Web Services and SOAP
Web Services and SOAP
When given any XML parser, such as a Microsoft’s XML DOM component, anyone can pass a function name embedded into an XML message. Therefore, you do not need...
Jun 16, 2009
SPEC INDIA
Exception handling in .Net
Exception handling in .Net
Like its C++ and Java predecessors, .NET uses a base System.Exception class as the parent of all thrown exceptions. Many applications can simply use this base class for...
Jun 16, 2009
SPEC INDIA
Standard Features of Windows Mobile
Standard Features of Windows Mobile
They all include a stereo headphone jack and Windows Media Player, which can play MP3 files and Windows Media format movies (ASF and WMV). There are several free...
Jun 16, 2009
SPEC INDIA
Goals of an J2EE (Enterprise Architecture)
Goals of an J2EE (Enterprise Architecture)
A well-designed Enterprise Architecture should meet the following goals. Be robust : Enterprise software is important to an organization. Its users expect it to be reliable and bug-free....
Jun 16, 2009
SPEC INDIA
IIS Configuration Parameters
IIS Configuration Parameters
While most IIS configuration settings are stored in the metabase, there are some important settings related to performance stored in the Windows registry.  We’ll look briefly at some...
Jun 16, 2009
SPEC INDIA
SOAP : Some Important Features.
SOAP : Some Important Features.
This used to stand for “Simple Object Access Protocol” but with the latest revision of the standard, Version 1.2, SOAP is no longer an acronym. The SOAP standard...
Jun 16, 2009
SPEC INDIA
Kerberos
Kerberos
One of the most important and complicated authentication schemes is a network authentication protocol developed in the 1980s at the Massachusetts Institute of Technology (MIT), called Kerberos. Kerberos...
Jun 16, 2009
SPEC INDIA
MySQL Lock Granularity and Lock Types
MySQL Lock Granularity and Lock Types
Lock Granularity Each MySQL storage engine offers different levels of granularity for their locks. In decreasing granularity (that is, from largest lockable object to smallest), they are as...
Jun 16, 2009
SPEC INDIA
Constraints offered by MySQL Database
Constraints offered by MySQL Database
UNIQUE— Guarantees that there will be no duplicate values in a column PRIMARY KEY— Identifies the primary unique identifier of a row FOREIGN KEY— Codifies and enforces the...
Jun 16, 2009
SPEC INDIA
The Different Filesystems
The Different Filesystems
Here are some of the most common files systems used in practice. DOS FAT-12, FAT-16, FAT-32 DOS filesystems known as FAT-12, FAT-16, and FAT-32 (although no version of...
Jun 16, 2009
SPEC INDIA

Guest Contribution

We are looking for industry experts to contribute to our blog section through fresh and innovative content.

Write For Us

Our Portfolio

Proven Solutions Across Industries
Technology for Real-Life

Visit Our Portfolio