Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Remote access



  Discovery kills distribution: why the web needs a new leader

[Apple and Google have locked application discovery and distribution within their app stores. VisionMobile's Andreas Constantinou explains how Facebook is using the web to disintermediate Apple/Google and why the web needs a new leader].The platform duopoly.In just the space of 3 years, the mobile platforms landscape has changed from an election race to an oligarchy. The network effects at the heart of the Apple and Google business models have created formidable barriers to entry. The growth in ...

   Web,Leader,New era,Google,Apple,Mobile     2011-10-18 02:53:29

  Turn on SecurityManager in Java

SecurityManager in Java is to check whether the application codes can access some restricted resource such as file, socket etc. This can be used in applications which have high security requirements. With this feature turned on, our system resources can be secured with only permitted operations. When JVM starts, it will first check whether the SecurityManager is on by checking the system property java.security.manager, if it's on, then an instance of SecurityManager will be created and it can be...

   SecurityManager,enable,program     2013-12-16 05:03:53

  Device Experiences & Responsive Design

Most recently LukeW was the Chief Product Officer (CPO) and co-founder of Bagcheck which was acquired by Twitter Inc. in 2011. Luke is also the author of the book Mobile First and was Chief Design Architect (VP) at Yahoo! Inc. While the task of designing Web applications and sites for multiple devices can be daunting, two techniques can make the process more manageable: classifying device experiences and designing/building responsively. Here’s how these two approaches can work toge...

   User experience,Device,Responsive design     2012-03-31 00:10:31

  Google releases new app to improve the accuracy of indoor positioning

Google Maps, Bing Maps, and some map providers have offered indoor map service such as in  the airport, major shopping malls and stadiums for some time. The problem is that these indoor maps can not precisely tell you which floor you are on a map, the GPS obviously can not work very well in this environment, WiFi and GPRS positioning is not very precise. Google announced the improvement program of Google Maps for accurate indoor positioning. The current owners of these places will cooperat...

   Google Map,Indoor service,Positioning     2012-04-08 09:46:53

  MySQL index optimization

Problem description: We need to access a very big table which has 40 million records. In the table, id is the primary key and program_id is indexed. When executing a select query: select * from program_access_log where program_id between 1 and 4000 The above query executes very slowly, we thought it was because there were too many records in the table. So we added id in the where condition to limit the search so that each time only half a million records would be read. select * fr...

   MySQL,Index search, Partition     2012-12-26 13:14:20

  7 misunderstandings of DNS resolution

DNS resolution is generally considered as providing mapping between domain name and IP address, for example www.google.com maps to 74.125.71.103. There are two important reasons for doing DNS resolution: IP address is hard to remember, while domain name is human friendly Virtual host may access different contents according to the header of the host domain name(sub-domain name) Some webmasters may have some unreasonable requirements when doing DNS resolution. It mainly because they are not very...

   DNS resolution,misunderstanding     2012-10-20 12:57:16

  Do American teenagers hate Facebook?

PewInternet released latest survey report about Internet and life. The report shows that Facebook is still the favorite social network of American teenagers, but it's also the most criticized one. Although some people enjoyed staying on Facebook, most people are complaining that there are more and more adult contents and negative social interactions on Facebook. The key findings are: Teens are sharing more information about themselves on social media sites than they did in the past. Teen Twitte...

   American teenage,Facebook,Survey     2013-05-26 10:37:40

  Pointers, arrays, and string literals

A recently posted question on Stack Overflow highlighted a common misconception about the role of pointers and arrays held by many programmers learning C.The confusion stems from a misunderstanding concerning the role of pointers and strings in C. A pointer is an address in memory. It often points to an index in an array, such as in the function strtoupper in the following code:void strtoupper(char *str) { if (str) { // null ptr check, courtesy of Michael while (...

   char pointer,initialization,literal,cann     2011-09-22 13:29:23

  Getting the most out of your pixels - adapting to view state changes

In Windows 8, your apps run on a variety of screen sizes and under various view states. A user might have your app snapped to the side of a 25-inch desktop monitor, or fill the whole screen of a 10-inch widescreen tablet. In each case, you want your app to take full advantage of the available space. In this post, I show you how you can track the current size and view state of your app in code, and give you tips on how to write your app in the Windows 8 Consumer Preview to handle screen si...

   Windos 8,Metro,Resolution,Style     2012-04-23 06:13:02

  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10