Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- SAP CLOUD PLATFORM



  Google feels the threat from Samsung

In response to Apple's iOS system, Google and Samsung stood on the same side. But with the increase of market share of Samsung Android devices, Google begins to feel the threat from Samsung.On MWC in Barcelona, a group of business executives said Google increasingly worried about Samsung after a private party. Because its equipment has occupied 40% of the Android devices, which could erode the Google advertising service. Google hopes manufacturers such as HTC and HP can challenge Samsung.It is r...

   Google,Samsung,Android     2013-02-27 21:12:17

  Different types of keystore in Java -- JCEKS

JCEKS stands for Java Cryptography Extension KeyStore and it is an alternative keystore format for the Java platform. Storing keys in a KeyStore can be a measure to prevent your encryption keys from being exposed. Java KeyStores securely contain individual certificates and keys that can be referenced by an alias for use in a Java program. The process of storing and loading different entries in JCEKS is similar to what JKS does. So please refer to the article Different types of keystore in Java -...

   Java,KeyStore,JCEKS,Tutorial     2015-01-05 00:30:56

  Time Warner invests on Maker Studios

According to ATD, the start-up Maker Studios which specializes in the creation and distribution of YouTube video clips, will get a $40 million investment from investors where media giant Time Warmer is the lead investor.Maker Studios is an video clip creation and distribution of start-up headquartered in Los Angeles. According to its website, this media company's mission is to act as a bridge between YouTube and TV institutions. The program subscribers on YouTube over 80 million, over one billi...

   Maker Studios, video subscription,YouTube     2012-11-21 12:20:19

  Emotion analysis on Twitter for past 5 years

Emotion analysis is a new research direction in computer science in these years, what it does is expressing emotions and feelings of people with data. The means to do emotion analysis include natural language processing, statistical and signal processing. The platforms which are most suitable for emotion analysis are also microblogging like social networking platform, Twitter is one good example.Computing Laboratory of the University of Vermont project Hedonometer conducted emotion analysis for...

   Emotion analysisTwitter,Hedonometer,happiness     2013-05-08 06:17:25

  Using Angular 2 with Asp.Net MVC/Asp.Net Core

Asp.net development professionals bring this post to explain the use of Angular 2 with Asp.net MVC/ Core. You will read the overview of Angular 2 and Asp.net Core at first in this post. Read the article to find how experts use Angular 2 with MVC / Core. Angular 2 Overview Angular 2 is the upcoming version of MV framework used for creating high level applications in browser. It contains everything needed to create a complex mobile or web apps from a variety of templates. Angular team recently re...

   ASP.NET DEVELOPMENT,ANGULAR 2, ASP.NET MVC     2016-10-29 05:15:06

  HP's Apotheker recounts TouchPad disaster in post mortem

Summary: “The tablet effect is real and sales of the TouchPad are not meeting our expectations,” says HP’s CEO. The TouchPad was quickly becoming a money pit. HP CEO Leo Apotheker wasn’t shy about outlining the company’s challenges. He noted that the “tablet effect is real” and dinged HP’s PC business. In addition, the TouchPad failure was about to become a money pit. That reality led HP to move...

   HP,webOs,Death,Palm,Touchpad,Diaster     2011-08-19 07:35:17

  How Can Your Data Be Stolen Online?

In 2019, according to Statista, nearly 165 million sensitive records were exposed in the US due to data breaches. Unfortunately, data theft is not going anywhere. Hackers are using increasingly sophisticated methods to steal information, but thankfully there are measures you can take to ensure your data stays safe. Here are some of the most common ways people get their data stolen online and how you can take precautions against the methods cybercriminals use. Human Error Hacking is one of the m...

   DATA SECURITY,PROTECTION KID     2021-01-27 19:46:05

  10 modern technologies we will still use in 2030

Although there is rapid revolution for new technology, some technologies can survive with the passage of time. Here are 10 modern technologies which may continue to exist in 2030. 1. QWERTY keyboard Speech recognition, handwriting recognition and gesture control input will become the trend for the next two decades. Nonetheless QWERTY keyboard input is still one of the most accurate way - although not necessarily the most convenient. Although physical keyboard disappear on phones and tablet PCs, ...

   New technology,Trend     2012-11-12 11:02:02

  Learn How to Write iOS Apps

My friend contacted me on twitter and asked for advice on different sources on how to learn iOS apps. Since this paragraph will already exceed 140 characters, I'm posting here, instead. (Obviously, reading this blog regularly is a great way to pick up some iOS development tricks) To get started, some people buy a book or find some good online tutorials. I tried both approaches, and the online tutorials were definitely better. I found Stanford's class on iPhone Development, available for free...

   IOS App,Tutorial,Advice,Resource     2011-12-25 00:58:25

  Commonly used AJAX frameworks

Have you ever wondered to design your website like desktop applications? Fortunately, with AJAX we can achieve this. By using AJAX, we no need to refresh the whole page when we just want to update a portion of a website such as the weather information or news panel. This makes our web apps look like desktop applications and bring good user experience to our visitors. You can create an XMLHttpRequest object every time when you want to initialize an AJAX call, unfortunately you may need repeat eve...

   AJAX,framework,jQuery,Dojo,YUI     2012-06-27 04:40:05