Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- APPLICATIONS



  Turn on SecurityManager in Java

SecurityManager in Java is to check whether the application codes can access some restricted resource such as file, socket etc. This can be used in applications which have high security requirements. With this feature turned on, our system resources can be secured with only permitted operations. When JVM starts, it will first check whether the SecurityManager is on by checking the system property java.security.manager, if it's on, then an instance of SecurityManager will be created and it can be...

   SecurityManager,enable,program     2013-12-16 05:03:53

  Preparing for the real costs of cloud computing

Computerworld - At a cloud computing conference in New York in June, a number of speakers pointed out that the cloud is moving past the hype stage and is beginning to deliver tangible benefits to organizations. These improvements include increased flexibility and agility. But moving to the cloud can also mean added costs, some of which might be unexpected, according to IT executives whose organizations have implemented cloud services or are considering them. While these types of costs ...

   Cloud computing,Cost,Chanllenges,Platfor     2011-08-23 07:48:24

  Let’s Find Out What the Future holds for .Net Technology

Technology is more like an evolution, not a revolution. The disruptive industry seems to be changing day in day out. Due to which tech companies by default have to chase new trends in order to stay ahead of the curve. Now, Microsoft.Net framework has been around since the 1990s! Do you think such refined technology can be considered relevant now? From what I can see, .Net is going through a major transformation. It’s gone largely open source and has been getting modernized so that its wor...

   ASP.NET ,.NET     2018-06-12 05:07:53

  The Best Laptops for Freelancers

Whether you’re answering emails, beating a deadline, or looking for even more freelance gigs, many professionals simply can’t imagine their career without a laptop. It has become the ultimate work gadget of the 21st century, which many laptops now powerful enough to be used like a PC. However, not all freelancers are the same—and as such, require different tools to get the job done. That being said, here are some of the best laptops for every kind of freelancer imaginable. Best...

   APPLE,COMPUTER,HP,LAPTOP     2020-03-04 07:58:12

  Backend-as-a-service?

As the list of *-as-a-service’s continues to grow, I thought I’d throw one into the mix. What about the idea of a backend-as-a-service (BaaS)? The recent surge of client side Javascript frameworks along with the attractiveness of simple RESTful APIs has created an environment where server-side interaction can be reduced to simply database interaction (including validation and some computation). But why stop there? What if the server-side of the equation was simply a RESTful, ...

   Web design,Backend,Service,BaaS,Client JavaScript     2011-12-29 09:07:38

  PHP Sucks! But I Like It!

I read a rather interesting post yesterday called PHP: a fractal of bad design. It's been getting a lot of traffic among the PHP community lately because it's rather inflammatory. But to be honest, it does make a lot of really good points. It also makes a lot of mistakes and misses a bigger picture. A Few Mistakes The post makes quite a few mistakes and odd apples to oranges comparisons. Let me point out the major ones that I saw. No Debugger - PHP has xdebug which works quite...

   PHP,Bad design,Like     2012-04-12 06:15:42

  ARM adopts 64-bit architecture

ARM has disclosed technical details about its new v8 architecture - the first to include a 64-bit instruction set - at ARM TechCon 2011 in Santa Clara, California.The next-gen architecture will expand the reach of ARM processors in the consumer and enterprise markets where extended virtual addressing and 64-bit data processing are required.According to ARM CTO Mike Muller, ARMv8 architecture consists of two main execution states: AArch64 and AArch32. 

The AArch64 execution state int...

   ARM,Processor,64 bit,Architecture,v8,Nvidia     2011-10-28 10:31:52

  Google feels the threat from Samsung

In response to Apple's iOS system, Google and Samsung stood on the same side. But with the increase of market share of Samsung Android devices, Google begins to feel the threat from Samsung.On MWC in Barcelona, a group of business executives said Google increasingly worried about Samsung after a private party. Because its equipment has occupied 40% of the Android devices, which could erode the Google advertising service. Google hopes manufacturers such as HTC and HP can challenge Samsung.It is r...

   Google,Samsung,Android     2013-02-27 21:12:17

  Twitter OAuth the easy way – simple post to twitter script

After Twitter introduced mandatory authentication with OAuth, many of the current scripts for posting content to Twitter don’t work anymore. OAuth can be great for more advanced authentication, but for a simple post to twitter script, it seems like a little overkill. In this post you’ll learn how to create a simple script that uses a quick and dirty version of OAuth for posting new tweets to Twitter. How to create a simple script Simplified, Twitter OAuth involves sending both ap...

   Twitter,OAuth,PHP,Auto tweet     2012-02-25 12:51:07

  Apache Tomcat Installation and Configuration

When you want to install Apache Tomcat on Windows System. You may find that there are some tricky parts. Next I will elaborate the steps to install and configure Tomcat. If you want to install Tomcat as a service without GUI. You need to download the 32-bit Windows.zip from http://tomcat.apache.org/download-70.cgi. After downloading this zip file. You need to unzip this file to the directory which you want to put this software to. After unzipping, you can go to the bin directory and find t...

   Tomcat 7,Windows,Apache,Install,Configur     2011-04-10 14:17:21