This year, roughly half of American small businesses have been attacked by cyber criminals. While you may not be able to escape the threat of cybercrime, you can save yourself from becoming a victim.
There are plenty of tech groups in the capital region, click Read More to get a full list!
In Part II, we paint a fairly typical scenario of an organization in which the decision to rally behind one programming language has been made but the question of which language remains unanswered.
What language should our company use to develop in-house applications? A question that appears to carry with it a simple answer but too often, the decision isn’t well thought out or doesn’t originate from what makes sense for the organization as a whole.
jQuery Cycle Plugin is a very popular "slider" widget that's been around for many years. So long, in fact, that many of my old apps use it. Like, they're pretty old now.
Eclipse doesn't like jQuery and each time I begin from a new install, I need to configure it to ignore validation errors on jQuery. I hate that little red x. Read more to learn how to remove the red x!
Using SSH to securely connect to remote servers is well understood by anyone needing to do it. However, when you ask people to use a public/private keys to connect, it starts to get a little murkier - mainly because the process is not well understood by some folks. This article breaks down the confusion and simplifies the process to a point where you'll wonder why you haven't been doing this all along.