SEARCH KEYWORD -- Force download
Preparing for the real costs of cloud computing
Computerworld - At a cloud computing conference in New York in June, a number of speakers pointed out that the cloud is moving past the hype stage and is beginning to deliver tangible benefits to organizations. These improvements include increased flexibility and agility. But moving to the cloud can also mean added costs, some of which might be unexpected, according to IT executives whose organizations have implemented cloud services or are considering them. While these types of costs ...
Cloud computing,Cost,Chanllenges,Platfor 2011-08-23 07:48:24
Feature: The History Of Mobile Gaming
Mobile phones have come a long way since the unsightly bricks of the 1980s. The sleek handsets of today are a fraction the size of their ancestors, yet exponentially more powerful. While the implications for communication have been profound, there have been many other applications for this technology. Modern devices are capable of supporting increasingly complex software, innovative interfaces and networking capabilities, and the gaming sector has been one of the biggest benefactors of this.Much...
Game,Mobile,History,Feature, Game on mobile device 2011-10-12 11:44:30
Put Your HTML in a Box
In the first article in this series, I walked through the basics of cascading style sheets (CSS) and showed how CSS can make your code easier to maintain. CSS allows you to keep your presentation rules separate from your content, and I showed you some of the benefits this separation provides. In this article, I’ll move forward with CSS and describe how to position elements on a page.The first step in understanding how to position elements is to understand the fundamental model of CSSâ€...
Cracking Siri
On October 14, 2011, Apple introduced the new iPhone 4S. One of its major new features was Siri, a personal assistant application. Siri uses a natural language processing technology to interact with the user.Interestingly, Apple explained that Siri works by sending data to a remote server (that’s probably why Siri only works over 3G or WiFi). As soon as we could put our hands on the new iPhone 4S, we decided to have a sneak peek at how it really works.Today, we managed to crack ...
Siri,Cracking,Defect,Speech to text,Record,AI 2011-11-15 08:38:23
Your Code is My Hell
It occurred to me recently that my experience as a Rails developer may be somewhat unique.I often get brought in to help preexisting Ruby/Rails projects evolve and mature in a sustainable way. As a result, the vast majority of Ruby projects I’ve worked on have been well-established by the time I arrived. In fact, offhand I can only think of one commercial greenfield Ruby project I’ve participated in. All the rest have been “legacy†from my perspective, in the ...
Code style,Clean code,Code paradigm 2011-09-15 08:39:16
The Death Of The Spec
Earlier today, my colleague Matt Burns wrote a post noting that most tablet makers may be largely failing because they’ve sold their soul to Android and are now just in the middle of a spec war, which no one can win. I’m gonna go one step further in that line of thinking: the spec is dead.There have been a few key stories from the past couple of weeks that highlight this new reality. Barnes & Noble unveiled the new Nook Tablet. Consumer Reports looked at the...
Specification,Android,Platform,Software design 2011-11-15 08:20:22
Good to Great Python reads
A colÂlecÂtion of python “must readsâ€:The Python yield keyÂword explainedPython’s super() conÂsidÂered super!UnderÂstandÂing Python DecoratorsWhat is a metaÂclass in Python?MetaÂclasses DemystifiedTry/Catch for valÂiÂdaÂtion or speed?Python (and Python C API): __new__ verÂsus __init__Python “self†keywordPython and the PrinÂciÂple of Least AstonishmentA CuriÂous Course on CorouÂtines and Concurr...
Python,Reference,eBook,Reading Material 2011-11-15 11:46:12
SQL Injection through HTTP Headers
During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to SQL injection flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever. What about other HTTP header parameters? Aren’t they potential input vectors for SQL injection attacks? How can one test all these HTTP parameters and whic...
Code security,SQL injection,HTTP header 2012-04-05 11:42:04
Secure Your Go Code With Vulnerability Check Tool
Security vulnerabilities exist in any language and any code, some are written by ourselves, but more are from the upstream dependencies, even the underlying Linux. We have discussed the security protection methods for Go and Kubernetes Image in Path to a Perfect Go Dockerfile and Image Vulnerability Scanning for Optimal Kubernetes Security, in which the security scanning was performed based on generic. As the Go community grows, more and more open-source packages have caused ...
GOVULNCHECK,GOSEC,GOLANG 2022-10-29 23:43:20
Android Security
Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an alternative to Apple’s iOS, is now slowly eating into the market share of Apple and is of primary concern to the company. Let’s have a brief introduction about android and then look into the security concerns and vulnerabilities that need to be focused on. Android Introduction: Android was deve...
Android security,Input validation 2013-04-16 12:19:37
RECENT
- Common Pitfalls When Handling JSON in Golang
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- more>>