Find Your Code From Koders Engine:

Friday, January 28, 2011

Facebook has become the third most visited site in the world

The latest visitor figures for the Web published by comScore, in November, Facebook has become the third most visited site in the world. With nearly 648 million unique visitors, the social network remains behind Google (970 million) and Microsoft (869 million). But it goes beyond Yahoo and its 630 million unique visitors, while in October the two sites were still on a par to 633 million.

In one year Facebook has won more than 200 million unique visitors per month

In early December, the CEO of Yahoo, Carol Bartz, had sensed the danger, pointing Facebook as its biggest rival to Google. Facebook, now No. 4 just last eighteen months, a year ago totaled just over 400 million visitors, when Yahoo attracted more than 600. United States, however, Yahoo still leads with 181 million unique visitors, ahead of Google (178.7), Microsoft (175.7) and Facebook (151.7). But Facebook will now capturing a quarter of market banners, twice as Yahoo. And he would pass for viewing Yahoo videos by becoming the second U.S. site behind Google.
    source src=latribune.fr

Open Source JDK 7 for Mac now available

A few months ago it was announced by Apple that Java for Mac would be deprecated. After a lot of complains and discussions by mostly Mac users, Apple decided to work together with Oracle's OpenJDK project to make Java Open Source for Mac.


Google Code also has a prebuild package for OpenJDK in MacOSX, click here.

Source:http://www.jtraining.com

RMI (Remote Method Invocation)


RMI (Remote Method Invocation) is a Java API for manipulating remote objects (that is to say an object instantiated on another virtual machine, possibly on another machine on the network) is transparent to the user, c that is to say the same manner as if the object in the virtual machine (JVM) from the local machine.

Thus a server allows a client to invoke methods on remote objects that it instantiates. Two virtual machines are required (one on the server and the client) and all communication is done in Java.

They say that RMI is typically a solution, "while Java, unlike the standard CORBA of the OMG (Object Management Group) for manipulating objects remotely with any language. CORBA is much more complicated to implement, is the reason why many developers often turn to RMI.


Download PDF ;
 Java - BankExercise.zip 

Java SE Downloads

                                                           Java SE Development Kit 6u23 

More Java Downloads:

Oracle Architecture in less than 10 minutes

Introduction to Oracle Database Administration - Oracle DBA

Thursday, January 27, 2011

Secret US Embassy Cables

Wikileaks began on Sunday November 28th publishing 251,287 leaked United States embassy cables, the largest set of confidential documents ever to be released into the public domain. The documents will give people around the world an unprecedented insight into US Government foreign activities.
The cables, which date from 1966 up until the end of February this year, contain confidential communications between 274 embassies in countries throughout the world and the State Department in Washington DC. 15,652 of the cables are classified Secret.
The embassy cables will be released in stages over the next few months. The subject matter of these cables is of such importance, and the geographical spread so broad, that to do otherwise would not do this material justice.
The cables show the extent of US spying on its allies and the UN; turning a blind eye to corruption and human rights abuse in "client states"; backroom deals with supposedly neutral countries; lobbying for US corporations; and the measures US diplomats take to advance those who have access to them.
This document release reveals the contradictions between the US’s public persona and what it says behind closed doors – and shows that if citizens in a democracy want their governments to reflect their wishes, they should ask to see what’s going on behind the scenes.
Every American schoolchild is taught that George Washington – the country’s first President – could not tell a lie. If the administrations of his successors lived up to the same principle, today’s document flood would be a mere embarrassment. Instead, the US Government has been warning governments -- even the most corrupt -- around the world about the coming leaks and is bracing itself for the exposures.
The full set consists of 251,287 documents, comprising 261,276,536 words (seven times the size of "The Iraq War Logs", the world's previously largest classified information release).
The cables cover from 28th December 1966 to 28th February 2010 and originate from 274 embassies, consulates and diplomatic missions.

How to explore the data

Search for events that you remember that happened for example in your country. You can browse by date or search for an origin near you.
Pick out interesting events and tell others about them. Use twitter, reddit, mail whatever suits your audience best.
For twitter or other social networking services please use the #cablegate or unique reference ID (e.g.#66BUENOSAIRES2481) as hash tags.

Key figures:

  • 15, 652 secret
  • 101,748 confidential
  • 133,887 unclassified
  • Iraq most discussed country – 15,365 (Cables coming from Iraq – 6,677)
  • Ankara, Turkey had most cables coming from it – 7,918
  • From Secretary of State office - 8,017

According to the US State Departments labeling system, the most frequent subjects discussed are:
  • External political relations – 145,451
  • Internal government affairs – 122,896
  • Human rights – 55,211
  • Economic Conditions – 49,044
  • Terrorists and terrorism – 28,801
  • UN security council – 6,532

Graphics of the cablegate dataset


Pentagon Whistleblower Daniel Ellsberg on Wikileaks Iraq War Docs (Part ...

MSI CR650 scores an AMD Zacate E-350 APU



MSI launches new family member CR notebook. Known as the CR650 MSI, laptopbased on AMD's upcoming "Brazos" mobile platform. The CR650 is equipped with anAMD Fusion E-350 dual-core processor with an AMD Mobility Radeon HD 6300 series graphics, a 15.6-inch widescreen display, webcam and HDMI high definition. Inaddition, the laptop also supports AMD Vision and eco-technology to increase battery.Stay tuned for more updates. TechPowerUp

A proven and free virus protection? that's what I need



Description:
Microsoft Security Essentials protects your computer in real time against viruses,spyware and other malware.

Microsoft Security Essentials is available for free download from Microsoft *. Easy toinstall and use, it is updated automatically to ensure effective protection for your PCcontinuously. To see if your PC is secure, it's easy when the light is green, all is well. It'sthat simple!

Microsoft Security Essentials runs efficiently and quietly in the back

ground to let you freeto use your Windows PC as you would: no interruptions or long waiting times.

Building Web Applications with ASP.NET 3.5 and Microsoft Visual Web Developer 2008






Description:
 video series will help you develop a functional understanding of using Microsoft’s free IDE for web application developer (Visual Web Developer) to build ASP.NET 2.0 & 3.5 web applications. Microsoft’s Joe Stagner demonstrates not only how to use the “VWD” IDE but explains what’s happening behind the scenes and offers guidance on best practices.


Watch Vedios

Better and faster search engine for codes

Description:



Koders.com, a Black Duck Software Company, is a free on-line search engine for open source software and other web-downloadable code.
Over 30,000 developers each day rely on Koders to search over 1 billion lines of code written in over 30 languages and identified with 28 software licenses.
Koders is helping to fuel the open source software revolution. Developers can use this free resource to quickly find the best reusable open source code, methods, examples, algorithms and more, enabling them to be more successful with open source and complete projects faster.            

Wednesday, January 26, 2011

Eycen Learn Station: Facebook Connect

Eycen Learn Station: Facebook Connect: "Description: In this video tutorial you will learn to use the Facebook API to allow your users to quickly connect to your site. Facebook c..."

Introduction to network programming under Windows

Description
This tutorial will show you how to create applications communicating across a network using the C language In this tutorial, we chose Windows as the target platform but know that for applications, the network appears like a black box, which means that an application does not need to know the system is running under the application remote and regardless of the language in which it was written to communicate with. All that matters is that they must "hear" them, that is to say, be much agreement on how to exchange data. The rules stipulate that this way of exchanging information between two nodes of a network is called a protocol. But there are several levels of protocols. The applications use a protocol called "high level" because this protocol can be defined by anyone (this is the programmer who sets the rules), but the data exchanged between applications are not transoprtées on the network such that 'they are. They are preceded by a header that contains essential information such as address of the sender, the recipient, etc.. otherwise it would be impossible to identify. This is done by lower level protocols which will be discussed later.

Download  PDF