Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- version control



  10 major updates of Windows 8.1

Last night, the 2013 Microsoft Build Developer Conference started in San Francisco. The highlight of the first day is Microsoft CEO Steve Ballmer announced the release of Windows 8.1 Preview . The final version will be released in November and he also mentioned that there would be over 300 updates on the new OS. Now let's summarize 10 major updates of the new OS. 1. Classical desktop mode After getting a lot of feedback from users, Microsoft adds a new setting. Users can choose to start in clas...

   Windows 8.1,Build     2013-06-27 05:45:02

  How Chinese tech websites survive

As a tech site which aims to share knowledge and experience, content is its core value. To attract readers, it needs to produce valuable content and keep the originality of the content. When an article is published on a site, it should be a copyrighted property of that site or the original author while others should be very careful when considering to copy that article to their own site. They should generally avoid to copying the whole content of the article. However, in reality, this is no...

   WEBSITE,COPYRIGHT,CHINESE     2017-08-08 21:54:32

  8 Essential Mobile Game App Development Tools

Who doesn’t love playing a game on their mobile? Temple run had caught the whole world’s attention to such an extent that right from children to elder people in the household were glued to this game. It is indeed interesting that mobile games can keep your kids occupied. In fact, they are the best stress busters available in the present times. Remember how you used to steal some hours just to play candy crush while on the break? This way you used to relieve yourself of the stress bun...

       2014-10-09 05:00:05

  Supervisord, God and Monit, which one to choose?

With the popularity of Docker, more and more service have been moved into docker containers and they are easy to build up and maintain for each atomic service(though it's a bit complex to maintain multiple docker containers which contain different service to form a complete solution). Ideally, each docker container should only contain one service which has only one running process. However, in reality there would be cases multiple processes would run in one single docker container and there is a...

   DEVOPS,MONIT,SUPERVISORD,GOD,DOCKER     2017-11-25 12:28:11

  Replacing small C programs with Haskell

C is the classic go-to tool for small programs that need to be really fast. When scripts.mit.edu needed a small program to be a glorified cat that also added useful HTTP headers to the beginning of its output, there was no question about it: it would be written in C, and it would be fast; the speed of our static content serving depended on it! (The grotty technical details: our webserver is based off of a networked filesystem, and we wanted to avoid giving Apache too many credentials in ca...

   C,Haskell,Small program     2012-01-03 10:51:39

  Proximity Cards Do More Than Just Open Doors

Credit: Susanne Plank via Pexels Locksmiths from centuries ago couldn’t have possibly imagined opening a door by tapping a card roughly the size of a credit card. Back then, security depended on physical locks, not sealed antennas made from coiled wire, integrated circuits, and capacitors. Today, proximity cards are a popular form of keycard used in hotels, government buildings, healthcare facilities, and many more places. They open doors for people with authorized access, but they also d...

   LOCK,PRINTING     2024-04-11 22:04:07

  What is Hystrix and How does Hystrix work

Background In distributed systems, there is one effect where the unavailability of one service or some services will lead to the service unavailability of the whole system, this is called service avalanche effect. A common way to prevent service avalanche is do manual service fallback, in fact Hystrix also provides another option beside this. Definition of Service Avalanche Effect Service avalanche effect is a kind of effect where the service provider fails to provide service which causes t...

   AVALANCHE EFFECT,HYSTRIX,DISTRIBUTED SYSTEM     2019-02-04 06:00:38

  How mobile-first index impact on your rankings?

Google has officially announced the rollout of its mobile-first indexing. After a year and half of careful experimenting and testing. Google has begun to start a transition to websites that follow best practices for mobile optimization, to help the majority of people who use google search on their mobile devices (mobile users). Google says, its search algorithms use the mobile version of the web page to indexing and ranking, to better help 'primarily mobile' user-base. Google continues to have t...

   SEO,RAMKINGS,MOBILE SEO     2018-07-23 02:59:03

  8 very useful and free web security testing tools

With more pervasive of web applications, web security threats are becoming increasingly prominent. Hackers gain web server control by exploiting web server vulnerabilities and SQL injection vulnerabilities, then they may tamper with web content, or steal important internal data, the more serious is to inject malicious code into web pages to affect visitors of websites. Attention is gradually warming up to Web Application Security. Here we recommend eight very useful and free web security testing...

   Website, security,Web security,Attack     2012-07-22 10:59:09

  Different types of keystore in Java -- JKS

JKS is Java Keystore, a proprietary keystore type designed for Java. It can be used to store private keys and certificates used for SSL communication, it cannot store secret keys however. The keytool shipped with JDKs cannot extract private keys stored on JKS. This type of keystore usually has an extension of jks. Next we will show how to operate the JKS keystore with pure Java code. Create JKS keystore The simplest method to create a JKS keystore to create an empty keystore. We can first get an...

   DEMO,EXAMPLE,KEYSTORE,JKS     2014-09-05 20:21:51