Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- CLOUD AUTO DIALER



  Create host only network on VirtualBox

Previously we showed how to install Ubuntu in VirtualBox. What if we want to communicate with the host OS from within the Guest OS on VirtualBox? There are a few ways to do this. For example, bridged network, Host only networks. Today we will show you how to enable network communication between host OS and guest OS using host only networks. A host only network will not need to access the physical network interface of the host OS. It will create a network between different virtual machines and th...

   VIRTUALBOX,NETWORK,VIRTUAL MACHINE,HOST-ONLY     2015-12-01 09:29:13

  Update & Delete Kubernetes resources in one-line command

It recently troubles me that my GKE cluster is managing more and more resources and causing difficulties in maintenance, one of which involves how to delete resources properly. Next, I will explain step by step the difficulties I encountered in my work and how I finally used the combination of bash commands and kubectl to implement the edition of Kubernetes objects through one-line command. In general The following are the basic operations that almost every Kubernetes user takes. Check ðŸ‘â€...

   KUBERNETES     2020-11-01 04:16:47

  Web Symbols typeface

There are those points in every interactive designer’s career when he becomes fed up with producing the same set of graphics all over again for every website he designs. It could be the social network icons, gallery arrows or any number of his «signature» butterflies for the footer of each of his projects. Similar for interactive developers that have to slice the same GIFs and PNGs each time art-director asks them to.U...

   Web,Type face,Interactive mode,Design icon     2011-11-19 02:08:47

  5 Things You Can Do to Protect Your Data

The average cost of a data breach is $148 per record. Records include everything from personal addresses to birthdates to even more sensitive data, like Social Security Numbers and business files. Each year, these hacks cumulatively cost billions of dollars to companies and individual users. Nonetheless, like many other criminals, hackers tend to prey on easy targets. By following these essential steps, you’ll be able to ensure your data is always kept safe. 1) Use a File Encryption Servic...

   DATA SECURITY     2019-08-20 08:35:54

  Windows 8 launch event data

Today on Microsoft Windows 8 launch event, Microsoft CEO Steve Ballmer and Windows manager Steven Sinofsky shared with us some data. Let's see what's happening to Windows. Since launch, Windows 7 system gains a total of 670 million upgrade and 400 million new PC installed with Windows 7.Microsoft's cloud storage service Skydrive, 200 million users share 11 billion photos and 550 million documents. new 2PB file uploaded monthly.(1PB = 1024TB)Windows 8 has been tested in 190 countries for 1.24 bil...

   Windows 8,Microsoft data     2012-10-25 13:16:30

  Accounting Software: What Is it And Why Do We Need It?

As a business owner, you need to do everything that you can to ensure that your business operates as efficiently as possible and that you can provide the best possible service to your clients. For many business owners, one of the major challenges of running their business is financial management. While managing your accounts might not be the most glamorous aspects of running a business, it is crucial to gain control of your finances for your company to succeed.  With the right small busine...

   ACCOUNTING     2021-03-17 04:11:01

  Crash your Chrome with %%30%30

Have you ever wondered a simple string can crash one of the most sophisticated designed web browsers -- Chrome? There is a finding from Andris Atteka who found that a null string "%%30%30" appended to an URL can crash Chrome. For example, if you have below URL in your browser address bar or you mouse over below URL, Chrome will crash: http://www.pixelstech.net/%%30%30 When the browser crashed, it may show : Or on Windows, you will see : This bug has been reported to Google at Is...

   CRASH,SECURITY,CHROME,GOOGLE     2015-09-20 08:24:16

  Java Then, Java Now - Looking at the evolution of Java from EE7 to EE9

Java, the programming language developed at Sun Microsystems in the 90s and later acquired by Oracle, is the most common programming environment used today, by developers across the globe. With the diversification of applicability that accompanied the technological boom, Java updates now come as Standard Editions (SE), Enterprise Edition (EE) and Micro Edition (ME). The Java SE contains the core programming logic and platform, used for relatively smaller-scale tasks and academic purposes. Java E...

   JAVA DEVELOPMENT COMPANY     2017-07-05 01:09:28

  Some thoughts about microservice adoption

Nowadays microservice is very popular among companies with the increasing complexity of systems. The goal is to make each microservice to handle one specific job and handle it well. This normally would provide the benefit of maintaining the service easily and isolating errors and making the service more reliable and scalable. The benefits of adopting microservice are obvious. Maintainability. Decouple functions so that each function can be maintained separately which reduces the risk of issue ...

   ADVANTAGE,DISADVANTAGE,MICRO SERVICE     2020-09-05 01:25:05

  Here is why Mark Zuckerberg wears the same thing every day

Have you noticed that Facebook CEO Mark Zuckerberg always wears the same thing every day when he appears in the public? A grey t-shirt which is now a symbol of Mark Zuckerberg. The reason why he wears the same thing every day is "I want to clear my life to make it that I have to make as few decisions as possible about anything except how to best serve this community" as what he said in an in-person public Q&A at the Facebook HQ in Menlo Park where he answered questions from people around th...

   Facebook,Mark Zuckerberg, grey T-shirt     2015-03-01 01:01:16