Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Process



  The war with spam comment

Spam comments are annoying and notorious. They are either malicious data from hackers to exploit the loopholes of the site or advertisements posted by robots. These kinds of comments have their own features and patterns, if we are careful enough, we can find ways to block most of them although it's not so easy. To block the comment with malicious executable codes such as JavaScript, we should remember one rule : never trust user input. So wherever there are user inputs, we need to check the vali...

   Spam comment,Block,Filter     2013-11-29 20:29:43

  Difference between keystore and truststore

Security has become a vital concern in most of the online transactions nowadays. Lots of the world's most popular websites have adopted security protocols to transfer data, especially sensitive data. These security protocols including SSL/TLS which are using the private/public key exchange mechanism to establish secure connections.  The private/public key cryptography is a really important invention and it allows data to be transferred securely and solves the big problem of transferrin...

   KEYSTORE,TRUSTSTORE,SECURITY,SSL     2017-03-04 07:52:47

  Permutation algorithm with JavaScript

In secondary school, we have learned permutation. Basically, for n numbers, the number of permutations for these n numbers can be calculated to n! which is called 'n factorial'. But to display all the permutations on the screen, we need to use a recursive function. The problem is how to write this function.  Next I write a program to display the permutations for n numbers with JavaScript. First, we need to understand that from these n numbers, we can first take any one number from it, and t...

   JavaScript,Permutation,Algorithm,Impleme     2011-09-21 12:02:35

  Different types of keystore in Java -- JCEKS

JCEKS stands for Java Cryptography Extension KeyStore and it is an alternative keystore format for the Java platform. Storing keys in a KeyStore can be a measure to prevent your encryption keys from being exposed. Java KeyStores securely contain individual certificates and keys that can be referenced by an alias for use in a Java program. The process of storing and loading different entries in JCEKS is similar to what JKS does. So please refer to the article Different types of keystore in Java -...

   Java,KeyStore,JCEKS,Tutorial     2015-01-05 00:30:56

  Rails and Web Development - Take the First Step

Getting started with web development isn’t easy. Looking back to when I started, the first few weeks were the toughest to stick with it. For someone who is new to text editors and the terminal – the installation process can be really overwhelming. I recently went through the process of helping some of my friends get set up with Ruby on Rails and after doing it a few times, I realized it would be helpful to write a post that others looking to get started could refer to.The following...

   Web design,Rail,Ruby,Ruby on Rails     2011-10-17 11:16:51

  My secret Hobby: Applying for jobs

I have a probably unusual habit: I'm applying for jobs as programmer at least once a year. It 's not that I don't have a job, or that I don't like what I do, but since I am self employed and running my own company I have the feeling that I am coming out of touch of what the current job market is like, and so I started to apply for jobs at different companies once in a while. Just to keep in mind how this is like and for the fun of it.I think this is also a good training should I need to be emplo...

   IT,Career,Hobby,Job,How to     2011-08-26 02:41:47

  How key-based cache expiration works

There are only two hard things in Computer Science: cache invalidation and naming things — Phil Karlton Doing cache invalidation by hand is an incredibly frustrating and error-prone process. You’re very likely to forget a spot and let stale data get served. That’s enough to turn most people off russian-doll caching structures, like the one we’re using for Basecamp Next. Thankfully there’s a better way. A much better way. It’s called key-based cac...

   Cache,Expiration,Key-base cache,Work     2012-02-20 05:32:40

  How multitasking really works on Android and iOS

As the horsepower packed into mobile devices gets ever greater, more full-featured forms of multitasking are possible. The market leaders have very different ways of going about things, and there are numerous misconceptions about what is going on behind the scenes. This isn’t all the fault of the user, though. In the interest of ease of use, sometimes the multitasking metaphor is overly simplified on both Android and iOS. iOS: It’s more complicated than it looksEver since iOS...

   Android,iOs,Multitasking,Task bar     2012-01-06 09:58:09

  Binary tree iterator algorithm

Binary tree pre-order,in-order and post-order traversal are basics in algorithm and data structure.And the recursive binary tree traversal is a classical application of recursion. We define a binary tree node as : // C++ struct Node { int value; Node *left; Node *right; } In order binary tree traversal can be: // C++ void inorder_traverse(Node *node) { if (NULL != node->left) { inorder_traverse(node->left); } do_something(node); if (NULL != node->righ...

   Binary tree,Iterator,Traversal     2013-07-14 21:51:09

  6 Promising Ways by Which You Can Enhance the App Testing Process

Now mobile application industry is exploding with application demands more than ever. According to the latest mobile app technology news the integration of mobile application service with enterprise business is main cause app developing companies are booming. But with this tremendous demands, competition heats up in market and clients are impatient to get the results.   This pressure of a deadline and impatient client,  most times becomes a burden to the developing and QA departm...

   TECHNOLOGY,MOBILE APP,APP DEVELOPMENT,APP TESTING,MOBILE APP TESTING     2017-04-17 08:02:07