Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- PROXY



  On testers and testing

Over the years, I’ve come to hold some strong. opinions on testing, testers and the entire business of quality assurance. Inspired by this post on Facebook’s testing, I wanted to write this down so I can point people to it. Some of this is controversial. In fact, even mentioning some of this in conversation has caused people to flip the bozo bit on me. Most product teams don’t need a separate testing role. And even if they do, the ratio of full time dev:full time te...

   Software tester,Testing,Development,Understanding     2012-01-08 10:00:49

  The First Bite on etcd Code

Etcd, one of the crucial components of Kubernetes. If APIServer is the heart, then etcd is the blood vessel that sends the end state of Kubernetes resources to various “organs”, providing high-speed, stable storage, and supporting APIServer’s high load performance. What if the etcd is not working properly? Just the condition as someone has a vascular disease. The deeper you know about them, the better diagnose you can make when issues occur. from unspl...

   SOURCE CODE,ETCD     2022-02-12 01:03:14

  Java development company briefs about Lazy and Eager fetch in JPA/Hibernate

Normal 0 false false false EN-IN X-NONE X-NONE

   JAVA,JAVA DEVELOPMENT COMPANY,LAZY FETCH,EAGER FETCH,JPA,HIBERNET     2016-07-08 06:08:28

  Techies: Let's Not Forget Brain Hacking

A close-up of a jellyfish

Description automatically generated with low confidence Credit: SergeyNivens via Canva The world of cyber security never fails to surprise us with bolder and more sophisticated cyber-attacks and...

   HACKING     2022-02-03 21:43:11

  8 very useful and free web security testing tools

With more pervasive of web applications, web security threats are becoming increasingly prominent. Hackers gain web server control by exploiting web server vulnerabilities and SQL injection vulnerabilities, then they may tamper with web content, or steal important internal data, the more serious is to inject malicious code into web pages to affect visitors of websites. Attention is gradually warming up to Web Application Security. Here we recommend eight very useful and free web security testing...

   Website, security,Web security,Attack     2012-07-22 10:59:09

  Build RPM package on Linux

1. Check the OS version and core version #uname -a #more /etc/redhat-release 2. Create relative directories /usr/src/redhat/SOURCES    //Store source codes, patches, icons etc /usr/src/redhat/SPECS        //Store specs about the process of building RPM packages /usr/src/redhat/BUILD     //File after uncompressed are stored here /usr/src/redhat/RPMS     //Store the binary files built with rpmbuild /usr/src/redhat/SRPMS&nbs...

   RPM,Linux,Build     2013-03-22 12:44:29

  Taking Precautions to Avoid Shady VPN Providers

VPNs or virtual private networks are virtual tunnels that obscure your IP address, routing your internet traffic through a server located in a country of your choice, in an encrypted and anonymous way. Using a VPN allows you to: secure your sensitive data from hackers obscure the IP address so you can see content not available in your country avoid websites you routinely surf (e.g., Facebook) noticing a different IP address when you are traveling, and asking you to verify your identity bypass t...

   VPN,NETWORKING     2019-02-19 07:26:26

  Cracking Siri

On October 14, 2011, Apple introduced the new iPhone 4S. One of its major new features was Siri, a personal assistant application. Siri uses a natural language processing technology to interact with the user.Interestingly, Apple explained that Siri works by sending data to a remote server (that’s probably why Siri only works over 3G or WiFi). As soon as we could put our hands on the new iPhone 4S, we decided to have a sneak peek at how it really works.Today, we managed to crack ...

   Siri,Cracking,Defect,Speech to text,Record,AI     2011-11-15 08:38:23

  Meta tag in HTML header

In server response, we can use response.setHeader() to set the meta information in header of a HTML page. The usage is response.setHeader(name,context); meta is used to simulate the response header of HTTP protocol in HTML page. It should be put between the <head> and </head> tag. 1. <meta name="Generator" content="" > <!--This is to specify the tool which generates this page such as Microsoft FrontPage 4.0 etc --> 2. <meta name="keywords" content=""> <!-- To tel...

   HTTP,meta,HTML,head     2013-05-22 11:34:08

  C++ Versus Objective-C

What will programming in Objective-C mean to the C++ programmer Different Object Oriented Languages Almost all of us have heard the term object oriented programming, and most of us have used C++. How will Apple's purchase of NeXT, and NeXT's framework using Objective-C affect us as we develop software? If we know C++ already, how hard will it be to get up to speed on Objective-C? Many people will agree that once they understand the concepts of object oriented programming it doesn't matter...

   C++,Objective-C,OOP,Comparison,Methods,Philosohpy     2011-12-12 07:51:40