SEARCH KEYWORD -- Analysis



  App Store, Most Effective Weaponry In Apple’s Armor

Apple’s most effective and effectual weaponry is its app store. Surprisingly however, the first generation iPhone did not support any Mobile apps, and Steve Jobs was actually proud of this fact. Back then, in 2007, third party mobile apps were not allowed on the iPhone. Jobs in-fact announced that Mobile app developers could use the most modern standards and write customized mobile apps for the iPhone web browser. He said, “We think we’ve got a very sweet story for you. You can...

   Mobile app developers, customized mobile apps, software development kit,     2015-07-28 03:26:19

  Why is Golang's Compilation Speed So Fast?

Overview When I started learning the Go language, I already had experience with three statically typed languages—C/C++ and Java—and two dynamically typed languages—PHP and JavaScript. Because of this background, when I compiled a demo file of several hundred lines for the first time in Go, I was genuinely impressed by its compilation speed. At that moment, I thought to myself, "Go claims to have the execution speed of statically typed languages and the compilation speed of dyna...

   GOLANG,COMPILATION,GO     2024-10-07 22:02:23

  HeartBleed: Inside the heart, what causes the bleeding?

Just after a few weeks since Apple's famous goto fail bug, there is one bug in OpenSSL which catches the attention from the world again. The bug is named HeartBleed, found in OpenSSL library, a famous open source library supporting lots of  SSL/TLS communication among server/client applications. The reason why this bug catches the attentions from the world is it affects almost all sites which are using the affected OpenSSL library, these includes many applications like Nginx server, some v...

   OpenSSL,HeartBleed     2014-04-09 05:47:30

  Techies: Let's Not Forget Brain Hacking

A close-up of a jellyfish

Description automatically generated with low confidence Credit: SergeyNivens via Canva The world of cyber security never fails to surprise us with bolder and more sophisticated cyber-attacks and...

   HACKING     2022-02-03 21:43:11

  Everyone Can Write Tech Blogs

As a programmer, you’ve probably been told that writing tech blogs can offer a range of benefits. There's no shortage of articles encouraging you to start writing, and this post, this post adds to that chorus. But while the advice is solid, what’s often missing is how to begin the journey of writing tech blogs. Based on my 10+ years of experience, I’d like to share some thoughts to help you get started. From what I've seen, the reason many programmers don’t write tech blo...

   CAREER,RESUME,ADVICE,TECH BLOG     2024-09-08 04:00:52

  Software Development Company Shares Its Development Process

v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 false false false false EN-IN X-NONE GU

   CUSTOM SOFTWARE DEVELOPMENT COMPANY,SOFTWARE ARCHITECHURE,TESTING,REQUIREMENT ANALYSIS,MAINTENANCE     2016-01-21 00:13:26

  How Digital Technology is Transforming Healthcare?

Digitalization is the trendsetter for every industry. Healthcare has also been greatly influenced by digital technology. In fact technology has greatly improved the working of healthcare organization and in turn, outcomes of healthcare services have risen to new heights. This is not an overnight dream but result of immense hard work and efforts done by IT industry. The amalgamation of IT and healthcare has yielded a new era of healthcare that is quick and more reliable as compared to olden days...

   HEALTHCARE TECHNOLOGY,PATIENT MANAGEMENT SYSTEM     2017-05-05 04:09:33

  Applying Large Language Models (LLMs) to Solve Cybersecurity Questions

In this document, we will introduce some test, experiment and analysis conclusion about applying Large Language Models (LLMs) to solve cybersecurity questions. Introduction Large Language Models (LLMs) are increasingly used in education and research for tasks such as analyzing program code error logs, help summarize papers and improving reports. In this project, we aim to evaluate the effectiveness of LLMs in solving cybersecurity-related questions, such as Capture The Flag (CTF) challenges, ...

       2024-09-08 04:05:07

  MySQL index optimization

Problem description: We need to access a very big table which has 40 million records. In the table, id is the primary key and program_id is indexed. When executing a select query: select * from program_access_log where program_id between 1 and 4000 The above query executes very slowly, we thought it was because there were too many records in the table. So we added id in the where condition to limit the search so that each time only half a million records would be read. select * fr...

   MySQL,Index search, Partition     2012-12-26 13:14:20

  Hadoop or Spark: Which One is Better?

What is Hadoop? Hadoop is one of the widely used Apache-based frameworks for big data analysis. It allows distributed processing of large data set over the computer clusters. Its scalable feature leverages the power of one to thousands of system for computing and storage purpose. A complete Hadoop framework comprised of various modules such as: Hadoop Yet Another Resource Negotiator (YARN MapReduce (Distributed processing engine) Hadoop Distributed File System (HDFS) Hadoop Common Thes...

   COMPARISON,HADOOP,SPARK     2018-11-22 07:08:57