Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Operating System



  Ruby WinRM undefined method `split' for nil:NilClass

WinRM service is a service provided by Windows to enable remote access a Windows system. It is similar to what SSH is for *nix. And it is frequently used in applications which want to automate process or accessing remote Windows system and perform actions on them. Ruby also provided the WinRM gem which is an implementation of the WinRM service.  When using WinRM gem, one may often want to use :negotiate as the transport protocol for authentication. This transport will negotiate using d...

   RUBY,WINRM,INIT_AUTH,PROXY     2017-03-08 02:21:09

  Top 9 Web Design Trends in 2020

To stay in demand, a top-level design agency must be aware of the current trends. This will improve their professional skills, help them to keep an eye on the latest events, and offer the clients relevant models that will increase conversion, website traffic, and customer loyalty. Read on to find out which nine web design trends are popular in 2020. UL animation There is a stereotype that it makes no sense to develop a complex, high-quality animation because it will not be supported by devices w...

   WEB DESIGN,UX     2020-09-04 10:06:52

  Standardizing Python WSGI deployment

Over the past year I have been testing all of the new python platform as a service companies that have popped up, and I have posted my notes on my blog so that everyone can learn from my experiences. ep.io, apphosted.com, gondor.io, dotcloud.com, DjangoZoom.com, Heroku, Django hosting roundup, All and all, the platforms were very similar, they allowed you to easily host your python/django project without having to worry about managing a server or other typical system administr...

   Python,Standard,WAR,Java     2011-12-31 15:39:44

  Kubernetes Authentication & Authorization 101

If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αὐθεντικÏŒς authentikos, “real, genuine”, from αὐθέντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...

   RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES     2021-06-05 23:19:18

  4 Technologies That Impact You (Without Your Knowledge)

Our world to day is so driven by technology that it’s easy to stay on top of the major changes and developments. We know when there’s a major new innovation in personal electronics; we know that the 5G network is rolling out this year; we track the progress of smart cars, learning thermostats, and interactive home speakers. We even tend to care about how major tech companies around the world are performing! However, as “plugged in” as we all seem to be to the world of tec...

   AI,DATA ANALYTICS,IOT     2020-04-16 06:35:54

  Never create Ruby strings longer than 23 characters

Looking at things through a microscopesometimes leads to surprising discoveries Obviously this is an utterly preposterous statement: it’s hard to think of a more ridiculous and esoteric coding requirement. I can just imagine all sorts of amusing conversations with designers and business sponsors: “No… the size of this <input> field should be 23… 24 is just too long!” Or: “We need to explain to users that their subject lines should be les...

   Ruby,Specification,String,Interpreter,Optimization,23     2012-01-05 07:58:07

  What can .htaccess file do?

A .htaccess file is a directory-level configuration file supported by several web servers, that allows for decentralized management of web server configuration. What can a .htaccess file do? We summarized some of them here.  Hope it may help you. 1. Timezone settingSometimes when you use date() or mktime() functions in PHP, , it may display some weird information because of the timezone difference. For example, one possible warning is :Warning: date(): It is not safe to rely on the syste...

   .htaccess,setting,tip     2012-06-15 06:39:39

  How Is The POS Machine Conquering The Market Economy?

  In today's market, cash is losing its importance. Online transactions have taken over the market with credit cards, and debit cards used a lot by the customers. You are way behind your times if you still use just cash for your business and do not have a credit card machine. For all those businessmen, who do not have a credit card machine, here's a list of benefits that a credit card machine offers you. Knowing these benefits will help you in getting into the market by accepting cashless ...

   POINT ON SALE MACHINE,ONLINE PAYMENT     2018-11-23 03:25:14

  Android and Security

The last year has been a phenomenal one for the Android ecosystem. Device activations grew 250% year-on-year, and the total number of app downloads from Android Market topped 11 billion. As the platform continues to grow, we’re focused on bringing you the best new features and innovations - including in security.Adding a new layer to Android securityToday we’re revealing a service we’ve developed, codenamed Bouncer, which provides automated scanning of Android Market ...

   Android,Security,Android Apps,App market,Bouncer     2012-02-03 08:03:51

  Understand unsafe in GoLang

Before going to understand unsafe package in GoLang, the first thing needs to talk about is the pointer in GoLang. If you have a background of C language, you must know what pointer means and its usage. With pointer, you are free to operate any data at memory level which means you have great power, but this means that you have great responsibility as well. That's why it might be considered unsafe in lots of cases. Take a look at a simple example of doubling an integer. package main import "fmt"...

   GOLANG,UNSAFE,ZERO-COPY     2020-03-14 23:18:00