Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Remote access



   How to Calculate Distance in Asp.Net MVC with Google Maps

Internet users are vastly dependent on both Google and Bing mapping tools. The API available for developers provides them an ability to add value to the solutions developed by them.There is no such requirement of using everything. There are times when only a snippet can make a big difference to the app users. In this article, asp.net development experts will explain how to use Google Maps APIs and help office staff to calculate distance. When a team is travelling for the job, they either ride on...

   ASP.NET MVC     2017-03-10 06:29:23

  The iFOREX Trading App is First Class

If you have searched the web for trading application reviews, you are bound to hear terms like ‘state of the art’ and ‘lightning fast execution’. The real question you should ask is - Can you trust the broker who will facilitate your trading to provide you with a robust platform that has several tools that will allow you to successfully trade. You want to make sure that the platform is intuitive and does not take weeks to learn how to use.   The iFOREX trading platfo...

   APP,TRADING,IFOREX     2018-12-20 08:07:35

  Statistics on StackExchange

StackExchange is the most popular and professional IT Q&A site, Under StackExchange, there is StackOverflow and other sub sites. Many of us may wonder how this mega site is maintained and what its performance is. A performance page has been released by StackExchange recently. Below is some statistic about this mega site. 560 million page views per month, i.e around 1.9 million PVs per day. For such as big site, it has only 9 web servers and 4 SQL servers(while two of them are in backup mode...

   Stackoverflow,statistic     2015-01-05 02:47:01

  Proximity Cards Do More Than Just Open Doors

Credit: Susanne Plank via Pexels Locksmiths from centuries ago couldn’t have possibly imagined opening a door by tapping a card roughly the size of a credit card. Back then, security depended on physical locks, not sealed antennas made from coiled wire, integrated circuits, and capacitors. Today, proximity cards are a popular form of keycard used in hotels, government buildings, healthcare facilities, and many more places. They open doors for people with authorized access, but they also d...

   LOCK,PRINTING     2024-04-11 22:04:07

  Check file readability in Java

File operation is quite platform dependent. Although Java is a cross platform programming language, the file operation in Java is also platform dependent. The obvious evidence is the file permission check. In Java, we can call canRead(), canWrite() and canExecutable() to check whether the program can read, write or execute the file specified. However, on Windows, when we call canRead() on a File object, we may get unexpected result. Actually, on Windows, when we call canRead() on a File object, ...

   Java,Files,Readable,Check     2013-12-05 06:10:15

  XMLHttpRequest Level 2 user guide

XMLHttpRequest is a web browser interface, it makes it possible for JavaScript doing HTTP(s) communication. Microsoft's IE5 first introduced XMLHttpRequest, because it's so useful that many other browsers also adopted this. AJAX came to the front since. However, this interface is not standardized, implementation among different browsers is different, with the emerging of HTML5, W3C is considering to standardize this interface. In February 2008, they proposed a XMLHttpRequest Level 2 draft. This ...

   XMLHttpRequest, progress, upload, binary data     2012-09-19 11:51:50

  Introduction to OAuth (in Plain English)

Last week we talked about giving away your passwords and how you should never do it.  When a website wants to use the services of another—such as Bitly posting to your Twitter stream—instead of asking you to share your password, they should use OAuth instead. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password. This is a quick guide to illustrate, as simply as possibl...

   Security,OAuth,Permission,Partial access     2012-04-05 11:39:54

  Different module types in Java 9

Java 9 is going to introduce a disruptive change to the Java platform -- Module System. The module system will change how Java applications work in the future. It's like changing the foundation of a house without impacting the house functionality and its top level structure. This obviously is a big challenge for the whole Java community.  To bring as little pain as possible to migrate existing applications to Java 9 without refactoring the whole application, Java 9 will introduce a few diff...

   JAVA,JAVA 9,JIGSAW,MODULE SYSTEM,UNNAMED MODULE,AUTOMATIC MODULE,NAMED MODULE     2016-04-15 07:15:23

  Twitter OAuth the easy way – simple post to twitter script

After Twitter introduced mandatory authentication with OAuth, many of the current scripts for posting content to Twitter don’t work anymore. OAuth can be great for more advanced authentication, but for a simple post to twitter script, it seems like a little overkill. In this post you’ll learn how to create a simple script that uses a quick and dirty version of OAuth for posting new tweets to Twitter. How to create a simple script Simplified, Twitter OAuth involves sending both ap...

   Twitter,OAuth,PHP,Auto tweet     2012-02-25 12:51:07

  Clean Code Versus Great Code

I've had some interesting discussions with other developers about writing code recently. I often have the impression that some developers put too much emphasis on clean code. Don't get me wrong, i strive for clean code as well, and have written about its importance quite a lot in the past couple of years. But when i'm coding, clean code is my secondary goal and it could never take the place of my primary goal: making it work. And preferably, i want to make it work great. A lot of people love t...

   Code,Clean,Excellent,High quality,Compar     2011-08-10 03:27:08