Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Domain Controller



  The Internet : from 1969-1974

Internet was born 43 years ago. There are some big events in the history of Internet development. In my opinion, most of the big events happened at the first five years, i.e, from 1969-1974.  1969 : ARPANETThe Advanced Research Projects Agency Network (ARPANET), was the world's first operational packet switching network and the core network of a set that came to compose the global Internet. The first ARPANET transmission was between Stanford Research Institute and UCLA on 29th, October 1969...

   Internet,History     2012-06-22 09:55:51

  A Sip of Go Log

Logging is indispensable in any code that we need its support both in debugging and in statistics. However, a package that filled withfmt.Println/fmt.Printf printing various messages can never be considered a read-to-be-adopted package, which can be optimized by a simple change, using Golang’s native log package to print information to standard output or to a file. Then, how to apply the log package? Are there any limitations? If so, can we seek open-source packages? Let&rsq...

   GOLANG,LOGGING     2022-06-16 05:43:24

  How To Write A Good Programming Test

I’ve taken and marked a lot of programming tests in the past. I love doing them as it’s always good to see what challenges different programmers have come up with when designing them. Unfortunately, however, most of them aren’t very good. Below is a list of general ideas to help increase the quality of programmer tests. 1. Keep it relevant Too many of the tests have questions on content that simply isn’t relevant to the job. The whole idea behind a programming test i...

   Programming test,Interview,Questions,Pro     2011-08-26 02:46:44

  Different types of keystore in Java -- Overview

Keystore is a storage facility to store cryptographic keys and certificates. They are most frequently used in SSL communications to prove the identity of servers and clients. A keystore can be a file or a hardware device. Three are three kinds of entries can be stored in a keystore depending on the types of keystores. The three types of entries are: PrivateKey : This is a type of keys which are used in asymmetric cryptography. It is usually protected with password because of its sensitivity. It ...

   JAVA,KEYSTORE,OVERVIEW,JKS,PKCS12,JCEKS,PKCS11,DKS,BKS     2014-08-18 02:09:54

  How can you test if your VPN is working properly?

Installing a VPN on your device is one of the essential steps you need to take in order to have a safe and pleasant online experience. It good functioning is in your best interest and this is why you need to make sure that your VPN is working properly. Unfortunately, a lot of problems can occur if it turns out that your VPN is not up to the task and that it has some leaks.  Can a leak really occur? To answer you most directly – Yes! Yes, it can! Unfortunately, no system is perfect an...

   VPN     2020-09-17 06:53:19

  Asynchronous UIs - the future of web user interfaces

It's an interesting time to be working on the frontend now. We have new technologies such as HTML5, CSS3, Canvas and WebGL; all of which greatly increase the possibilities for web application development. The world is our oyster!However, there's also another trend I've noticed. Web developers are still stuck in the request/response mindset. I call it the 'click and wait' approach - where every UI interaction results in a delay before another interaction can be performed. That's the process they'...

   AJAX,Asynchronous UI,AUI,User interface     2011-11-18 08:55:08

  Why Most of us Get Confuse With Data Quality Solutions and Bad Data?

How to fix this misunderstanding is what Big Data professionals will explain in this post. The C-level executives are using data collected by their BI and analytics initiatives to make strategic decisions to offer the company a competitive advantage. The case gets worse if the data is inaccurate or incorrect. It’s because the big data helps the company to make big bets, and it impacts the direction and future together. Bad Data can yield inappropriate results and losses. Some interesting ...

   BIGDATA     2018-02-21 06:01:35

  How To Find Link Prospects Without Using Google

I’m obsessed with Google. (I mean, you kind of have to be if you’re in this industry.) But sometimes, you need a break from the hand that feeds. There’s no denying the power of advanced search queries, but you’d be surprised how many other and different prospects you can find without using the search engine at all. Curated Lists OK, I lied. You do have to use Google for this, but not nearly in the capacity you would with normal searches. With lists, you have less ...

   Search engine,Web site prospect,SEO     2012-02-25 12:02:50

  How to Develop a Successful SEO Strategy for Your Startup

SEO is usually viewed as under-the-table formula manipulations and trickery, once actually it’s simply a series of core steps and actions you wish to require, to create your web site rank higher. An economical SEO strategy may be countermined to the subsequent three parts, that create the entire issue look less daunting in spite of everything.   Step 1: On-site Optimization On-site optimization strategy consists of these subsequent elements: Your Content Website Structure Layout of ...

   SEO,MARKETING     2016-03-18 15:33:37

  40+ Techniques to enhance your php code

1. Do not use relative paths , instead define a ROOT path Its quite common to see such lines : 1require_once('../../lib/some_class.php'); This approach has many drawbacks : It first searches for directories specified in the include paths of php , then looks from the current directory. So many directories are checked. When a script is included by another script in a different directory , its base directory changes to that of the including script. Another issue , is that when a script is being ru...

   PHP,Quirk,Trick,Efficiency,Techniques     2012-04-10 13:06:55