Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Knowledge transfer



  Database Testing – Practical Tips and Insight on How to Test Database

Database is one of the inevitable parts of a software application these days. It does not matter at all whether it is web or desktop, client server or peer to peer, enterprise or individual business, database is working at backend. Similarly, whether it is healthcare of finance, leasing or retail, mailing application or controlling spaceship, behind the scene a database is always in action. Moreover, as the complexity of application increases the need of stronger and secure database emerge...

   Database,Tips,Practice     2011-06-29 08:47:40

  Introduction to DTLS(Datagram Transport Layer Security)

Secure communication has become a vital requirement on the Internet. Lots of information transferred through the Internet are sensitive data such as financial transactions, medical information, media streaming etc. To ensure security of data transferred on the Internet, a few secure protocols have been designed including SSL/TLS and IPsec. Many large websites in the world have adopted TLS. Apart from SSL/TLS, there is some other protocol designed to be used in special cases. One of them is ...

   JAVA 9,DTLS,TLS,SECURITY     2016-04-02 05:55:36

  Difference between keystore and truststore

Security has become a vital concern in most of the online transactions nowadays. Lots of the world's most popular websites have adopted security protocols to transfer data, especially sensitive data. These security protocols including SSL/TLS which are using the private/public key exchange mechanism to establish secure connections.  The private/public key cryptography is a really important invention and it allows data to be transferred securely and solves the big problem of transferrin...

   KEYSTORE,TRUSTSTORE,SECURITY,SSL     2017-03-04 07:52:47

  Proximity Cards Do More Than Just Open Doors

Credit: Susanne Plank via Pexels Locksmiths from centuries ago couldn’t have possibly imagined opening a door by tapping a card roughly the size of a credit card. Back then, security depended on physical locks, not sealed antennas made from coiled wire, integrated circuits, and capacitors. Today, proximity cards are a popular form of keycard used in hotels, government buildings, healthcare facilities, and many more places. They open doors for people with authorized access, but they also d...

   LOCK,PRINTING     2024-04-11 22:04:07

  32-bit vs 64-bit

I have knowledge on 32-bit vs 64-bit, but not very clear minded. Here is a good article I found about it. http://www.techsupportalert.com/content/32-bit-and-64-bit-explained.htm   Understand there are 3 things involved: CPU, OS and application. To work on 64-bit, first thing first is: you need a 64-bit CPU. 64-bit CPU usually provide emulation for 32-bit system. Though some 32-bit application still cannot run on 64-bit OS, because they might contain 16-bit code. 32-bit system won't have com...

       2015-12-08 03:04:01

  The significance of coding competition to actual work

Some friends asked this question: In secondary schools we participate in the NOI, in university we participate in ACM/ICPC, TopCoder.What's the significance of coding competition to actual work? I participated in the NOI from 1994 to 1996, ACM/ICPC from 1999 to 2000 and TopCoder in 2002 for six months. Later I paid little attention to coding competition, so I may not understand the changes in recent years and race mode . The capabilities we can get by participating the competition can be summari...

   ACM,Programming,Facebook,TopCoder     2013-02-28 20:38:23

  Is Scala Only for Computer Scientists?

I have experience struggling through these kinds of things andI know enough about the subject that I can understand why they did it that way. But my concern is that this should be an example that a beginner could understand, and they can't. There's too much depth exposed. Here's the example, which is written as a script: import scala.io.Source._ case class Registrant(line: String) { val data = line.split(",") val first = data(0) val last = data(1) val email = data(2) val payment = da...

   Scala,Application field,Computer science     2012-02-17 07:46:40

  Let's talk about JavaScript deep clone

In JavaScript, deep clone means creating a brand new object that includes all nested objects, with all properties being completely independent copies. This is different from shallow copying, which only copies the first-level properties, with nested objects being referenced rather than copied. There are multiple ways to perform deep copying in JavaScript, but the best one to use depends on the specific use case. Can use JSON.parse & JSON.stringify? ❌ JSON.parse(JSON.stringify(obj)) is a dep...

   JAVASCRIPT,DEEP CLONE     2023-02-25 08:57:11

  C++ for the Real-Time Web

C++? Why on Earth? C++ seems like one of the least likely languages to write a web application in. C++ is associated with complexity, both with language design and the need to manually manage memory. Programming in C++ unleashes a whole class of bugs associated with memory corruption and memory allocation. This is a trade off for giving more power to the developer along generally being much faster than equivalent programs in languages such as Python or Ruby. Real-time Web as a Use Case Making...

   C++,Web development,Real time     2012-01-30 06:00:20

  How iPhone App Developers Will Get Benefited by iOS 11?

At Apple WWDC 2017, the CEO Tim Cook introduced the next generation of iOS, i.e., iOS 11. Various improvements and innovations included in iOS 11 were discussed. And what one can say from the whole is that this year’s WWDC keynote was more developer-oriented than user-oriented. It was, indeed, an assistance to the iPad and iPhone app developers to create more innovative mobile apps, and serve users for lifetime.  If you are an iOS app developer or working at an iPhone app development...

   APPLE,IPHONE APP DEVELOPERS,IPHONE APP,IPHONE,MOBILE APP     2017-06-14 06:17:22