Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Trust



  A HTTPS client and HTTPS server demo in Java

In this post, I will create a HTTPS server and HTTPS client demo which can establish HTTPS communication between a server and a client using Java. This should be very useful when we want to test our understanding about SSL communication. We will use both a detailed SSL client and a simple HttpsURLConnection as the HTTPS client. Before creating the actual HTTPS server and HTTPS client, we first need to generate the keystore and truststore to be used by the server and client. To generate the keyst...

   SSL,HTTPS,JAVA,DEMO     2015-10-23 09:04:36

  How key-based cache expiration works

There are only two hard things in Computer Science: cache invalidation and naming things — Phil Karlton Doing cache invalidation by hand is an incredibly frustrating and error-prone process. You’re very likely to forget a spot and let stale data get served. That’s enough to turn most people off russian-doll caching structures, like the one we’re using for Basecamp Next. Thankfully there’s a better way. A much better way. It’s called key-based cac...

   Cache,Expiration,Key-base cache,Work     2012-02-20 05:32:40

  Deploy the political campaign with all guns blazing through predictive dialer

The US Presidential election 2016 is turning out as more of a global event day by day, as it’s going to influence numerous countries around the world in one or other way. It is getting more and more intense as D-day is coming closer. You can experience the energy in candidates’ vociferous debates, where they put forward their agendas, their point of views, which give us the glimpse of their philosophy and their vision towards the betterment of the country. Whether it is Democratic o...

   AUTO DIALER,PREDICTIVE DIALER,CLOUD AUTO DIALER,POLITICAL     2015-09-28 12:33:14

  Why do C++ folks make things so complicated?

This morning Miroslav Bajtoš asked “Why do C++ folks make things so complicated?” in response to my article on regular expressions in C++. Other people asked similar questions yesterday. My response has two parts: Why I believe C++ libraries are often complicated.Why I don’t think it has to be that way. Why would someone be using C++ in the first place? Most likely because they need performance or fine-grained control that they cannot get somewhere else. A Ruby programmer...

   C++,Complicated,C++ PRogrammer,Design pattern     2011-12-31 15:45:39

  The iFOREX Trading App is First Class

If you have searched the web for trading application reviews, you are bound to hear terms like ‘state of the art’ and ‘lightning fast execution’. The real question you should ask is - Can you trust the broker who will facilitate your trading to provide you with a robust platform that has several tools that will allow you to successfully trade. You want to make sure that the platform is intuitive and does not take weeks to learn how to use.   The iFOREX trading platfo...

   APP,TRADING,IFOREX     2018-12-20 08:07:35

  Building Security onto Your Mobile Application

Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...

   Web Application Development Company, iPhone App Development Company     2015-08-21 07:22:32

  Useful functions to provide secure PHP application

Security is a very important aspect of programming. There are many functions or modules in any kind of real programming language providing security functionalities  In modern websites, we may often get inputs form users all around the world.There is a famous saying which says that never trust user input. So in web programming languages, we will often see functions which will guarantee the security of the data input from users. Today we will cover some of these functions in the most famous o...

   PHP,security,SQL Injection,XSS,AJAX     2014-10-30 04:21:59

  Three things you should never put in your database

As I've said in a few talks, the best way to improve your systems is by first not doing "dumb things". I don't mean you or your development staff is "dumb", it's easy to overlook the implications of these types of decisions and not realize how bad they are for maintainability let alone scaling. As a consultant I see this stuff all of the time and I have yet to ever see it work out well for anyone. Images, files, and binary data Your database supports BLOBs so it must be a good idea to shove ...

   Database,BLOB,Log,Image     2012-05-02 04:44:25

  It's Official: Google Today Is Just Where Microsoft Was in 1999

Google (GOOG) looks a lot more vulnerable to the accusation that it’s become the new Microsoft (MSFT) today compared to even a year ago.Several people have said that Google’s co-founders, Larry Page and Sergey Brin, have sought to build their company so that it wouldn’t make the mistakes that Microsoft did in the 1990s. Well, surprise, Google today seems a heck of a lot similar to where Microsoft was right in 1999 – the year after Google was founded. Want proof? Here...

   Google,Microsft,Similarities     2012-04-17 06:55:41

  How to increase the productivity of your IT team

  As a manager, when your team isn’t completing as much work as they should be and you’re feeling the pressure from those higher up, it can be difficult to know what to do. The whole team is stressed and productivity is taking a huge drop. When this happens it’s time to take a step back and assess where the issue lies. Here’s how to increase the productivity of your IT team.   Have clear goals and roles At the start of every project have a meeting with everyone...

   PRODUCTIVITY,IT TEAM, BUSISNESS     2018-04-17 06:19:26