Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Device



  The Death Of The Spec

Earlier today, my colleague Matt Burns wrote a post noting that most tablet makers may be largely failing because they’ve sold their soul to Android and are now just in the middle of a spec war, which no one can win. I’m gonna go one step further in that line of thinking: the spec is dead.There have been a few key stories from the past couple of weeks that highlight this new reality. Barnes & Noble unveiled the new Nook Tablet. Consumer Reports looked at the...

   Specification,Android,Platform,Software design     2011-11-15 08:20:22

  4 Reasons Why We are NOT in a Post-PC Age

Sales of desktop PCs and laptops are falling. It’s impossible to read any technical media without hearing about the “death of the PC.” And both Apple and Microsoft are soon to release operating systems that seek to merge the features of the computer operating system with those available on tablet devices. All this evidence mounts up to suggest that the Steve Jobs-coined “post PC era” is upon us. Well, I’m going to stick my neck out on this: I donâ€...

   Post PC,Reason,PC     2012-03-26 15:24:46

  Spurring the Consumer Feedback Loop with Connected Devices

In a press release from earlier this year, Gartner had predicted that by the year 2018 mobile devices would account for initiating 5% of consumer services cases, registering a marginal rise of 0.02% from 2014. Research shows that most businesses lose around a whopping $83 billion owing to poor consumer services (Source: kissmetrics) in the US alone while globally, the average cost of losing a consumer is $243. It is only viable to think of automating support services as a way to lower the costs ...

   Big Data Analytics Solutions, Loyalty Programs for Customers     2015-08-18 07:11:35

  Different types of keystore in Java -- PKCS11

PKCS11 keystore is designed for hardware storage modules(HSM). It's an interface to talk to the HSMs. It doesn't actually store any keys but provide a set of classes to communicate with the underlying HSM. The actual keys and certificates are stored on the HSMs. The reason for storing the keys and materials is to ensure security and efficiency. Since the keys are on the HSMs, they are safe to be stolen. All encryption/decryption operations are performed on the HSMs as well, this incre...

   PKCS11,keystore,HSM,Java     2015-01-08 00:39:12

  The seven rules of Unobtrusive JavaScript

I've found the following rules over the years developing, teaching and implementing JavaScript in an unobtrusive manner. They have specifically been the outline of a workshop on unobtrusive JavaScript for the Paris Web conference 2007 in Paris, France. I hope that they help you understand a bit why it is a good idea to plan and execute your JavaScript in this way. It has helped me deliver products faster, with much higher quality and a lot easier maintenance. 1. Do no...

   JavaScript,Feature,Tips     2012-01-18 08:21:39

  How Computers Boot Up

The previous post described motherboards and the memory map in Intel computers to set the scene for the initial phases of boot. Booting is an involved, hacky, multi-stage affair – fun stuff. Here’s an outline of the process: An outline of the boot sequence Things start rolling when you press the power button on the computer (no! do tell!). Once the motherboard is powered up it initializes its own firmware – the chipset and other tidbits – and tries to ...

   Computer,Boot-up,Rationale     2012-04-11 13:43:02

  Mount DD image on Linux

Yesterday, my Raspberry Pi running Arch Linux was not able to boot with error: Kernel Panic, not syncing: no init found. I spent a night on it, but could not find a working solution. The last option is easy: reinstall the system. That is really the last resort, for I do not want to re-setup everything I have done: samba server, Time Machine server, Xunlei Offline Downloader… Unable to mount the SD card The system does not boot, so I need to find a way to get into the file system to identi...

   LINUX,DD IMAGE     2014-06-24 07:49:14

  Want to install 64 bit OS on VirtualBox?

By default, VirtualBox only allows to install 32 bit OS on it. But sometimes, 64 bit OS is wanted for specific uses such as running platform specific tests. To allow installing 64 bit OS on VirtualBox. Below information is needed. Here is the official documentation about 64 bit OS: VirtualBox supports 64-bit guest operating systems, even on 32-bit host operating systems, provided that the following conditions are met: You need a 64-bit processor with hardware virtualization support (see the ...

   VirtualBox,64 bit,hardware virtualization,Ubuntu     2014-11-08 03:52:07

  Five Reasons Why Microsoft's Windows Phone Will Make A Big Splash In The Smartphone Market

The rave reviews for the latest iteration of Microsoft’s Windows Phone aren’t the only reason Microsoft will do better in the smart phone industry than it did in the MP3 player market. Whereas the Zune never really offered anything substantially different from the iPod and never pushed any real boundaries, Microsoft’s latest push into the mobile operating system business is much more bold. Microsoft isn’t rushing it this time – and it shows. So far, tech ...

   WP7,Windows Phone,Zune,2012,Nokia Lumia 900     2012-01-09 08:52:52

  Building Security onto Your Mobile Application

Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...

   Web Application Development Company, iPhone App Development Company     2015-08-21 07:22:32