three years ago.

E-voting vendor: Programming errors caused dropped votes | Network World

An major electronic voting system vendor has changed its story in an attempt to explain how its machines dropped hundreds of votes in Ohio's March primary elections, saying it was a programming error, not the fault of antivirus software.

Gold medals, knighthood and $1M cash prizes: Being a tech pioneer is a real honor | Network World

The story goes that when computer scientist Alan Kay began walking out of a banquet room in 2004 with the A.M. Turing Award he had just been given for his breakthrough work on object-oriented programming, he was stopped by someone who thought he was absconding with a table ornament instead of his "Nobel Prize in Computing."