Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- PACKAGE CONTROL



  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10

  Emacs adventures

I have been using Emacs for over a year now. I actually didn’t learn a lot when I started using it (just the basics to get going and then some relatively common keyboard shortcuts), but lately I have been reading and learning much more about it. I’m so grateful by everything I’ve learned from different people on the net that I wanted to share a couple of things I’ve learned, and a simple major mode for editing AsciiDoc documents. As a long-time VIM user, I f...

   Editor,Linux,Emacx,VIM,Shortcuts     2011-11-30 11:56:49

  3 preconditions for Facebook to enter China

It's well known that Mark Zuckerberg has a big interest in the Chinese market. Recently, the founder of Facebook visited China to attend a development forum held by the Chinese government. Along with the trip, he also paid a trip to some famous places in Beijing such as The Great Wall. He even did a morning run in front of the Tian'an men Square, the symbol of China.  In past few years, Zuckerberg also learned Chinese and read Chinese books, showed his love to the Chinese culture....

   FACEBOOK,CHINA,MARK ZUCKERBERG     2016-03-25 01:32:51

  Polymorphism in OOP programming

Polymorphism is the capability of an action or method to do different things based on the object that it is acting upon. This is the third basic principle of object oriented programming. Overloading, overriding and dynamic method binding are three types of polymorphism. Overloaded methods are methods with the same name signature but either a different number of parameters or different types in the parameter list. For example 'spinning' a num...

   Java,OOP,Polymorphism,Overloading,Overri     2014-10-23 08:11:50

  DESIGNERS NEED ENGINEERS

Like so many of you, I’ve been indulging in the amateur analyses all over the web about why Steve Jobs, p.b.o.h., was so great. The recurring message is pithily summarized by Mathew Ingram: “Technology is the least important thing about Apple products”.Bullshit. The reason why Apple manages to build such magnificent products is because design and usability drive the engineering, yet the technology behind their products is by no means trivial. Apple cares a ...

   Engineer,Designer,Relationship     2011-10-24 11:54:53

  Find files by size in Linux

In Linux systems, you may encounter a situation where there is no enough space on the system while you are trying to install some new packages or writing some data. In this case, you may want to clear some unneeded files. A frequent need will be find the largest files in the system so that they can be deleted first and disk space can be released quickly. In this post, we will show a simple command to find files by size so that we know what files are taking the specified space on the system, This...

   LINUX,FILESIZE,FIND     2020-04-25 08:02:45

  5 Lightweight PHP Frameworks For Creating An API

PHP is undoubtedly one of the most popular programming languages that offer a wide range of lightweight frameworks for building basic websites to REST APIs. These frameworks are powerful tools that have the potential to enhance productivity in order to deliver faster results without getting distracted from the best practices of development. Developing REST APIs with plain PHP is a tedious and time-consuming process. In order to sort this out, you only need to hire php developers who have a niche...

   PHP,API     2018-10-22 07:55:34

  Web Security: In-Depth Explanation of X-XSS-Protection

What is X-XSS-Protection X-XSS-Protection is an HTTP response header designed to enable or configure built-in cross-site scripting (XSS) filters in certain versions of Internet Explorer, Chrome, and Safari. The purpose of these filters is to detect reflected XSS attacks in the response and prevent the loading of pages, thereby protecting users from such attacks. The X-XSS-Protection response header was initially introduced by Microsoft in Internet Explorer 8 to control the browser's XSS filter. ...

   X-XSS-PROTECTION,WEB SECURITY,CONTENT SECURITY POLICY,XSS,CSP     2023-11-29 01:48:40

  Different module types in Java 9

Java 9 is going to introduce a disruptive change to the Java platform -- Module System. The module system will change how Java applications work in the future. It's like changing the foundation of a house without impacting the house functionality and its top level structure. This obviously is a big challenge for the whole Java community.  To bring as little pain as possible to migrate existing applications to Java 9 without refactoring the whole application, Java 9 will introduce a few diff...

   JAVA,JAVA 9,JIGSAW,MODULE SYSTEM,UNNAMED MODULE,AUTOMATIC MODULE,NAMED MODULE     2016-04-15 07:15:23

  The False Ideals of the Web

WE who love the Internet love the fact that so many people contribute to it. It’s hard to believe that skeptics once worried about whether anyone would have anything worthwhile to say online. There is, however, an outdated brand of digital orthodoxy that ought to be retired. In this worldview, the Internet is a never-ending battle of good guys who love freedom against bad guys like old-fashioned Hollywood media moguls. The bad guys want to strengthen copyright law, and make ...

   Web,False idea,Free,SOPA     2012-01-19 10:24:25