Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- User requirement



  Weibo is testing an Instagram like app called Lvzhou

Weibo, the Chinese version of Twitter, is testing an Instagram like app called Lvzhou(Oasis in English). Now only invited people can access the app. You can download the app on App Store if you are an iPhone user or you can download online if you are an Android user. The vision of this app is to allow users to discover beautiful world, users can post photos or short videos and share with the rest of the world. Before you can access the app, you have to obtain an invitation code shared by y...

   INSTAGRAM,WEIBO,LVZHOU,OASIS     2019-09-07 09:59:54

  Why cannot Renren be China's Facebook?

Yizhou Chen, CEO of China's SNS community Renren, shouted "one war, three battles". We do not know now how the battle progresses. Currently Renren's net market value is $1.3 billion where 900 million of them are in cash, it means the market values Renren 400 million US dollars only which is far lower than Facebook. Why cannot Renren be China's Facebook? This is a very interesting topic, many users share their opinions, Some of the main points are summarized as follows:Facebook pay more attentio...

   Renren, Facebook,SNS     2012-11-22 11:44:33

  Introduction to OAuth (in Plain English)

Last week we talked about giving away your passwords and how you should never do it.  When a website wants to use the services of another—such as Bitly posting to your Twitter stream—instead of asking you to share your password, they should use OAuth instead. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password. This is a quick guide to illustrate, as simply as possibl...

   Security,OAuth,Permission,Partial access     2012-04-05 11:39:54

  Can private method be overridden?

The private methods are not inherited by subclasses and you cannot be overridden by subclasses. According to Java Language Specification (8.4.8.3 Requirements in Overriding and Hiding), "Note that a private method cannot be hidden or overridden in the technical sense of those terms. This means that a subclass can declare a method with the same signature as a private method in one of its superclasses, and there is no requirement that the return type or throws&nb...

   Java,Private method,overridding,impossib     2011-10-06 03:57:14

  App Store Visibility – A Few Do’s and Don’ts

Discovery and Visibility are the two vital components for any mobile app, if the app publishing company is to derive some amount of revenue from their apps. However, the lack of organized marketing channels, a well-laid user acquisition strategy or even a poorly designed app often reduces the chances of being widely adopted by the users. In short, it hampers the possibility of the app being successful. Here is a list of few things to keep in mind while posting an app to the app stores. What to ...

   Mobile Application Development Company, Android App Development Company, Mobile App Company, Android     2015-09-01 07:52:24

  Networking Terminologies

Portmaps sudo apt-get install -y portmap Portmap is a part of ONC RPC (Open Network Computing Remote Procedure) collection of software for implementing remote procedure calls between Computer Programs. It is widely used by NFS (Network File System) and NIS. Portmap is a server that converts RPC program number to DARPA protocol port number. It must be used in order to make RPC calls. Network Infomation Service (NIS) sudo apt-get install -y nis NIS is a client server directory service provi...

   Linux,Network programming,Network file system     2012-02-16 06:22:30

  Amazon is a good company but doesn't have the best business model

Public opinion about a company is usually based on its performance. If it performs well, people will praise it, otherwise people will blame it. In 1999, Apple was still a broken apple(Steve Jobs's talent and effort was paid off yet). Public opinion about Apple was the closed model caused Apple's failure. They built hardware themselves, developed software themselves and delivered service themselves, this is certainly not sustainable. But Steve Jobs let everyone see this new model. In order to con...

   Business model,Amazon,Apple, Microsoft     2013-07-02 11:34:45

  SameSite attribute in cookie

Starting from Chrome 51, a new attribute SameSite has been introduced for browser cookie. This attribute is to prevent CSRF attack. Cookie is normally used to store data exchanged between client and server. It frequently stores user login information. If a malicious website can forge a HTTP request with the valid third party website cookie, it may be called a CSRF attack. For example, if a user logins to a bank website your-bank.com, the bank server responds a cookie: Set-Cookie:id=a3fWa; L...

   JAVASCRIPT,COOKIE,SAMESITE,CHROME,CSRF     2019-09-14 04:57:51

  Cybertruck's 48V Power: Revolutionizing Automotive Standards

Tesla's Cybertruck commenced its deliveries in the United States this month, marking a significant milestone for the innovative pickup. Distinguished by its unique design, the Cybertruck features a cargo bed panel that opens to facilitate easy loading of goods. This groundbreaking vehicle has achieved numerous world-first distinctions: The world's inaugural stainless steel car, boasting a body reportedly resistant to bullets. Its angular shape adds an extra layer of safety, causing severe col...

   FORD,48V,CYBERTRUCK,TESLA     2023-12-24 17:06:59

  Useful functions to provide secure PHP application

Security is a very important aspect of programming. There are many functions or modules in any kind of real programming language providing security functionalities  In modern websites, we may often get inputs form users all around the world.There is a famous saying which says that never trust user input. So in web programming languages, we will often see functions which will guarantee the security of the data input from users. Today we will cover some of these functions in the most famous o...

   PHP,security,SQL Injection,XSS,AJAX     2014-10-30 04:21:59