Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Speech to text



  Using Angular 2 with Asp.Net MVC/Asp.Net Core

Asp.net development professionals bring this post to explain the use of Angular 2 with Asp.net MVC/ Core. You will read the overview of Angular 2 and Asp.net Core at first in this post. Read the article to find how experts use Angular 2 with MVC / Core. Angular 2 Overview Angular 2 is the upcoming version of MV framework used for creating high level applications in browser. It contains everything needed to create a complex mobile or web apps from a variety of templates. Angular team recently re...

   ASP.NET DEVELOPMENT,ANGULAR 2, ASP.NET MVC     2016-10-29 05:15:06

  Android and Security

The last year has been a phenomenal one for the Android ecosystem. Device activations grew 250% year-on-year, and the total number of app downloads from Android Market topped 11 billion. As the platform continues to grow, we’re focused on bringing you the best new features and innovations - including in security.Adding a new layer to Android securityToday we’re revealing a service we’ve developed, codenamed Bouncer, which provides automated scanning of Android Market ...

   Android,Security,Android Apps,App market,Bouncer     2012-02-03 08:03:51

  Big file transfer in Linux

It's very common that we need to transfer files between two different hosts such as backups. It is also an very simple task, we can use scp or rsync to complete the task well. But what if the file is very big, it may take some time to transfer it. How can we transfer a big file with high speed? Here we propose one solution. Copy file If we copy one uncompressed file, then we should follow below steps: Compress data Send it to another host Uncompress the data Verify the data integrity This will...

   Linux, SCP,ZIP     2013-01-10 05:55:50

  Some measures for improving Linux server security

The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...

   Linux server,Server security     2012-08-21 05:08:50

  20 free fonts for web design

1.Comfortaa2.Quicksand3.Fertigo Pro4.Telegrafico5.Forque6.Romeral7.Sling8.League Gothic9.Molot10.Junction11.Tertre12.Nevis13.Existence Light14.Mentone15.Walkaway16.Jalane Light17.Insolent18.Kaffeesatz19.Vollkorn20.Gnuolane原文出自:ITeye...

   Web design,Fonts,Comfortaa,Quicksand     2011-04-20 00:30:24

  Let’s Find Out What the Future holds for .Net Technology

Technology is more like an evolution, not a revolution. The disruptive industry seems to be changing day in day out. Due to which tech companies by default have to chase new trends in order to stay ahead of the curve. Now, Microsoft.Net framework has been around since the 1990s! Do you think such refined technology can be considered relevant now? From what I can see, .Net is going through a major transformation. It’s gone largely open source and has been getting modernized so that its wor...

   ASP.NET ,.NET     2018-06-12 05:07:53

  Web Design 101: Get Your Color Contrasts Right

Great web design is hard.  It requires imagination, a keen eye, and the ability to project ideas onto a, generally digital, medium.  In today’s world this calls for a conflation of both artist and technologist.  I am not one of these people. I am a technologist, but I am no artist (thankfully I know some great artists!). Nonetheless, I’ve always had a good eye for things that look good and for sites that look like they were built with an early version of Micro...

   Web design,Structure,UI,Contrast     2012-02-04 21:42:50

  Fuzzy search algorithm in Sublime Text

Fuzzy string searching is the technique of finding strings that match a pattern approximately (rather than exactly. In many editors, we can easily find the Find menu item to do exact matching. While in Sublime Text and some other editors, we can use fuzzy string searching as well if we just want to have an approximate match. There is some algorithm implemented in Sublime Text to implement achieve this. First the search query is split into characters, join them with a regex wildcard, and then run...

   Sublime Text,Fuzzy search     2013-10-14 22:49:38

  Shortcut keys in Sublime Text 3(Animated demo)

Sublime Text 3 is a light weight code editor which supports lots of languages. It has lots of shortcuts and plugins easing work of programmers. In this post, we will introduce some shortcuts supported in Sublime Text 3 and show how powerful they are. 1. Select sibling matching(equal) word (Ctrl + D) Put the cursor on one word, press Ctrl + D to select the word, then press Ctrl and following by pressing D, it will select next matching word. The number of Ds pressed will mean number of matching wo...

   TIPS,SHORTCUT KEY,SUBLIME TEXT     2016-04-28 02:41:28

  E-commerce "Whampoa Military Academy" in Guangdong

There are five projects being initiated this year in Guangdong Province to help the young graduates to find jobs or become entrepreneurs, such as providing more internship opportunities to university graduates and setting up total 200 million amount loans to help starting their own business. Among all the announced plans, the “Youth E-Business Elite Plan” attracts the most attention. This plan relies on Taobao University of Guangdong Youth College to train various e-commerce talents...

   e-commerce,Guangdong     2013-04-01 06:49:32