Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- BIG DATA



  Difference between keystore and truststore

Security has become a vital concern in most of the online transactions nowadays. Lots of the world's most popular websites have adopted security protocols to transfer data, especially sensitive data. These security protocols including SSL/TLS which are using the private/public key exchange mechanism to establish secure connections.  The private/public key cryptography is a really important invention and it allows data to be transferred securely and solves the big problem of transferrin...

   KEYSTORE,TRUSTSTORE,SECURITY,SSL     2017-03-04 07:52:47

  5 Innovative Web Design Trends Startups Should Consider Adopting

Nowadays, every market has the tendency to shift and change on a whim, and it is no different in the world of web design. No one in their right minds has the time to sit and watch the market for possible shifts as it takes up too much time and no one can really predict what’s going to happen so we’re just forced to adapt and improvise. Currently, there are 5 trends that have caused an uproar and have reshaped the online marketplace and are worth looking into. Think Big First an...

       2017-11-02 06:12:47

  Will the next generation of iPhone be launched on September 10?

According to AllThingsD, Apple might launch its next generation of iPhone on September 10. There is no detailed information about this new iPhone yet, it's also unknown whether it's a cheap one or other kind of versions. But it will equip with iOS 7 and Apple may launch the next generation of Mac OS--Maverick in next few weeks. Since Apple acquired finger print recognition manufacturer AuthenTec with $356 million and it also applied the finger print unlock patent, so the next generation iPhone ...

   iPhone,iOS 7     2013-08-11 10:06:26

  Severe SSL 3.0 vulnerability to be released

According to The Register, another severe security vulnerability has been found in the widely used SSL v3 protocol. Until now, it's still in patch phase and the details of this vulnerability is expected to be released today. There are a few widely impacted security vulnerabilities revealed this year and they bring people's attention to the long existing security concerns. Previously, we have seen the HeartBleed issue and also the recently ShellShock issue. Both of them occur in popular libraries...

   SSL,Security vulnerability, The Register     2014-10-14 22:22:39

  IDEs for Java programmers

IDEs are great helpers to programmers. They can help programmers write less error-prone programs with less time. They have become an inevitable part of many programmers. As a Java developer, you may be familiar with Eclipse already. But do you know other IDEs for Java programmers? We will give an overview of different IDEs for Java programmers. These IDEs are Eclipse, Intellij IDEA, NetBean and BlueJ. Eclipse Eclipse is the most widely used IDE for Java programmers. It's an open source IDE whic...

   Java IDE,BlueJ,NetBeans,Eclipse     2014-08-21 06:15:54

  Alphabet chooses the domain extension .xyz

Google has been restructured and it now has a parent company which is called Alphabet. This new company will fully own the original "Google". Larry Page will be the CEO of Alphabet and Sergey Brin will be the president of the new company. Sundar Pichai will be the new CEO of the new Google. The new Google will continue its current business with some slimmed changes. While Alphabet will focus on working on the next generation of Internet and creating more billion user companies and services...

   Google, Alphabet,XYZ, Domain name     2015-08-10 20:18:33

  Introduction to GoLang generics and advanced usage

Generics in Go allow you to write code that can work with multiple types of data, without having to write separate versions of the code for each type. This can make your code more flexible and easier to maintain, as you only need to write and test the code once, rather than maintaining multiple versions. To use generics in Go, you first need to define a type parameter, which is a placeholder for the type that the code will work with. For example, you might define a type parameter called "T" like...

   GOLANG,GENERICS     2022-12-17 05:12:21

  Unix directory hierarchy history

As a beginner user of Unix or Linux, people would frequently get confused about the use of different directories of the system.  For example, there is a /bin directory under root(/), it is used to store binary files. However, there are /usr/bin and /usr/local/bin under /usr which are used for storing binary files as well. Some systems even have /opt/bin. What are the differences among them? Though there are articles explaining different directories in *nix such as Filesystem Hierarchy Stan...

   UNIX,LINUX,FILESSYTEM,DIRECTORY HIERARCHY,HISTORY     2016-10-21 23:47:17

  Full disk encryption is too good, says US intelligence agency

You might be shocked to learn this, but when a quivering-lipped Chloe from 24 cracks the encryption on a terrorist’s hard drive in 30 seconds, the TV show is faking it. “So what? It’s just a TV show.” Well, yes, but it turns out that real federal intelligence agencies, like the FBI, CIA, and NSA, also have a problem cracking encrypted hard disks — and according to a new research paper, this is a serious risk to national security.The study...

   FDE,Full disk encryption,Crack,Difficulty     2011-11-19 01:55:17

  Some famous article aggregators

Blogs are still very important places for people sharing their thoughts about something although some social media platforms have replaced some of these capabilities. As a blog writer, how can you let others know what you are thinking about? Besides your friends and social media platforms, there are some article aggregators around us which can help us promote our articles. Other than some aggregators like Google News, readers can submit articles to these sites themselves What are some famous art...

   News aggregator,Reddit,Digg,Hacker News     2013-08-12 03:34:37