Login or e-mail Password   

Technology

Sorting: najnowsze / top: daily | weekly | monthly

18
vote
To properly license open source source code, the license agreement must be included prominently with the source code. 04/18/2009
comments: 5 | views: 70093 | Łukasz Żyrański in: Technology
10
vote
Based on 2 years' experience with PRADO v.3.x at Note: Tips are marked with stars ( * ), where 5 stars are the most important tweaks. I. Basic settings http://www.pradosoft.com/... 04/17/2009
comments: 2 | views: 47734 | Mariusz Żurawek in: Technology
8
vote
As a webmaster, you want to keep your visitors content so they ll come back again. Here you will find ten common mistakes made by webmasters that may deter people from returning. 02/13/2009
comments: 4 | views: 12616 | ghuh in: Technology
7
vote
You’ve spent hours setting up your blog on your favorite blog platform just right. Good for you! So how do you maintain your blog so that it remains at the top of its game? 02/03/2009
comments: 2 | views: 13049 | Łukasz Żyrański in: Technology
8
vote
Websites are built for specific types of viewers and must appeal to a definite target market. Users must be able to view your site, scan everything, and immediately understand w... 01/31/2009
comments: 2 | views: 2932 | ghuh in: Technology
9
vote
Most people have used printers at some stage for printing documents but few are aware of how it works. 01/19/2009
comments: 3 | views: 12935 | legolas in: Technology
10
vote
The System Thinking Laws from Peter Senge’s book “The Fifth Discipline” applied to Software Development. 01/15/2009
comments: 2 | views: 8570 | kirshof in: Technology
12
vote
We know that effective communication with humans requires skills, experience and effort. It is not easy and straightforward. 01/12/2009
comments: 3 | views: 7935 | kirshof in: Technology
10
vote
This article is covering password hashing, a subject which is often poorly understood by newer developers. 12/30/2008
comments: 3 | views: 7212 | Filip Słyk in: Technology
6
vote
A short, practical guide to user management in Ubuntu and GNU/Linux. 12/20/2008
comments: 1 | views: 5186 | Rafal Kinde in: Technology
6
vote
Part of the planning activity for Web content is to identify what visitors want to find or do on your site. Analyzing visitors' needs and expectations will help you choose the b... 12/16/2008
comments: 1 | views: 4167 | ezine in: Technology
7
vote
Data recovery is the retrieval of inaccessible or contaminated data from media that has been damaged in some way. Data recovery is being increasingly used and is an important pr... 12/11/2008
comments: 0 | views: 2375 | legolas in: Technology
10
vote
You've got a five-hour flight from Los Angeles to New York City, and one battery in your laptop. You've got work to do, DVDs to watch, and games to play. How are you going to ge... 12/09/2008
comments: 3 | views: 11346 | legolas in: Technology
6
vote
An Interim Report about the Future of the Internet. Who are the participants who constitute the Internet? 12/08/2008
comments: 0 | views: 2812 | legolas in: Technology
7
vote
These tips when combined are a highly effective way to deal with wrist pains and many other repetitive stress related injuries. 12/06/2008
comments: 0 | views: 11287 | legolas in: Technology

1 2 3 4 5 6 7 8 9
Next »


Search in category
  Search
Related groups


About EIOBA
Articles
Explore
Publish
Community
Statistics
Users online: 250
Registered: 59.688
Comments: 444
Articles: 66.446
© 2005-2014 EIOBA group.