Today's Question:  What are you most afraid of as a programmer?        GIVE A SHOUT



  32-bit vs 64-bit

I have knowledge on 32-bit vs 64-bit, but not very clear minded. Here is a good article I found about it.   Understand there are 3 things involved: CPU, OS and application. To work on 64-bit, first thing first is: you need a 64-bit CPU. 64-bit CPU usually provide emulation for 32-bit system. Though some 32-bit application still cannot run on 64-bit OS, because they might contain 16-bit code. 32-bit system won't have com...

783 0 0         

  China has blocked Wikipedia again

Recently lots of Chinese found they experienced problems while trying to access Wikipedia, the world's largest and most well-known free encyclopedia. It turns out that the notorious Chinese GFW(Great Firewall) is playing the critical role here. It blocks the Chinese version of Wikipedia. The reason why the Chinese version of Wikipedia is blocked is said to be that Wikipedia has changed its default protocol from HTTP to HTTPS. This change made it difficult for the GFW to filter some sensiti...


  Qualities of a great business presentation

When it comes to business, every day in the industry is spent trying to convince someone into buying your brand, your product or services, no doubt you will find yourself making a lot of pitches and presentations for new products, partners and stakeholders among other things. Having great presentation skills is essential to running a successful business and getting as many people believing in your brand as possible. Great presentations have the following qualities Killer slides PowerPoint slides...

656 0 0         

  Java SynchronizedList and Iterator

While reading some material about concurrency, I come up with some writing about using SynchronizedList wrap about normal List to enable synchronization.   But one interesting thing is   It says     It is imperative that the user manually synchronize on the returned list when iterating over it:     1   List list = Collections.synchronizedList(new A...

1,171 0 0         

  Create host only network on VirtualBox

Previously we showed how to install Ubuntu in VirtualBox. What if we want to communicate with the host OS from within the Guest OS on VirtualBox? There are a few ways to do this. For example, bridged network, Host only networks. Today we will show you how to enable network communication between host OS and guest OS using host only networks. A host only network will not need to access the physical network interface of the host OS. It will create a network between different virtual machines and th...


  Pros and cons of 6 most popular test automation frameworks

Not everyone dappling into systems for test automation knows how to leverage the maximum benefit and keep them going in top shape for a long time. That's where test automation frameworks come in – they're basically sets of rules, standards, protocols and guidelines which can be incorporated into practice or simply followed to provide beneficial execution environments for automation test scripts.   Why are test automation frameworks important?   Test automation frameworks offer m...

1,334 0 0         

  Singleton Design Pattern in Java

Singleton is frequently used in applications where resource may be expensive to create and no instance specific state needs to be maintained. For example, when creating database connection, a singleton may be needed. Today we will share the famous Singleton design pattern in Java. 1. Definition Singleton design pattern is a design pattern that restricts the instantiation of a class to one object. It is one of the most well-known design patterns. 2. Application Singleton ...


  Signature sign/verification demo in Java

Digital signature is commonly used in areas where data authentication and integrity are required. It is extremely important to have signature while transferring sensitive data from one peer to other peers through network since there might be malicious applications or man-in-the-middle attacks which may alter the data along the way. Java provides some APIs to generate and verify digital signature. One important class is Signature.  When generating the signature, a private key needs to be pa...

1,398 0 0          JAVA SECURITY SIGNATURE