Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Wikipedia



  Who Uses PhoneGap/Apache Cordova?

The HTML5 Microzone is presented by DZone and Microsoft to bring you the most interesting and relevant content on emerging web standards.  Experience all that the HTML5 Microzone has to offer on our homepage and check out the cutting edge web development tutorials on Script Junkie, Build My Pinned Site, and the HTML5 DevCenter. I see questions and comments all the time with the general sentiment “it looks nice, but who really uses PhoneGap/Apach...

   PhoneGap,Apache,App,HTML5     2012-03-30 06:30:33

  I am a great programmer, but horrible algorithmist

I am a great programmer, but a horrible algorithmist. It is a thought that has been weighing on me heavily recently, and I'd like to gather other developers feelings on the subject as well. I started what can be called my professional development career back in 1999. I was still in middle school, but my father hired me at his software company. My official duty was to make updates to our websites, but I mostly ended up bugging the other developers to help me learn. From there I picked up ...

   Programmer,Algorithmist,Diffference     2012-02-12 04:55:28

  Alibaba founder Jack Ma sets up a new company

On November 24th, according to TianYanCha(A Chinese website to check company registration information), Hangzhou Majia Kitchen Food Co., Ltd. was established on November 22nd. The legal representative is PAU JASON JOHN, and the registered capital is 10 million RMB. The ownership information shows that the company is wholly owned by Hangzhou Dajingtou Er Shi Er Hao Cultural Art Co., Ltd., of which Alibaba founder Jack Ma holds a 99.9% stake. The business scope of this new company includes food ...

   JACK MA,ALIBABA,FOOD     2023-11-24 04:19:11

  The Internet : from 1969-1974

Internet was born 43 years ago. There are some big events in the history of Internet development. In my opinion, most of the big events happened at the first five years, i.e, from 1969-1974.  1969 : ARPANETThe Advanced Research Projects Agency Network (ARPANET), was the world's first operational packet switching network and the core network of a set that came to compose the global Internet. The first ARPANET transmission was between Stanford Research Institute and UCLA on 29th, October 1969...

   Internet,History     2012-06-22 09:55:51

  Eleven Equations True Computer Science Geeks Should (at Least Pretend to) Know

This idea is a complete rip off an article that appeared in Wired a little while ago and it got me thinking what would my list for Computer Science look like?  Plus I thought it might be a fun post and unlike the Wired list this one goes to eleven.  So here they are in no particular order: Binomial Coefficient The Binomial Coefficient equation generates Pascal’s Triangle and gives you the coefficients for the Binomial Theorem these ideas are often attributed to Pa...

   Algorithms,Computer science,Euler formula,Fermat     2011-11-29 08:42:50

  How Computers Boot Up

The previous post described motherboards and the memory map in Intel computers to set the scene for the initial phases of boot. Booting is an involved, hacky, multi-stage affair – fun stuff. Here’s an outline of the process: An outline of the boot sequence Things start rolling when you press the power button on the computer (no! do tell!). Once the motherboard is powered up it initializes its own firmware – the chipset and other tidbits – and tries to ...

   Computer,Boot-up,Rationale     2012-04-11 13:43:02

  Why should we drop or reduce use of MD5?

MD5 is a frequently used one-way hash algorithm, it is commonly used in following situations: Check data integrity. We take hash of the data stored in two different places and compare them. If the hash results are the same, then there is no need to check the actual data. This utilizes the collision-resistant feature. Two different data block will have little chance that their hash values will be the same. Many data service providers use such technique to check repeated data to avoild repeating...

   MD5,Vulnerability,attack     2012-09-29 04:47:49

  Difference between keystore and truststore

Security has become a vital concern in most of the online transactions nowadays. Lots of the world's most popular websites have adopted security protocols to transfer data, especially sensitive data. These security protocols including SSL/TLS which are using the private/public key exchange mechanism to establish secure connections.  The private/public key cryptography is a really important invention and it allows data to be transferred securely and solves the big problem of transferrin...

   KEYSTORE,TRUSTSTORE,SECURITY,SSL     2017-03-04 07:52:47

  World of Father of Ruby

"I am Yukihiro Matsumoto, I believe keyboard can change the world" is a video about Father of Ruby -- Yukihiro Matsumoto. This video introduces us a father, a husband rather than a programmer. Yukihiro Matsumoto shared his understanding about programming in this video. Computer is not quite smart, it cannot understand human languages, so if we want computers to complete jobs we assign to them, then we need something both human beings and computers can understand. That's why we have program...

   Yukihiro Matsumoto     2013-08-30 22:45:26

  Opinion: Top 5 Things I Wish Someone Told Me Before I Started My Own Business

1. However much money you think you'll need to start a business, you should take that number and double it I thought I had strategically planned every penny when I first started, but I had no idea that there would be so many unanticipated costs. Since we have a home office, I use temporary commercial office space and conference solutions for meetings and demonstrations. We always like to buy lunch for our clients, and we like them to lunch well. By the time everything is factored in, depen...

   startup,own ownership,business,care     2011-08-22 12:10:18