Human Computation -  Outsourcing complex problems to Human Computer technology has become more and more powerful over the last few decades. Yet still there’s a clear margin - actually a gap - between Computers’ (artificial) decision making ability compared with human intellect. Filling out this gap is one of the most important problems, since with this digitalizing world it is necessary to make the devices or the ...

SQL Query Result into Comma Separated List During my work I had encountered a situation where I need to get a comma separated list as an output from the values in a SQL query result. To elaborate it more, my query returns set of records (multiple records which match a certain criteria) as its result. Then there’s a column which I need to take as a ...

Microsoft Visual Studio LightSwitch 2011 is a flexible business application development tool that can be used with Visual Studio 2010 IDE. It gives you a simplified development environment which give the capability to create CRUD based business applications within few minutes. Typical business application manage data through user interfaces, provide search facilities and provide data validations. Usually, if you want ...

While working with your computer, no doubt that you wish you could schedule running some application or make the computer do a specific job without you have to stay at computer for hours. For me, I want to shut down the computer automatically at a scheduled time, so that I can sleep without waiting till the computer finish the job. ...

End of a journey, But still couldn’t believe it! Though it was already expected, I never realized that end of my undergraduate life would make me this much sad. Even though we (my batch mates, UCSC 6th batch, 2008/2009) are not graduated yet, yesterday was the final remarkable day at university for most of us except our friends who’ll be ...

Recently I was working with some database restoring and configuring stuff. And I was getting errors due to the conflicts on database users, server logins and their permissions. In the ideal scenario, there should be a 'login' in the database server, and a corresponding 'user' for the database. Sometimes people get confused with the difference of these two. But they ...

If you have experience with SQL Server, you may have heard the terms MDF, NDF and LDF already. Those are the commonly used file name extensions in SQL Server for specify the Primary Data files, Secondary data files and Log files respectively. In SQL Server, data and log information are never stored in the same file. Furthermore, those individual ...

It has been a long time since my last post. I was busy with exams, projects and ofcourse with my first job! Few months back, we were supposed to do a project (topic selection was in our interest) which was essential for academic curriculum. So me and my friends were into virtual tour using available web resources and finally to ...

Are you worried about where you keep your money? – Answer is obviously “Yes”. In the modern information society, data is equally or more important when compared with money. Not to mention that data is referred here to the information gathered at the computers. But how many of you know about where your data is stored. We know about data ...

It’s the cricket world cup season! So, all the fans are getting anxious, and the game is getting hot. Cricket is a game where win or loss defined by a thing margin. Recently, a lot of money involved in the game and lot of spectators waiting to see a favorable result for their team. Therefore not to mention the responsibility ...

Since ‘Elk Cloner’, the first computer virus was written in 1981; Computers are always been subject to various threats. Not necessarily the viruses, but malware, trojans, worms, rootkits, spyware and hacking attacks always threatening the computer users. That’s where antivirus programs come to the help. Antivirus software is used to prevent, detect, and remove computer viruses, worms, and trojan horses. ...

“DDoS attacks” (Distributed Denial of Service attacks) may not be an alien term for you by now. Of course it became one of the popular search keywords in the previous weeks; because a group of hackers called “Anonymous” launched an attack targeting some major banking web sites. ‘Anonymous’ claiming their “Operation Payback”, commenced several DDoS attacks supporting WikiLeaks. On 8th ...

Add Code to Your Blog Well, have you ever put code samples in your blog? If you have did that, but without using any code syntax highlighter, it will certainly look like a mess. Don’t agree? See this. This is a code fraction for java. It doesn’t have any of those text-formatting, just typed using only the normal Blogger fonts. /** * This application simply ...

Do you know what happens when you publish a post in your blog? How search engines got to know of your blog post? And what happens before finally it appears to your readers? We only just type our idea in to words and publish it but plenty of things happen out there. Do you like to know about it? That’s ...

Ready to get ‘SYNC’-ed Are you a university student who is interested in IT or already following your degree in IT/Computer Science? Are you passionate about the technology, latest trends in the industry? I have a news for you. Microsoft, the pioneer in the software industry has its students program “Microsoft Student Champs” a one-of-a-kind program that recognizes ...

Champs Workshop at UCSC Microsoft Student Champs with the purpose of empowering students with latest technical knowledge and assuming their community responsibilities for helping fellow students, reached University of Colombo School of computing for a single day workshop. Workshop was held at UCSC on 29th of September 2010 with the participation of more than 200 students. The event ...

It is less visible that Sri Lanka has a history of more than 25 years in computing. University of Colombo and UCSC (University of Colombo School of Computing) holds the pride of being the pioneer in Computer Science/ICT education in the country - a legacy bestowed upon us by the father of Sri Lankan Information Technology and the founder of ...

Ribbon interface is the command bar that organizes a program's features into a series of tabs at the top of a window. In this post we will see how to create a Office add-in project in Visual Studio and create your own custom tab in the ribbon of Microsoft Word. Actually, by following the same routine you can create your ...

For a software developer, keeping a track of the projects and its versions is critical. So, people use to get the support of a version controlling system. Visual Studio 2008 doesn’t have an built-in version controlling system or mechanism. But still it provides you the Source Control Integration facility; which enables two options: source control solution based on the Source ...

Previous Page