If you have experience with SQL Server, you may have heard the terms MDF, NDF and LDF already. Those are the commonly used file name extensions in SQL Server for specify the Primary Data files, Secondary data files and Log files respectively. In SQL Server, data and log information are never stored in the same file. Furthermore, those individual ...
It has been a long time since my last post. I was busy with exams, projects and ofcourse with my first job! Few months back, we were supposed to do a project (topic selection was in our interest) which was essential for academic curriculum. So me and my friends were into virtual tour using available web resources and finally to ...
Are you worried about where you keep your money? – Answer is obviously “Yes”. In the modern information society, data is equally or more important when compared with money. Not to mention that data is referred here to the information gathered at the computers. But how many of you know about where your data is stored. We know about data ...
Are you worried about where you keep your money? – Answer is obviously “Yes”. In the modern information society, data is equally or more important when compared with money. Not to mention that data is referred here to the information gathered at the computers. But how many of you know about where your data is stored. We know about data ...
It’s the cricket world cup season! So, all the fans are getting anxious, and the game is getting hot. Cricket is a game where win or loss defined by a thing margin. Recently, a lot of money involved in the game and lot of spectators waiting to see a favorable result for their team. Therefore not to mention the responsibility ...
Since ‘Elk Cloner’, the first computer virus was written in 1981; Computers are always been subject to various threats. Not necessarily the viruses, but malware, trojans, worms, rootkits, spyware and hacking attacks always threatening the computer users. That’s where antivirus programs come to the help. Antivirus software is used to prevent, detect, and remove computer viruses, worms, and trojan horses. ...
Since ‘Elk Cloner’, the first computer virus was written in 1981; Computers are always been subject to various threats. Not necessarily the viruses, but malware, trojans, worms, rootkits, spyware and hacking attacks always threatening the computer users. That’s where antivirus programs come to the help. Antivirus software is used to prevent, detect, and remove computer viruses, worms, and trojan horses. ...
“DDoS attacks” (Distributed Denial of Service attacks) may not be an alien term for you by now. Of course it became one of the popular search keywords in the previous weeks; because a group of hackers called “Anonymous” launched an attack targeting some major banking web sites. ‘Anonymous’ claiming their “Operation Payback”, commenced several DDoS attacks supporting WikiLeaks. On 8th ...
“DDoS attacks” (Distributed Denial of Service attacks) may not be an alien term for you by now. Of course it became one of the popular search keywords in the previous weeks; because a group of hackers called “Anonymous” launched an attack targeting some major banking web sites. ‘Anonymous’ claiming their “Operation Payback”, commenced several DDoS attacks supporting WikiLeaks. On 8th ...
Well, have you ever put code samples in your blog? If you have did that, but without using any code syntax highlighter, it will certainly look like a mess. Don’t agree? See this. This is a code fraction for java. It doesn’t have any of those text-formatting, just typed using only the normal Blogger fonts. /** * This application simply ...
Do you know what happens when you publish a post in your blog? How search engines got to know of your blog post? And what happens before finally it appears to your readers? We only just type our idea in to words and publish it but plenty of things happen out there. Do you like to know about it? That’s ...
Microsoft Student Champs with the purpose of empowering students with latest technical knowledge and assuming their community responsibilities for helping fellow students, reached University of Colombo School of computing for a single day workshop. Workshop was held at UCSC on 29th of September 2010 with the participation of more than 200 students. The event proceeded with two main goals. That ...
Are you a university student who is interested in IT or already following your degree in IT/Computer Science? Are you passionate about the technology, latest trends in the industry? I have a news for you. Microsoft, the pioneer in the software industry has its students program “Microsoft Student Champs” a one-of-a-kind program that recognizes ...
Microsoft Student Champs with the purpose of empowering students with latest technical knowledge and assuming their community responsibilities for helping fellow students, reached University of Colombo School of computing for a single day workshop. Workshop was held at UCSC on 29th of September 2010 with the participation of more than 200 students. The event ...
It is less visible that Sri Lanka has a history of more than 25 years in computing. University of Colombo and UCSC (University of Colombo School of Computing) holds the pride of being the pioneer in Computer Science/ICT education in the country - a legacy bestowed upon us by the father of Sri Lankan Information Technology and the founder of ...
It is less visible that Sri Lanka has a history of more than 25 years in computing. University of Colombo and UCSC (University of Colombo School of Computing) holds the pride of being the pioneer in Computer Science/ICT education in the country - a legacy bestowed upon us by the father of Sri Lankan Information Technology and the founder of ...
Ribbon interface is the command bar that organizes a program's features into a series of tabs at the top of a window. In this post we will see how to create a Office add-in project in Visual Studio and create your own custom tab in the ribbon of Microsoft Word. Actually, by following the same routine you can create your ...
Ribbon interface is the command bar that organizes a program's features into a series of tabs at the top of a window. In this post we will see how to create a Office add-in project in Visual Studio and create your own custom tab in the ribbon of Microsoft Word. Actually, by following the same routine you can create your ...
For a software developer, keeping a track of the projects and its versions is critical. So, people use to get the support of a version controlling system. Visual Studio 2008 doesn’t have an built-in version controlling system or mechanism. But still it provides you the Source Control Integration facility; which enables two options: source control solution based on the Source ...
For a software developer, keeping a track of the projects and its versions is critical. So, people use to get the support of a version controlling system. Visual Studio 2008 doesn’t have an built-in version controlling system or mechanism. But still it provides you the Source Control Integration facility; which enables two options: source control solution based on the Source ...