Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- user defined func



  Android and Security

The last year has been a phenomenal one for the Android ecosystem. Device activations grew 250% year-on-year, and the total number of app downloads from Android Market topped 11 billion. As the platform continues to grow, we’re focused on bringing you the best new features and innovations - including in security.Adding a new layer to Android securityToday we’re revealing a service we’ve developed, codenamed Bouncer, which provides automated scanning of Android Market ...

   Android,Security,Android Apps,App market,Bouncer     2012-02-03 08:03:51

  Don’t Call Yourself A Programmer, And Other Career Advice

If there was one course I could add to every engineering education, it wouldn’t involve compilers or gates or time complexity.  It would be Realities Of Your Industry 101, because we don’t teach them and this results in lots of unnecessary pain and suffering.  This post aspires to be README.txt for your career as a young engineer.  The goal is to make you happy, by filling in the gaps in your education regarding how the “real world” actually works.  ...

   Career,Programmer,Advice,Low level,Development     2011-10-29 07:09:23

  Spending Too Much on Your Streaming Services? Read This

Remember the times when we thought ditching the cable TV might be a good idea to save time as well as all that money? Little did we know that platforms like Netflix, Hotstar, Hulu, HBO, Paramount, Disney Plus, and Apple TV Plus together cost more than the cable alone.  On the brighter side, there are ways to curb your streaming costs without much sacrifice. Do you want to binge-watch all your favorite shows at much fewer costs? Read on some great tips to save all that streaming costs to wa...

   NETFLIX,STREAMING     2022-06-13 07:20:37

  Create trigger in MySQL

To create trigger in MySQL, the syntax is :CREATE [DEFINER = { user | CURRENT_USER }] TRIGGER trigger_name trigger_time trigger_event ON tbl_name FOR EACH ROW trigger_bodyOne example is :DELIMITER %%DROP TRIGGER IF EXISTS delete_commentCREATE TRIGGER delete_comment AFTER DELETE ON file_generate_infoFOR EACH ROW BEGIN DELETE FROM article_comment WHERE article_id=OLD.article_id;END%%The whole create trigger statement should be complete statement but not many separate com...

   MySQL,Trigger,Dilimiter,phpMyAdmin     2011-04-20 15:35:30

  How One Missing `var` Ruined our Launch

Well, that was a veritable shitstorm (sorry for the language).  Long story short, MelonCard was featured today on TechCrunch (along with other500Startups companies, also on VentureBeat, Forbes, …) and everything broke all at once.  Every. little. thing.  We had rolled out a huge change to MelonCard over the last few days to make our site a seamless “everything just updates” look-good / feel-good product using NodeJS lo...

   JavaScript,NodeJs,jQuery,Variable,Scope,Global     2011-11-02 13:01:22

  Emacs adventures

I have been using Emacs for over a year now. I actually didn’t learn a lot when I started using it (just the basics to get going and then some relatively common keyboard shortcuts), but lately I have been reading and learning much more about it. I’m so grateful by everything I’ve learned from different people on the net that I wanted to share a couple of things I’ve learned, and a simple major mode for editing AsciiDoc documents. As a long-time VIM user, I f...

   Editor,Linux,Emacx,VIM,Shortcuts     2011-11-30 11:56:49

  Different types of keystore in Java -- Overview

Keystore is a storage facility to store cryptographic keys and certificates. They are most frequently used in SSL communications to prove the identity of servers and clients. A keystore can be a file or a hardware device. Three are three kinds of entries can be stored in a keystore depending on the types of keystores. The three types of entries are: PrivateKey : This is a type of keys which are used in asymmetric cryptography. It is usually protected with password because of its sensitivity. It ...

   JAVA,KEYSTORE,OVERVIEW,JKS,PKCS12,JCEKS,PKCS11,DKS,BKS     2014-08-18 02:09:54

  Different types of keystore in Java -- JKS

JKS is Java Keystore, a proprietary keystore type designed for Java. It can be used to store private keys and certificates used for SSL communication, it cannot store secret keys however. The keytool shipped with JDKs cannot extract private keys stored on JKS. This type of keystore usually has an extension of jks. Next we will show how to operate the JKS keystore with pure Java code. Create JKS keystore The simplest method to create a JKS keystore to create an empty keystore. We can first get an...

   DEMO,EXAMPLE,KEYSTORE,JKS     2014-09-05 20:21:51

  7 big mistakes that make your layout a disaster

Even though the web design field has become a real industry, building a website is part art, part science. The design of a website may attract people but it may also make them run away, it depends on the work of the web designer. The experience, the talent and the capacity of endeavor are the greatest tools of a web designer, a good layout is based on all of these and, besides that, it is a very time consuming activity.Making a good layout is difficult and judging its value is subjective, a desi...

   Web design,Mistakes,Content,White space     2011-11-24 03:36:23

  Which web front-end framework to choose?

When doing web design, we often need to choose which front-end framework to use in order to provide great user experience and simplify the development. Also, compatibility problem can be solved by using front-end frameworks. Here is a list of front-end frameworks. Which one are you using? Which one do you prefer?1. Apache FlexApache Flex, is a software development kit for the development and deployment of cross-platform rich Internet applications based on the Adobe Flash platform. Initially deve...

   Web design,Front-end,Framework     2012-07-30 13:57:26