Re: Android Native - How To Request Notification Permissions Programming Mobile Development by Inamullah_1 Great tutorial—thanks for sharing! Just a few quick additions: Starting with Android 13 (API 33), apps must request permission for POST_NOTIFICATIONS at runtime, while older versions allow notifications by default. It’s best to check the Android version before requesting this permission to avoid unnecessary prompts. Also, remember to handle the … Is Microsoft Solutions Partner Badge Really Worth It? Programming Software Development by Mason_8 I've been reading about the Microsoft Solutions Partner program and wanted to ask the community is it actually worth pursuing for an IT company It looks like Microsoft has set certain performance and certification requirements that companies need to meet in order to qualify. They have categories like Infrastructure, Data & AI, Business … Re: How to show visa info based on country selection in a travel form? Programming Web Development by Dani I have moved your post into the web development forum instead of the advertising/marketing forum where it was and tagged it appropriately. Can you please provide the Javascript code as well as PHP code that is buggy so that we can help diagnose this for you. For example, if the JSON response is empty, it is most likely because of a bug in the … Re: Securing Customer Data: An Essential Cybersecurity Handbook Hardware and Software Information Security by WilliamOG Basically: patch your stuff, lock your doors, and stop clicking shady emails. Got it. Re: Is Microsoft Solutions Partner Badge Really Worth It? Programming Software Development by rproffitt Wrong person to ask. But it was 2 decades ago and Microsoft's support was nothing better than "did you turn it off and on again?" This on a ERP deployment and frankly a failure in my view because it increased the amount of time we spent on the project. Not to mention downtime as we waited for fixes and server responses times in the … Re: Is Microsoft Solutions Partner Badge Really Worth It? Programming Software Development by Reverend Jim I have to say that I have had both terrible and outstanding results from MS support techs. It all depends on who you get. I’m trying to set up remote access using DDNS (No-IP) on my home net Hardware and Software Networking by gowtham_6 DDNS is configured correctly and the hostname works locally, but I can’t access it from outside my network. Remote management is enabled and set to port 80. Any idea what I might be missing? Re: I’m trying to set up remote access using DDNS (No-IP) on my home net Hardware and Software Networking by trcooke You're a little thin on details about "my network" but for the purposes of this discussion I'm going to assume you are talking about a typical home network comprising of a Router and a bunch of devices connected to it. Let's think about the network route required to get from one computer on your network to another, and this is what I … Re: I’m trying to set up remote access using DDNS (No-IP) on my home net Hardware and Software Networking by rproffitt Many if not most ISPs block port 80. More at https://www.google.com/search?&q=port+80+inbound+blocked+by+ISP This has been my finding for over a decade. Re: I’m trying to set up remote access using DDNS (No-IP) on my home net Hardware and Software Networking by Dani My experience is that AT&T fiber for residential use does allow servers and does not block ports. I used to have Verizon FiOS which, also, did not block ports, but that was a business account and so under different rules. Spectrum and Optimum Online business accounts also didn’t block, but I paid an extra $10/month for a static IP back then as … Re: I’m trying to set up remote access using DDNS (No-IP) on my home net Hardware and Software Networking by trcooke Did any of our suggestions help you? Re: Securing Customer Data: An Essential Cybersecurity Handbook Hardware and Software Information Security by graceweb Hey Bam_391, Thanks for putting this together, really thorough breakdown. I think your point about regular employee training is especially important. Even with the best technical safeguards, a single phishing click can cause major issues. Curious if you have any thoughts on balancing strict access controls with usability, especially in smaller … Evaluating OpenAI GPT 4.1 for Text Summarization and Classification Tasks Programming Computer Science by usmanmalik57 On April 14, 2025, OpenAI released [GPT-4.1](https://openai.com/index/gpt-4-1/) — a model touted as the new state-of-the-art, outperforming GPT-4o on all major benchmarks. As always, I like to evaluate new LLMs on simple tasks like text classification and summarization to see how they compare with current leading models. In this article, I will… Integrating OpenAI Web Search API in LangGraph Programming Computer Science by usmanmalik57 Large language models are trained on a fixed corpus, and their knowledge is often limited by the documents they are trained on. Techniques like retrieval augmented generation, continuous pre-training, and fine-tuning enhance an LLM's default knowledge. However, these techniques can still not enable an LLM to answer queries that require web … Re: Theory on the VPN Programming Mobile Development by Liam91 Sounds like you're diving deep into how tunneling apps work! These apps often use VPN-like methods to route traffic through servers, sometimes exploiting free access points. Configs like .hat may include encryption keys or payload setups. Keep exploring... lots to learn! Re: How to enable gpedit on Windows 10 & 11 Hardware and Software Microsoft Windows by AIO_803 Enabling **gpedit.msc** on Windows 10 or 11 (especially Home editions) is useful for gaining more control over system settings. While it’s not officially included in Home versions, there are workarounds—though users should proceed carefully to avoid system issues. Re: How secure is Github? Programming Software Development by kearawill GitHub is generally very secure for hosting code, especially with features like 2FA, security alerts, and private repositories. However, like any platform, it's only as secure as how you use it. I’d never recommend storing sensitive information like passwords, private keys, or database credentials—even with .gitignore. Instead, use environment … Re: Cannot run exe from asp.net Programming Web Development by lennyli > Are you sure IIS is configured to allow running external scripts? The document folder and asp file has security permission set to ALL rights for 'everyone'. In IIS, under handler mappings for .asp files, under request restriction/access, script was chosen (not execute) for feature permissions, all 'read' 'script' 'execute' are chosen Re: Cannot run exe from asp.net Programming Web Development by john_111 Let me expand on what rproffitt said, by explaining why. If a webpage could run a program installed on another computer, the entire world wide web would be hacked into tiny pieces and cease to exist. No one would ever use the web, it would be so totally insecure. So web pages are prohibited from running programs on your computer. They can … Re: Delete unused MySQL indexes Programming Databases by toneewa Your data wouldn't be accurate and incomplete, if either one of the performance schemas were off. event_waits_current was off, so MySQL didn't store the data (e.g., collect wait event data in detail), which can create incomplete or missing information about index usage like table I/O waits, index access details, event metadata, or timing and … Re: sharepoint policy management software Programming Web Development by Dani We used to use Sharepoint way back in the day when DaniWeb had one of those Microsoft subscriptions that gave you access to all license keys. I forget what it used to be called but they don't have it anymore and haven't for many years, as far as I know. Edit: ChatGPT reminded me that it was called a TechNet Subscription. Re: Malwarebytes difficulties Hardware and Software Microsoft Windows by Reverend Jim >Abnormal in what way? I would imagine high CPU, disk access, or memory usage. Although high disk usage is expected when actively scanning. If you want to use Malwarebytes, make sure you download it only from the official site. There are hacked versions on other sites that contain nasty things. Re: How to connect to the Pinterest API using PHP? Programming Web Development by geekinformatic Hey! If you're using the CakePHP framework, you can connect to the Pinterest API with cURL and OAuth integration. Just follow Pinterest’s API docs for endpoints and token handling. Re: Android Native - How To Request Notification Permissions Programming Mobile Development by Erussuhsh Hi I'm new android app development can you teach me Re: How much anonymity does a VPN really provide? Hardware and Software Information Security by TurisVPN A VPN helps hide your IP and encrypt your internet, so others (like your ISP) can’t see what you do online. But it doesn’t make you totally anonymous. The VPN company can still see your traffic (if they keep logs). Websites can track you with cookies, and if you log in with your real info, they know who you are. So, a VPN is good for privacy … Re: How much anonymity does a VPN really provide? Hardware and Software Information Security by Liam91 A VPN is a tool that keeps your internet connection safe and private. It stops others from seeing what you do online. But a VPN doesn’t make you completely anonymous. To pick a good VPN, check: -How you pay (Bitcoin is more private than a credit card) -If they keep records of your activity (best if they don’t) -If they share IP addresses … Access 2010 Compact & Repair drops indexes Hardware and Software Microsoft Windows by gkendall Access 2010 Compact & Repair drops indexes in descending order. The database is ~700MB and the table affected has 190 columns, 228,000 records and 13 indexes and runs on Windows 7 with 4GB of memory. The same file compacts without incident using Office 2007 on a Window XP machine with 2GB of memory. Strangely it runs OK on a VM running Office… access events of form in UserControl Programming Software Development by vtelebyteM access events of form in UserControl i have 1)User control with one MSFlexGrid on it 2)Form to place user control 3)Some form's own control i dont know how many controls are there under form i have to place them in grid columns (eg. combobox in grid to provide its service) now problem is if i place any control in grid after i LostFocus from … Access another computer Hardware and Software Networking by pandu subhani Access another computer by ip access Programming Software Development by baboon4000 hello people, i need some help on visual basic, i am currently using the lastest edition of visual basic and access xp, my tutor said if i want to access both of them i neeed to download a serpark from microsoft, 'SP5', do you happend to know the link to the website, i have tried to download several but none of them work with access xp, but it does…