SEARCH KEYWORD -- Data type



  Unix Philosophy

First, let me tell two stories.The first one is one Japan soap factory had a problem that they sometimes shipped empty boxes to the customer without soap inside. So they spend much time and money to invent a X-ray machine to check whether the soap box is empty.The same thing happens in a small factory which doesn't have too much money. The solution of them to solve this problem is they use a desk fan to blow the empty boxes out of the belt and into a bin.The second story is NASA finds that in sp...

   Unix Philosophy,Simple,Rules     2012-05-06 06:49:26

  Simple Strategies to Boost Your Android Phone Security

Android is one of the safest operating systems for smartphones and tablets if used correctly. Unfortunately, only a third of Android users use the latest version, and older versions are far more vulnerable than newer ones. Not to mention that many manufacturers take their time when it comes to downloading the latest security patches. A news blog Android Authority ranked the fastest manufacturers in downloading system updates. Here are the results: LG - 78 days Motorola - 88 days HTC - 95 days S...

   ANDROID,DATA SECURITY     2019-02-19 07:36:46

  Java Cipher encryption/decryption example

In Java, Cipher is the API for doing data encryption/decryption. Many cryptographic algorithms such as AES, DES, RC4 etc can be specified when creating Cipher instance. The Cipher instance calls the underlying algorithm specific implementation to do the actual encryption/decryption.  Before doing the encryption/decryption, a key needs to be created and it will be used to do the encryption/decryption. A sample program for performing all these is : import java.security.Key; import javax.cryp...

   Java, Java Security, Cipher, Example, Sample     2015-08-14 07:07:10

  Create cron job on CentOS

These two days, I am building a website and deploying it on a VPS server which uses CentOS 5. I don't have cPanel or Plesk for my account, so I need to install and configure everything myself including Apache, PHP, MySQL and FTP server, also today's topic cron job. Since my website has a ranking algorithm to calculate the rankings of each link and update the ranking on database and I need to calculate the rankings every 5 minutes, so I think to use cron jobs. Here are what I have done which may ...

   cron job,crontab,CentOS,linux,php,example     2012-06-11 09:23:45

  Best Tips for a brilliant responsive design

Portability of mobile devices have made it easier for the users to access internet. Consequently , this has increased a lot of of mobile traffic and has given birth to new terms such a mCommerce. Now the point is that as we know that technology is ephemeral , will we keep on investing time and money every time a new gadget is launched? Indeed yes, because this is what market demands!  But what if I say a that there is a technology which is independent of the size of the devices or a technol...

   responsive, mobile     2015-07-01 01:25:37

  What are the Four Most Important Technologies Inside an Office, Today?

The office life has changed a lot since the beginning of the 21st century. Nowadays, technologies have taken over a large part of the work that people have to do, inside their walls. Some of them are more important than others, though. Here are four that no company should live without.  A VoIP Phone System If a company wants to communicate with its clients, it needs to install a centralized phone system. The old ones were complicated and costly. The more phone lines you had, the higher the ...

   SMARTPHONE,VOIP,5G     2022-12-24 06:35:02

  Secure Your Go Code With Vulnerability Check Tool

Security vulnerabilities exist in any language and any code, some are written by ourselves, but more are from the upstream dependencies, even the underlying Linux. We have discussed the security protection methods for Go and Kubernetes Image in Path to a Perfect Go Dockerfile and Image Vulnerability Scanning for Optimal Kubernetes Security, in which the security scanning was performed based on generic. As the Go community grows, more and more open-source packages have caused ...

   GOVULNCHECK,GOSEC,GOLANG     2022-10-29 23:43:20

  How to Develop a Successful SEO Strategy for Your Startup

SEO is usually viewed as under-the-table formula manipulations and trickery, once actually it’s simply a series of core steps and actions you wish to require, to create your web site rank higher. An economical SEO strategy may be countermined to the subsequent three parts, that create the entire issue look less daunting in spite of everything.   Step 1: On-site Optimization On-site optimization strategy consists of these subsequent elements: Your Content Website Structure Layout of ...

   SEO,MARKETING     2016-03-18 15:33:37

  Are NSA engineers better than engieers at Microsoft?

NSA is the US government department which takes care of the information and data security of US. It's said to be one of the largest of U.S. intelligence organizations in terms of personnel and budget. There are many excellent engineers working on information and data security and developing algorithms and software help US government to collect intelligence information from all around the world. Many people may be curious about whether NSA has better engineers than IT companies like Microsoft and...

   NSA,Microsoft     2014-01-09 07:24:43

  The Risks of Prioritizing Features Over Security in China's EV Industry

In recent years, China's electric vehicle (EV) industry has seen a surge in innovation and growth. Companies like BYD, NIO, XPeng, and Xiaomi have become household names, not just in China but globally. These companies have been at the forefront of integrating cutting-edge technology into their vehicles, often promoting new features such as autonomous driving, advanced infotainment systems, and seamless connectivity. However, this rapid pace of innovation has raised concerns about whether these...

   SECURITY,CHINA,EV CAR     2024-11-20 01:14:18