programming4us
           
 
 
Programming
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 >  |  Displaying page 8 of 14, items 211 to 240 of 398.
CSS for Mobile Browsers : Where to Insert the CSS (part 1) - Media Filtering
Is one CSS stylesheet adequate for all devices? Maybe. The first factor to consider is whether we are working on a desktop XHTML site or a mobile-specific one.
Developing an SEO-Friendly Website : Keyword Targeting (part 4)
Large-scale publishing systems, or those that produce automatically generated content, present some unique challenges. If hundreds of pages are being created every day, it is not feasible to do independent keyword research on each and every page, making page optimization an interesting challenge.
Developing an SEO-Friendly Website : Keyword Targeting (part 3)
Great meta descriptions, just like great ads, can be tough to write, but for keyword-targeted pages, particularly in competitive search results, they are a critical part of driving traffic from the engines through to your pages
Developing an SEO-Friendly Website : Keyword Targeting (part 2)
Great meta descriptions, just like great ads, can be tough to write, but for keyword-targeted pages, particularly in competitive search results, they are a critical part of driving traffic from the engines through to your pages
Developing an SEO-Friendly Website : Keyword Targeting (part 1) - Title Tags
The search engines face a tough task; based on a few words in a query, sometimes only one, they must return a list of relevant results, order them by measures of importance, and hope that the searcher finds what he is seeking
The Art of SEO : Optimization of Domain Names/URLs
Two of the most basic parts of any website are the domain name and the URLs for the pages of the website. This section will explore guidelines for optimizing these important elements.
Cloud Security and Privacy : Regulatory/External Compliance (part 2)
Companies that process credit card transactions are required to comply with the Payment Card Industry (PCI) Data Security Standard (DSS) as evidenced through third-party assessments and/or self-assessments depending on the volume of card processing activity.
Cloud Security and Privacy : Regulatory/External Compliance (part 1)
CSPs face an increasingly complex array of external compliance requirements from their customers, whether those include industry standards, regulatory regimes, or customer-specific frameworks.
Developing an SEO-Friendly Website : Root Domains, Subdomains, and Microsites (part 2)
There is a lot of debate about microsites, and although we generally recommend that you do not saddle yourself with the hassle of dealing with multiple sites and their SEO risks and disadvantages, it is important to understand the arguments, if only a few, in favor of doing so.
Developing an SEO-Friendly Website : Root Domains, Subdomains, and Microsites (part 1)
Among the common questions in structuring a website (or restructuring one) are whether to host content on a new domain, when to use subfolders, and when to employ microsites.
Parallel Programming with Microsoft .Net : Parallel Aggregation - An Example
Aggregation doesn’t only apply to numeric values. It’s a more general pattern that arises in many application contexts. The following example shows how a variation of parallel aggregation known as map/reduce is used to aggregate nonscalar data types.
Parallel Programming with Microsoft .Net : Parallel Aggregation - The Basics
This is a typical sequential for loop. In this example and the ones that follow, Normalize is a user-provided method that transforms the input values in some way, such as converting them to an appropriate scale.
Developing an SEO-Friendly Website : Creating an Optimal Information Architecture (part 4)
Site navigation is something that web designers have been putting considerable thought and effort into since websites came into existence. Even before search engines were significant, navigation played an important role in helping users find what they wanted
Developing an SEO-Friendly Website : Creating an Optimal Information Architecture (part 3)
One very strict rule for search friendliness is the creation of flat site architecture. Flat sites require a minimal number of clicks to access any given page, whereas deep sites create long paths of links required to access detailed content.
Developing an SEO-Friendly Website : Creating an Optimal Information Architecture (part 2)
In conducting website planning, remember that nearly every user will initially be confused about where to go, what to do, and how to find what he wants.
Developing an SEO-Friendly Website : Creating an Optimal Information Architecture (part 1)
Making your site friendly to search engine crawlers also requires that you put some thought into your site information architecture. A well-designed architecture can bring many benefits for both users and search engines.
Cloud Security and Privacy : Governance, Risk, and Compliance (GRC)
CSPs are typically challenged to meet the requirements of a diverse client base. To build a sustainable model, it is essential that the CSP establish a strong foundation of controls that can be applied to all of its clients.
Cloud Security and Privacy : Internal Policy Compliance
CSPs, like other enterprises, need to establish processes, policies, and procedures for managing their IT systems that are appropriate for the nature of the service offering, can be operationalized in the culture of the organization, and satisfy relevant external requirements.
jQuery 1.3 : Improving a basic form (part 8) - Checkbox manipulation
To round out our enhancements to the contact form, we'll help the user manage this list. A group of 10 checkboxes can be daunting, especially if the user wishes to click most or all of them.
jQuery 1.3 : Improving a basic form (part 7)
There is one further type of validation to implement in our contact form—correct input formats. Sometimes it can be helpful to provide a warning if text is entered into a field incorrectly (rather than simply having it blank).
jQuery 1.3 : Improving a basic form (part 6)
Before we add validation to any form with jQuery, we need to remember one important rule: client-side validation is not a substitute for server-side validation. Again, we cannot rely on users to have JavaScript enabled
jQuery 1.3 : Improving a basic form (part 5) - Conditionally displayed fields
Let's further improve the group of fields that ask visitors how they would like to be contacted. Since the text inputs need to be entered only if their corresponding checkboxes are checked, we can hide them, along with their corresponding flags, when the document is initially loaded
jQuery 1.3 : Improving a basic form (part 4)
In our contact form, required fields have class="required" to allow for styling as well as response to user input; the input fields for each type of contact have class="conditional" applied to them.
jQuery 1.3 : Improving a basic form (part 3) - Required field messages
In our contact form, required fields have class="required" to allow for styling as well as response to user input; the input fields for each type of contact have class="conditional" applied to them.
jQuery 1.3 : Improving a basic form (part 1) - The legend
The form's legend is a notoriously difficult element to style with CSS. Browser inconsistencies and positioning limitations make working with it an exercise in frustration
jQuery 1.3 : Improving a basic form (part 1) - Progressively enhanced form styling
As we apply jQuery to websites, we must always ask ourselves how pages will look and function when JavaScript is unavailable to our visitors (unless, of course, we know exactly who every visitor will be and how their browsers will be configured).
Changes to Privacy Risk Management and Compliance in Relation to Cloud Computing
The following topics describe analysis of the potential impact of cloud computing on the key OECD and other common privacy principles.
Cloud Security and Privacy : What Are the Key Privacy Concerns in the Cloud?
Privacy advocates have raised many concerns about cloud computing. These concerns typically mix security and privacy. Here are some additional considerations to be aware of:
Cloud Security and Privacy : What Is the Data Life Cycle?
Personal information should be managed as part of the data used by the organization. It should be managed from the time the information is conceived through to its final disposition.
Making Your Site Accessible to Search Engines
The first step is to ensure that your site can be found and crawled by search engines. This is not as simple as it sounds, as there are many popular web design and implementation constructs that the crawlers may not understand.
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us