Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Full disk encryption



  Writing robust shellling scripts

Many people hack together shell scripts quickly to do simple tasks, but these soon take on a life of their own. Unfortunately shell scripts are full of subtle effects which result in scripts failing in unusual ways. It's possible to write scripts which minimise these problems. In this article, I explain several techniques for writing robust bash scripts. Use set -u ...

   Robust,Shell script,Set,Commands     2012-03-19 13:25:26

  Leveraging Dedicated Server Hosting for Data Analytics Firms

In the age of data-driven decision making, data analytics firms require powerful and reliable computing resources to extract insights from massive data sets. A dedicated server is a type of server that is solely allocated to a single user or organization. In this article, we will explore the benefits of using a dedicated server for data analytics firms. Enhanced Performance A dedicated server offers enhanced performance that cannot be matched by other types of servers. Here are some of the benef...

   HOSTING SERVICE     2023-05-12 04:18:56

  NIO vs IO in Java

Java 1.4 provides a new API for handling IO -- NIO. This is a non-blocking and buffer oriented IO API. Below are main differences between the NIO and IO in Java. IO NIO Stream oriented Buffer oriented Blocking IO Non-blocking IO N/A Using selector Stream oriented vs Buffer oriented The main difference is that IO is stream oriented where the data is read byte by byte and the data will not be buffered normally.This means there is no pointer to move forward and backward in the stream. I...

   JAVA,IO,NIO     2016-01-10 01:40:02

  How Query Optimizer Works in RDBMS

In a previous post, we discussed how the various relational operators are implemented in relational database systems. If you have read that post, you probably still remember that there are a few alternative implementations for every operator. Thus, how should RDBMS determine which algorithm (or implementation) to use? Obviously, to optimize the performance for any query, RDBMS has to select the correct the algorithm based on the query. It would not be desirable to always use the same algori...

   DATABASE,DATABASE DESIGN,DATABASE OPTIMIZATION     2019-04-20 07:26:32

  Successful Web Design: It’s All About The Details

While the tools are out there for almost anyone to build a website, the most successful designs all share a few characteristics. These sites tend to be organized well, have great content and have all the design details in order. Small parts of your site, from alignment and bolding to contrast and color, can make or break the design. Taking care of the details before your project is published will ensure the page has a clean overall feel. Unorganized design and lack of attention to detail ...

   Web design,Details,Success     2012-04-16 13:38:56

  Learn Emacs: Keyboard Macros

An emacs keyboard macro is just a recording of user input into emacs, which means that most anything you can do in emacs can be recorded as a macro. Read that again. Pretty powerful.Here’s how it works. To start recording, typeC-x (and input the commands in your macro. Then typeC-x )to stop recording. Then typeC-x eto apply the macro once, orC-u 0 C-x eto apply the macro until the bell rings or end of buffer is reachedKeep in mind that you must not ring the bell when defining a keyboard m...

   Emac,Macro,Code,Example     2011-11-10 10:45:47

  Guide to Clearing Storage Space on a Macbook

Macbooks are pretty notorious when it comes to what storage space you have available. Those few gigabytes that you have will disappear in no time if you are not careful. The whole issue becomes even more problematic for people who are not that familiar with Macbooks or have switched from another computer. And if you do not pay attention, it will not take too long before you have next to no storage space on the hard drive. Leaving only a few gigabytes of free space will significantly reduce the ...

   MACBOOK,APPLE,DATA STORAGE     2020-08-08 00:21:42

  10 notorious computer virus

The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...

   Computer virus,History,Security     2013-07-16 21:09:22

  First page of 2012

The tail of 2011 has gone through my heart silently, Year of 2012 is coming with mystery. Looking back to 2011 and looking forward to 2012, it's time to record something...In the past 2011, nothing specials happened in my life. At the beginning of 2011, I was a college student with full of passion, while at the end of 2011, I am an engineer with 5 month's working experience. At the beginning of 2011, I was struggling through my Final Year Project and job hunting, while at the end of 2011, I am p...

   2012,New year,Mayan,Summary     2012-01-01 05:19:32

  Necessary Elements for Developing a Website

Website has given businesses a great way to communicate with their existing customers. Without a user-friendly and attractive website, you may not receive as many customers as you may have expected prior launching your website. Therefore, it is usually advisable to outsource your web development services to one of the best web development companies in Singapore. Web development services in Singapore ensures proper development of your website without missing out on any important element. These a...

   WEB DEVELOPMENT SERVICES IN SINGAPORE     2015-09-30 07:07:27