Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Hardware



  Android Hardware Buttons are not broken, let me tell you why

This post is written as a reaction on Christoffer Du Rietz’s article The Android Hardware-Buttons Are Broken. In his article Christoffer explains how the Android back button shows inconsistent behavior like doing different actions when it is used on the same screen.In the following article I will try to explain that this behavior is not broken. Instead it is exactly what the Android developers had in mind while designing the back button behavior.The way the back button is broken according...

   Android,Hardware,Button,Protect     2011-11-03 13:38:21

  TIOBE : No news today

TIOBE released the programming index for September 2012. There is no big change for this month compared to last month, the top 3 are still C, Java and Objective-C. In top 20, only Transact-SQL exchanged the position with VB.NET. Java shows trend of drop, will it be worse because of the ignorance of Java's vulnerabilities by Oracle. This index shows that the programing lnaguage market is quite normal, no big events. Except Objective-C, in recent years there are no other new languages which have b...

   TIOBE,Objective-C,Index     2012-09-05 07:36:07

  A Toast to C

At Cloudmetrx, we use a lot of C. So given the recent passing of UNIX legend Dennis Ritchie, the creator of the C language, we think a toast to C is only fitting.Our extensive reliance on C is especially unusual considering the other languages in our stack – Clojure, Node.js, and other hipster platforms. We aren't predisposed to using older, "venerated" technologies simply because they're older and venerated. But when it comes to high-performant computation, there's just nothing like C. S...

   C,Toast,C Language,Unix,Dennis ritchie,popularity     2011-10-24 11:21:32

  Intel disclosed more configuration details of Win8 Tablet PC

Intel disclosed more hardware configuration information for future Windows 8 Tablet PC in a conference in Beijing on Thursday  Tablet PC equipped with Microsoft new operating system is expected to be released in the second half of this year.Intel shows a Win8 Tablet PC model with Clover Trail platform Atom Z2760 processor, the dual-core processor support "burst mode" (burst mode, when needed to quickly improve performance) and Hyper-Threading Hyper-Threading can make dual-core chips in some...

   Intel,Win8 Hardware comfiguration     2012-04-14 00:20:47

  How Java Application Developers Can Build Secure Internet Based Apps?

There are few compiled solution tested by experts to guide Java application development and maintenance team how they can start safe journey on Internet. Strong encryption, wise passwords, secure hardware are few of the tech tools that should be used by Java app development team to secure their Internet based apps.   The Internet is most amazing yet most risky platform where nobody knows either they are doing safe transaction on Internet or there is some dog watching out for data packets t...

   JAVA APPLICATION MAINTENANCE,JAVA APPLICATION DEVELOPMENT     2015-09-16 02:13:17

  People working with computers seem to have a lot of spare time

People working with computers are a group of people who spend much time on communicating with PCs, Handsets and other programmed hardware devices. Usually, these people are thought as a group of busy people. When we see them, they are often sleepy and seem not caring about anything else. They often work day and night, spend many hours on finding and fixing an unknown bug or trying to meet the project deadline  Are they really so busy?  Lets see what some people think about them? Just f...

   Programming,Busy,Spare time,Fun     2012-05-01 07:06:51

  Samijyon : A tablet from North Korea

According to Sina Tech, North Korea Tech posted an article about Samijyon. Samijyon is a model of Android  tablet manufactured by North Korea. You can buy it with $200 in North Korea. Smajiyon's hardware configuration is as good as Samsung and Apple, but it doesn't allow WiFi connection and ordinary North Koreans cannot connect to Internet as well, users can only connect to domestic network of North Korea. On this tablet, there are no built-in Google apps such as Gmail and Google Play. But...

   Samijyon,North Korea,Tablet     2013-08-03 22:01:35

  The Five Stages of Hosting

As a proud VPS survivor, I thought it might be fun to write up five common options for hosting a web business, ranked in decreasing order of 'cloudiness'. People who aren't interested in this kind of minutia would be wise to pull the rip cord right here. 1. The Monastery You run your site on an 'application platform' like Heroku, Azure, or Google App Engine. You design your application around whatever metaphors and APIs the service lays out, and in return you are veiled from all t...

   Website hosting,Recommendations,Stages,Advantages     2012-01-30 05:43:42

  Android hardware fails more than iPhone, BlackBerry; repairs cost carriers $2 billion

Repairs to Android smartphones cost wireless carriers $2 billion per year according to a new year-long WDS study that tracked 600,000 support calls around the globe. Android’s popularity and the introduction of a number of low-cost smartphones has put a strain on the wireless business model, WDS noted in its report. “Deployment by more than 25 OEMs and lower-cost product coming to market is leading to higher than average rates of hardware failures and, in turn, return and repair cos...

   Android,iPhone,Blackberry,Hardware,Cost     2011-11-03 13:26:42

  How to secure an Ubuntu Apache web server

Securing server software is not a straightforward task. Not all of our operating environments are the same, leading to a variety of potential security vulnerabilities. However, using a few basic configuration and security options, you can stay a little ahead of where you want to be. 1. Fail2ban Fail2ban is a Python-based intrusion prevention software that detects and blocks malicious IP addresses from multiple unsuccessful attempts at software logins. In other words, if someone is attempt...

   Unix server security,Log,.htaccess,Cache     2011-12-27 09:25:32