Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Internet divide



  TIOBE : What's the future of C#?

TIOBE released the programming language index for August 2012, the top 3 programming languages are still C, Java and Objective-C. Objective-C still performs well after it ranked 3rd place last month, it's still rising. Is there any possibilty Object-C will overtake Java in the near future? However, Microsoft's C# doesn't look so good. C# is generally recognized as the enterprise language with most modern and expressive features available today and C# has shown more downward trends in the past an...

   TIOBE,August,C#     2012-08-13 14:48:11

  Features of Google Android 4.1 Jelly Bean

In today's Google IO 2012 in San Francisco, Google announced its new Android system Android 4.1 Jelly Bean. It's a whole new Android OS and many new features are added to it. Let's check out what new features are added to Jelly Bean.1.  Projector ButterIt uses VSync and Tripple buffering to improve the interactivity experience and increase frame rate. It makes Jelly Bean the fastest and smoothest Android ever2. New home screenYou can customize the home screen. You can re-size the home scree...

   Android, Google IO, Android 4.1, Kelly Bean     2012-06-27 12:49:49

  Web Security: In-Depth Explanation of X-XSS-Protection

What is X-XSS-Protection X-XSS-Protection is an HTTP response header designed to enable or configure built-in cross-site scripting (XSS) filters in certain versions of Internet Explorer, Chrome, and Safari. The purpose of these filters is to detect reflected XSS attacks in the response and prevent the loading of pages, thereby protecting users from such attacks. The X-XSS-Protection response header was initially introduced by Microsoft in Internet Explorer 8 to control the browser's XSS filter. ...

   X-XSS-PROTECTION,WEB SECURITY,CONTENT SECURITY POLICY,XSS,CSP     2023-11-29 01:48:40

  UDP vs. TCP

Introduction Hi, I’m Glenn Fiedler and welcome to the first article in my online book Networking for Game Programmers In this article we start with the most basic aspect of network programming, sending and receiving data over the network. This is just the beginning – the simplest and most basic part of what network programmers do, but still it is quite intricate and non-obvious as to what the best course of action is. Take care because if you get this part wrong it will have ...

   Game design,Networking,Communication,TCP,UDP,Design     2012-02-27 04:49:53

  Tencent released Q1 earning report of 2013

Tencent has released the earnings report of Q1 in 2013, the total revenue is $2.1611 billion which increases  11.5% compared to last quarter and increases 40.4% compared to the same time last year. The  profit is 649.4 million US dollars which increases 17.3% compared to last quarter and increases 37.4% compared last year.The three main profit generators are:1. Value-added services revenue of 1.7014 billion US dollars with an increase of 13.6% compared to last quarter and an increase o...

   Tencent,Earnings report,WeChat     2013-05-15 07:02:45

  JSP connect MySQL

To connect MySQL with Java Server Page(JSP). Some steps should be followed:Step 1: Download MySQL JDBC connector driver from the Internet. URL:  http://dev.mysql.com/downloads/connector/j/Step 2: Put the jar file downloaded in Step 1 in the Tomcat common lib folder and add this jar file to the CLASSPATH so that the JSP page can find the specified class.Step 3: Create the JSP page with MySQL connection : Example is shown below:        <% String driver="com.mysql.j...

   MySQL,JSP,Connection,Driver,Download     2011-05-11 10:04:57

  What does a contemporary web developer need to know?

The early ages of web era mainly consisted of webpages of text and links. At that time,Netscape was the still dominant of web browser market. As a web developer, you could develop web apps(or better to call web pages) easily with knowledge of HTML only. But with the evolution of web, new technologies came out, we can see more robust web apps around us everywhere. Today as a web developer, the ability to run and configure a web server and edit HTML to create some simple web pages has lost almost ...

   Web design,Advice     2013-12-20 06:31:51

  The Greatest Hacks of All Time

Reader's advisory: Wired News has been unable to confirm some sources for a number of stories written by this author. If you have any information about sources cited in this article, please send an e-mail to sourceinfo[AT]wired.com. In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company. With another noi...

   Hack,Greatest,All time     2012-02-29 05:05:42

  Marissa Mayer brings 2nd Googler to Yahoo

A week ago, Anne Espiritu who was responsible for Google's public relations before leaving Google joined Yahoo, she became the first Googler Mayer brought to Yahoo. According to CNBC's Jon Fortt on Twitter, Google's former project manager Patricia Moll Kriese also left Google, formally joined Yahoo! as Senior Director of Yahoo's corporate projects.Although this news has not been confirmed by both companies, Patricia Moll Kriese's personal page on LinkedIn revealed that she left Google in August,...

   Yahoo,Marissa Mayer,Googler     2012-08-10 13:38:15

  Recent Online Scams You Need to Know About

It’s easy to forget that the internet is a dangerous place and that it’s easy to become a victim. Everyone wants to think that they’re too smart to fall for online scams or obvious fraud. Yet actions speak louder than words, and 97% of people still struggle to identify a phishing scam. Awareness is critical in beating the cybercriminals. So here are examples of the latest online scams and tips on how to avoid becoming a victim of similar attacks. What are Online Scams? Online s...

   DATA SECURITY,VPN     2019-12-12 07:18:36