Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- CLOUD SERVICES



  China to expand 4G network across the country

According to Xinhua news, China Mobile, the country's largest telecommunication company is expanding its commercial trials of 4G network across the country including Tibet. On Tuesday, the Tibet branch of China Mobile held a ceremony to mark the beginning of its 4G network trial in Tibet. This plan includes building new 4G base stations there and also provide support for connecting to the 4G network. In this new plan, China Mobile's high speed network services will soon benefit people living in ...

   4G,China Mobile,Tibet     2013-06-13 05:06:41

  How Can Your Data Be Stolen Online?

In 2019, according to Statista, nearly 165 million sensitive records were exposed in the US due to data breaches. Unfortunately, data theft is not going anywhere. Hackers are using increasingly sophisticated methods to steal information, but thankfully there are measures you can take to ensure your data stays safe. Here are some of the most common ways people get their data stolen online and how you can take precautions against the methods cybercriminals use. Human Error Hacking is one of the m...

   DATA SECURITY,PROTECTION KID     2021-01-27 19:46:05

  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10

  Signature sign/verification demo in Java

Digital signature is commonly used in areas where data authentication and integrity are required. It is extremely important to have signature while transferring sensitive data from one peer to other peers through network since there might be malicious applications or man-in-the-middle attacks which may alter the data along the way. Java provides some APIs to generate and verify digital signature. One important class is Signature.  When generating the signature, a private key needs to be pa...

   SECURITY,JAVA,SIGNATURE     2015-11-21 09:48:12

  Redis Cluster and Common Partition Techniques in Distributed Cache

In this post, I will discuss a few common partition techniques in distributed cache. Especially, I will elaborate on my understanding on the use of Redis Cluster. Please understand that at the time of writing, the latest version of Redis is 4.0.10. Many articles on the same topic have a different idea from this post. This is mainly because, those articles are probably outdated. In particular, they may refer to the Redis Cluster implementation in Redis 3. Redis Cluster has been improved...

   REDIS,DISTRIBUTED CACHE,CLOUD COMPUTING     2019-01-17 08:10:37

  How to be an excellent programmer

To use a programming language is very easy for a programmer, but it's a dream for many programmers to be an expert software developer. There are five levels of programmers: Novice, Senior novice, competent, proficient, and expert. Most programmers are senior novice. And programmer living in this level are a lot of people who have 1 to 10 years work experience.As a programmer, how to find the bottlenecks for your improvement and how to improve yourself quickly? This is really not an easy question...

   Programming,Tips,Habit     2013-03-26 09:53:38

  Only 4G can resolve the conflicts between China Telecom Carriers and WeChat ?

Why WeChat has made the three big Chinese telecom companies uncomfortable? Let's analyze from both technical and commercial levels. From a technical point of view, Mr. Huang, Dean of China Mobile Research Institute, described the impact of "always online service" applications like WeChat. Instead of using technical terms, we will explain in simple vivid phrases. First, mobile QQ, or WeChat, will have their own "request frequency". These requests are sent to the carrier network, to check the re...

   4G,WeChat,Telecom,China     2013-03-25 08:28:59

  What is the Best Laptop for an Engineering Student?

There are a wide range of engineering degrees out there, reflecting the variety of specialties that an engineer can pursue in their professional lives. Engineering is definitely a solid career choice, and there is a specialty to appeal to anybody. You will, of course, need to learn to love math, as that will be at the heart of any engineering degree. But, no matter what type of engineering degree you are studying for, you will need a laptop to do your work on. In fact, depending on the engineeri...

   PROMOTION,LAPTOP     2019-06-19 08:50:22

  Welcome the new Google logo

Google today changed their logo, the new logo adopts the flat design with a lighter color scheme. Apart from these, there are no major changes on the font style, character color etc. Old logo New logo Along with the new logo, Google also released a new navigation menu that sits next to the Share and account info. The launcher, which looks just like the app launcher on Chrome OS, brings up an App grid with your favorite Google services. Actually, Google wanted to replace the top black navigati...

   Google logo,Chrome OS,App menu     2013-09-19 23:06:36

  Yahoo is going to recycle inactive user IDs

According to Sina Tech, Yahoo announced that it would provide users with shorter, more lovely and more memorable Yahoo IDs starting from July 15. For IDs like emily@yahoo.com, if they are in inactive status in the past 12 months, then other users will be able to get this ID. Yahoo plans to reset Yahoo ID system to help users get the ID they want in mid of July. By mid-August, users who apply for a Yahoo user ID will be informed what kind of ID they get.This means that users can apply multiple ID...

   Yahoo,ID recycle     2013-06-12 21:22:15