Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- CREDIT CARD



  9 Outstanding Ways Artificial Intelligence Can Transform Retail

Artificial intelligence has been around for quite some time. However, Amazon was the first company to apply it in the retail industry. Now, it automates most processes on the platform, replaces the people's’ work, and increases the productivity in every possible field. Here are nine useful ideas for you to start using AI in retail. 1. Tracking the Overstock and Out-of-Stock Items It is necessary to know exactly how many items are left in stock (or whether there are any left at all). Selle...

   BUSINESS,ARTIFICIAL INTELLIGENCE     2019-01-22 08:41:02

  Additional steps need to implement to setup shadow-boxV2 OPTEE on Raspberry PI

We followed the Shadow-box v2 project from the https://github.com/kkamagui/shadow-box-for-arm to set up the trustZone on Raspberry PI modeB to protect the Linux Kernel. But got a problem when doing the step: [3.6.5. Activate Shadow-Box for ARM and Start Secure Pi!] to create the hash for the memory area. The result is not shown. If you met the same problem, this is what I did to fix the problem on my PI: 1.1  When we do the step [3.5.1. Copy OP-TEE OS with Shadow-Box for ARM and N...

   HARDWARE,RASPBERRY PI     2019-05-20 08:52:55

  How Computers Boot Up

The previous post described motherboards and the memory map in Intel computers to set the scene for the initial phases of boot. Booting is an involved, hacky, multi-stage affair – fun stuff. Here’s an outline of the process: An outline of the boot sequence Things start rolling when you press the power button on the computer (no! do tell!). Once the motherboard is powered up it initializes its own firmware – the chipset and other tidbits – and tries to ...

   Computer,Boot-up,Rationale     2012-04-11 13:43:02

  10 modern technologies we will still use in 2030

Although there is rapid revolution for new technology, some technologies can survive with the passage of time. Here are 10 modern technologies which may continue to exist in 2030. 1. QWERTY keyboard Speech recognition, handwriting recognition and gesture control input will become the trend for the next two decades. Nonetheless QWERTY keyboard input is still one of the most accurate way - although not necessarily the most convenient. Although physical keyboard disappear on phones and tablet PCs, ...

   New technology,Trend     2012-11-12 11:02:02

  Testing like the TSA

When developers first discover the wonders of test-driven development, it’s like gaining entrance to a new and better world with less stress and insecurity. It truly is a wonderful experience well worth celebrating. But internalizing the benefits of testing is only the first step to enlightenment. Knowing what not to test is the harder part of the lesson. While as a beginner you shouldn’t worry much about what not to test on day one, you better start picking it up by day t...

   Testing,QA,TSA     2012-04-11 13:41:19

  GitHub : Code is the most direct way for programmers to communicate

If not invested by Andreessen Horowitz, GitHub might not be noticed by Forbes, CNN, New York Times. People didn't know this tool because it was very far away from the world -- GitHub is a project hosting service used by programmers.But to some programmers, it is not just a place for project hosting, it is`also the hub for open source projects, a place for programmers improving themselves and a social network for programmers.There are around 3.26 million projects hosted on GitHub currently, inclu...

   GitHub,Open source,Hosting,Social     2012-07-20 11:38:31

  Surprising applications of math

The comments in the previous post touched on surprising applications of math, so I thought I’d expand this theme into it’s own post. Below I’ll give a couple general examples of surprising applications and then I’ll give a couple more personal applications I found surprising.Number theory has traditionally been the purest of pure mathematics. People study number theory for the joy of doing so, not to make money. At least that was largely true until the ...

   Math,Number theory,Algorithms,Differential euqation     2011-11-18 09:24:19

  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10

  Galaxy S III will be released today at London

At 19:00 May 3 (London time), Samsung will release its next-generation flagship mobile phone products GALAXY, SIII in London, England. This latest Samsung mobile phone will have a quad-core processor, with blue and white two colors and screen size of more than 4.65 inch (there is news that the size will be up to 4.8 inch).Europe's largest mobile phone retailer CarphoneWarehouse confirms the new Galaxy phone does have blue and two different colors.Quad-Core CPUCeramic casingPhone screen p...

   Samsung,S III,release,London     2012-05-03 05:44:16

  FUCK PASSWORDS

I'm so tired of passwords. So, so, so tired. Most people don't understand this. Most people use the same password everywhere. Most people can just mechanically type out password3 in every password box, smirking to themselves at how clever they are, because who would ever guess 3 instead of 1? I don't do that. Let me tell you what i do. I generate a different password for every service, based on a convoluted master password and the name of the thing. I do this because it's what you're...

   Security,Password,Random generation,Hard to remember     2011-12-05 11:32:45