More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.
Dialogs (2) modeless dialog and a worker thread. Handling data shared between threads. Recursive functions.
Continuing from the tenth article about sudoku.
Last article we worked with a modal dialog to help maintain informat…
If you use Adobe Reader X it is possible you can't open OLE PDF documents in the standard.
The reason is the 'save box mode' in adobe reader X.
Many people think the protected Mode of adobe reader x is only to stop the write access.
But this fe…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’
As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…