SEARCH KEYWORD -- Key-base cache
How Computers Boot Up
The previous post described motherboards and the memory map in Intel computers to set the scene for the initial phases of boot. Booting is an involved, hacky, multi-stage affair – fun stuff. Here’s an outline of the process: An outline of the boot sequence Things start rolling when you press the power button on the computer (no! do tell!). Once the motherboard is powered up it initializes its own firmware – the chipset and other tidbits – and tries to ...
The Balanced Developer
In preparation for a recent team offsite, I spent some time thinking about what I hold dear as a software developer. One idea I kept coming back to is the notion of balance. I see balance manifesting itself several ways in the work of a successful developer, some of which follow.Speed Versus QualityThe most obvious example is the balance of development speed and quality. When building software, it’s never a good idea to write code as fast as possible without any attention toward maintaina...
Balance,Software,Development,Speed,Quality 2011-11-15 03:02:19
Python FTP Server and Client
Distributed Log File Automated Archive System This week, we will introduce the automated compute cluster nodes' log automated archive system project and FTP Communication utility library module. Program Design Purpose: This project aims to create an FTP server & client lib program for file transfer and a files management system for log data synchronization. We will develop an automated log file archive system that regularly collects newly generated log files from multiple nodes in a compute...
Java Sequential IO Performance
Many applications record a series of events to file-based storage for later use. This can be anything from logging and auditing, through to keeping a transaction redo log in an event sourced design or its close relative CQRS. Java has a number of means by which a file can be sequentially written to, or read back again. This article explores some of these mechanisms to understand their performance characteristics. For the scope of this article I will be using pre-a...
Java,IO,Sequential,Blocking 2012-02-23 07:09:10
Turn on SecurityManager in Java
SecurityManager in Java is to check whether the application codes can access some restricted resource such as file, socket etc. This can be used in applications which have high security requirements. With this feature turned on, our system resources can be secured with only permitted operations. When JVM starts, it will first check whether the SecurityManager is on by checking the system property java.security.manager, if it's on, then an instance of SecurityManager will be created and it can be...
SecurityManager,enable,program 2013-12-16 05:03:53
How to project a phone screen to a PC in Windows 10
In this post, we will show you a simple way to project a phone to a PC in Windows 10. Windows 10 provides a feature called Project to this PC which allows to project other devices on a PC installed with Windows 10. Below are the steps for doing this. 1.Press Win + i key to open Windows Settings. 2. In System menu, click Project to this PC option. Then select either Available everywhere on secure networks or Available everywhere. 3. Now open your phone which you want to project. Ensure it connec...
PHONE,WINDOWS 10,WIRELESS PROJECTION 2020-03-06 19:53:40
Python Deserialization Attack Introduction: How to Build a Python Pickle Bomb
This article introduces an old and classic unsecured Python data serialization feature (the pickle library) and demonstrates how a red team attacker can exploit it to create a malicious binary or text data file that executes remote code or commands upon deserialization. The following attack flow diagram illustrates this process: We will follow 3 steps with the program code to show how Deserialization Attacks Work: [ Step1 ] Crafting Malicious Data: An attacker crafts a malicious payloa...
5 tips for selling your software company for maximum value
From the moment you start your software company, you should be developing an exit strategy. While you might have no plans to sell your business, things can go wrong, and you can find yourself in a position with no other option. In this case, having a plan to go to will make the entire process easier. If you do plan on selling, you should be constantly improving your exit strategy as your business evolves in order to ensure you sell your company for maximum value. Selling a software company can ...
TIPS,BUSINESS,SELLING,SOFTWARE BUSINESS 2017-11-14 03:44:52
How Charts Using Logarithmic Scale Provide Insight Into Your Business
In the dynamic realm of business, understanding data is as important as acquiring it. Analytical tools like charts, graphs, and tables aid in data comprehension. Among these tools, the necessary prowess of charts using logarithmic scale often goes unnoticed. Keep reading to know how this instrument can become a game-changer in your business analysis. Understanding Logarithmic Scale Before throwing light on its applications, it's crucial to understand the concept of a logarithmic scale. Unlike l...
LOGARITHMIC CHARTS,BUSINESS SOLUTION 2023-12-09 02:34:17
High performance web apps with C++
It is Christmas over here, and it is time of giving. So I decided to give something back to the community. I guess this is as old as web programming itself. Trying to create C++ web framework. If you search on the web, you can find dozen of guys that had exactly the same idea. I am not different. For one of the previous projects(discontinued now) I created simple web framework in C++. If you like to hack in C++, here it is. Code is provided as-is, as part of larger application. You can ex...
C++,Web apps,Web framework 2012-01-08 10:06:48
RECENT
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- Flows.network: Writing an LLM Application in Rust
- more>>