- IDM Token-Unique-Name Examples
... out of the box is incremental. how to implement this algorithm Please reply (Identity Manager, Tip, Policies) ...
Article - coolguys - 31 Oct 2007 - 11:48am - 1 comment - 0 attachments - 2 groups
- Virtually there, at LinuxWorld
... is therefore unified by a general purpose (grid-based) algorithm for assigning units of work to available resources, in a manner ...
Blog Entry - rawipfel - 8 Aug 2007 - 1:31am - 5 comments - 0 attachments - 0 groups
- Folder Sync
... in name conflicts during synchronization. Its algorithm is rather simple but you can keep your files always up-to-date in ... software. It's the best and has very good synchronization algorithm. But I need to have on my laptop always up-to-date all the data from ...
Tool - Mariusz Sagalo - 5 Mar 2007 - 6:29pm - 0 comments - 1 attachment - 0 groups
- AppNote Tool: Minimize stack requirements
... The example source code illustrates an algorithm for searching the NetWare file system that minimizes stack requirements. This algorithm has the properties that there is no function level recursion, hence ...
Tool - K.S Venkatram - 3 Mar 2007 - 6:52pm - 0 comments - 1 attachment - 0 groups
- WinNV 1
... version 0.99. The changes from 0.99 to 1.0: better algorithm to detect non-English (US) DLLs. Allegato ...
Tool - Nico Looije - 2 Mar 2007 - 2:02pm - 0 comments - 1 attachment - 0 groups
- WinVer Search Utility
... version 5.x and 6.0. 9-20-02: Tweaks to the algorithm on the basis of some customer incidents. 8-29-02: Tweaked to ...
Tool - K.S Venkatram - 13 Feb 2007 - 6:08pm - 0 comments - 1 attachment - 0 groups
- Euler for GTK+
... minimizers (Brent, Nelder-Mean) * Simplex algorithm * interpolation and approximation * finding roots of ... In a last example, we assume you have a numerical algorithm to test. You could provide a prototype of this algorithm in the EULER ...
Tool - Rene Grothmann - 30 Jan 2007 - 2:59pm - 0 comments - 0 attachments - 0 groups
- TDPRCON 1.4
... Encrypting For encrypting, we use the algorithm of rc4, which is used, for example, as one of encrypting ... is 4000 bytes). Transmission is managed using intelligent algorithm of recognizing a change, which results in an ideal use of a ...
Tool - TDP Ltd - 24 Jan 2007 - 5:58pm - 1 comment - 1 attachment - 0 groups
... as on text files, because it uses a binary diffing algorithm to transmit and store successive revisions. Parseable output ...
Tool - Tigris - 24 Jan 2007 - 5:46pm - 0 comments - 0 attachments - 0 groups
- CPAU utility
... well for everyone I have set up a proprietary encoding algorithm that seriously obfuscates the information in the encoded file. ...
Tool - Joeware - 23 Jan 2007 - 4:01pm - 0 comments - 0 attachments - 0 groups