SEARCH KEYWORD -- Date
Dos and Don’ts in Test automation in your project
Test automation is a vital step for any digital solution. With time, its architecture gets more complex, new features are added, and it acquires more users. Thus, your QA team needs to spend more time and effort to ensure the application usability and smooth user experience with no bugs and defects. So here are the things you need to consider before the start of the automation initiative: Define Success Metrics It’s hard to measure success until you haven’t set up clear goals from t...
TESTING,TEST AUTOMATION 2021-01-12 05:57:45
Windows 8 Possible Features: Ribbon, Metro, Apps, Cloud Integration
Microsoft may still be plugging away at selling Windows 7 to consumers and the enterprise, but rumors have already started about the next version of the popular operating system—dubbed "Windows 8" by many in the media. Rafael Rivera and Paul Thurrott, two bloggers with a track record of delving into Microsoft's proprietary code base, recently sparked a fresh round of chatter with a dissection of a supposed Windows 8 early build, adding their voices to a discussion that extends back to 201...
Windows 8,New features,Touch,Metro 2011-04-11 02:10:12
A boolean value interview question
Someone asked a question on StackOverflow, he was asked an interview question. The question is : Given 3 boolean variables a, b, c, return true if at least 2 out of the 3 are true. He gave the solution as follows :boolean atLeastTwo(boolean a, boolean b, boolean c) { if ((a && b) || (b && c) || (a && c)) { return true; } else { ret...
bool,return,expression,conditional 2012-04-30 08:49:32
Using keytool to create certificate chain
JDK provides a command line tool -- keytool to handle key and certificate generation. This tool has a set of options which can be used to generate keys, create certificates, import keys, install certificate and export certificates etc. In this tutorial, we will show how to create certificate chain using keytool. If you want to understand how to create certificate chain programmably, please refer to Generate certificate in Java -- Certificate chain. To begin, we first generate a key pair whi...
JAVA,KEYTOOL,CERTIFICATE CHAIN,CERTIFICATE 2015-12-17 07:09:33
Twenty Years of Linux according to Linus Torvalds
Summary: In an interview, Linus Torvalds talks about Linux’s multiple 20th birthdays and life with Linux.The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux, started the celebration of Linux’s 20th anniversary at the Linux Foundation Collaboration Summit, but when is Linux’s real birthday? Is it August 25th, when Linus announced the project? October 5th 1991, when 0.02, the first public release was made? I decided to go st...
Linux,Linus Tonalds,Interview,Developmen 2011-09-28 09:39:10
5 comment styles should be avoided
Have you ever found some superfluous comments while checking others codes? The purpose of using comments in the code is to enhance the readability of the code, so that non-original code developers can understand them better and easier.I summarized 5 kinds of comment styles and the developers who write them. Hope you don't do the same thing as below in your application development process. 1. Arrogant comments public class Program { static void Main(string[] args) { string message...
Code comment, comment style 2012-11-21 10:57:34
Essential Rules To Protect Your Credit Card When Shopping Online
You have to protect yourself and your credit card online while shopping. There are a number of ways to do this, but some prove more technical than others. Your basic best defense includes sensible use and layers of protection. The best way to do this is to pick and choose which stores at which you charge purchases. You can reduce the chance of losing your card details to a thief by declining to allow the retailer to store your credit card. Use a password manager to save your passwords and make a...
SECURITY,CREDIT CARD,MASTERCARD 2019-10-09 08:40:07
Jackie the smart quadcopter to launch at Robotics Week
Flying security camera synced to smartphone kicks off Kickstarter campaign Entrepreneurs and robotics graduate students Jackie Wu and Ritwik Ummalaneni, in Northwestern University’s Master’s in Robotics program, are launching their new product, Jackie, during the National Robotics Week. The flying security camera quadcopter syncs straight to a smartphone, and is the next evolution in home security platforms that consumers have been waiting for. Jackie’s intuitive and easy co...
Startup,Quadcopter,Security camera,Jackie Wu 2015-04-05 20:56:11
How Can Your Data Be Stolen Online?
In 2019, according to Statista, nearly 165 million sensitive records were exposed in the US due to data breaches. Unfortunately, data theft is not going anywhere. Hackers are using increasingly sophisticated methods to steal information, but thankfully there are measures you can take to ensure your data stays safe. Here are some of the most common ways people get their data stolen online and how you can take precautions against the methods cybercriminals use. Human Error Hacking is one of the m...
DATA SECURITY,PROTECTION KID 2021-01-27 19:46:05
Basic Patterns for Everyday Programming
For most of you the patterns mentioned below should be nothing new. These are very basic stuff we slap into our code everyday and at times feels they are actually code smells than smart patterns. However, I've been doing some code reviewing lately and came across many code that lacks even these basic traits. So I thought of writing them down as a help for novice developers who would want to get a better grasp at these.These patterns are commonly applicable in most general purpose programming lan...
Pattern,Code,NULL,Function,JavaScript,Assign default value 2011-11-23 08:03:55
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>