SEARCH KEYWORD -- WIKIPEDIA
Who Uses PhoneGap/Apache Cordova?
The HTML5 Microzone is presented by DZone and Microsoft to bring you the most interesting and relevant content on emerging web standards. Experience all that the HTML5 Microzone has to offer on our homepage and check out the cutting edge web development tutorials on Script Junkie, Build My Pinned Site, and the HTML5 DevCenter. I see questions and comments all the time with the general sentiment “it looks nice, but who really uses PhoneGap/Apach...
I am a great programmer, but horrible algorithmist
I am a great programmer, but a horrible algorithmist. It is a thought that has been weighing on me heavily recently, and I'd like to gather other developers feelings on the subject as well. I started what can be called my professional development career back in 1999. I was still in middle school, but my father hired me at his software company. My official duty was to make updates to our websites, but I mostly ended up bugging the other developers to help me learn. From there I picked up ...
Programmer,Algorithmist,Diffference 2012-02-12 04:55:28
Alibaba founder Jack Ma sets up a new company
On November 24th, according to TianYanCha(A Chinese website to check company registration information), Hangzhou Majia Kitchen Food Co., Ltd. was established on November 22nd. The legal representative is PAU JASON JOHN, and the registered capital is 10 million RMB. The ownership information shows that the company is wholly owned by Hangzhou Dajingtou Er Shi Er Hao Cultural Art Co., Ltd., of which Alibaba founder Jack Ma holds a 99.9% stake. The business scope of this new company includes food ...
The Internet : from 1969-1974
Internet was born 43 years ago. There are some big events in the history of Internet development. In my opinion, most of the big events happened at the first five years, i.e, from 1969-1974. 1969 : ARPANETThe Advanced Research Projects Agency Network (ARPANET), was the world's first operational packet switching network and the core network of a set that came to compose the global Internet. The first ARPANET transmission was between Stanford Research Institute and UCLA on 29th, October 1969...
Eleven Equations True Computer Science Geeks Should (at Least Pretend to) Know
This idea is a complete rip off an article that appeared in Wired a little while ago and it got me thinking what would my list for Computer Science look like? Plus I thought it might be a fun post and unlike the Wired list this one goes to eleven. So here they are in no particular order: Binomial Coefficient The Binomial Coefficient equation generates Pascal’s Triangle and gives you the coefficients for the Binomial Theorem these ideas are often attributed to Pa...
Algorithms,Computer science,Euler formula,Fermat 2011-11-29 08:42:50
How Computers Boot Up
The previous post described motherboards and the memory map in Intel computers to set the scene for the initial phases of boot. Booting is an involved, hacky, multi-stage affair – fun stuff. Here’s an outline of the process: An outline of the boot sequence Things start rolling when you press the power button on the computer (no! do tell!). Once the motherboard is powered up it initializes its own firmware – the chipset and other tidbits – and tries to ...
Why should we drop or reduce use of MD5?
MD5 is a frequently used one-way hash algorithm, it is commonly used in following situations: Check data integrity. We take hash of the data stored in two different places and compare them. If the hash results are the same, then there is no need to check the actual data. This utilizes the collision-resistant feature. Two different data block will have little chance that their hash values will be the same. Many data service providers use such technique to check repeated data to avoild repeating...
MD5,Vulnerability,attack 2012-09-29 04:47:49
Difference between keystore and truststore
Security has become a vital concern in most of the online transactions nowadays. Lots of the world's most popular websites have adopted security protocols to transfer data, especially sensitive data. These security protocols including SSL/TLS which are using the private/public key exchange mechanism to establish secure connections. The private/public key cryptography is a really important invention and it allows data to be transferred securely and solves the big problem of transferrin...
KEYSTORE,TRUSTSTORE,SECURITY,SSL 2017-03-04 07:52:47
World of Father of Ruby
"I am Yukihiro Matsumoto, I believe keyboard can change the world" is a video about Father of Ruby -- Yukihiro Matsumoto. This video introduces us a father, a husband rather than a programmer. Yukihiro Matsumoto shared his understanding about programming in this video. Computer is not quite smart, it cannot understand human languages, so if we want computers to complete jobs we assign to them, then we need something both human beings and computers can understand. That's why we have program...
Yukihiro Matsumoto 2013-08-30 22:45:26
Opinion: Top 5 Things I Wish Someone Told Me Before I Started My Own Business
1. However much money you think you'll need to start a business, you should take that number and double it I thought I had strategically planned every penny when I first started, but I had no idea that there would be so many unanticipated costs. Since we have a home office, I use temporary commercial office space and conference solutions for meetings and demonstrations. We always like to buy lunch for our clients, and we like them to lunch well. By the time everything is factored in, depen...
startup,own ownership,business,care 2011-08-22 12:10:18
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>