SEARCH KEYWORD -- Web Application Development Company
Install PHP 8 in WampServer
With the release of PHP 8.4, there are some new features added in, it reminds me that I may need to upgrade my development environment PHP version as well. It has php 5.x and php 7.x installed already, now I need to add php 8.x as well. This post will show the steps to achieve this. Step 1 Install PHP 8.x The first step is that we need to download the new PHP version. Here we chose PHP 8.1.31. Once the zip file is downloaded, unzip it and copy the folder to c:/wamp64/bin/php and rename the folde...
WAMP,GUIDE,PHP VERSION,PHP 8 2024-11-24 02:43:22
It looks like TechCrunch blocks GoDaddy server access
Recently, I encountered an issue with an app I maintain—it suddenly stopped pulling RSS feeds from TechCrunch. At first, I suspected that the RSS feed URL might have changed. However, after further investigation, I discovered a different story. The URL itself was unchanged, but the results varied depending on where the request was coming from. To troubleshoot, I started by setting up a local web server and running a test with my script to see if it could still pull the RSS feed. The script...
TECH CRUNCH,GODADDY,AI,BLOCK ACCESS 2024-08-17 12:31:52
php://input in PHP
When using xml-rpc, server side will get the data from client with php://input method instead of $_POST. Hence today we will discuss php://input. PHP official manual has below explanation to php://input: “php://input allows you to read raw POST data. It is a less memory intensive alternative to $HTTP_RAW_POST_DATA and does not need any special php.ini directives. php://input is not available with enctype=”multipart/form-data”. Here we und...
php://input, IO, input 2013-02-25 20:43:00
Read 10 new books from O'Reilly for free
Recently O'Reilly provided free access to some books. Some of them are even in early release status. Here we recommend 10 of them. 1ã€Mastering Perl 2ã€Git Pocket Guide 3ã€Vagrant: Up and Running 4ã€High Performance Browser Networking 5ã€802.11ac: A Survival Guide 6ã€Test-Driven Development with Python 7ã€Interactive Data Visualization for the Web 8ã€HTML5 Canvas 9ã€Programming JavaScript Applications 10ã€Agile Data Source : http://linu...
O'Reilly,Free book,Early release 2013-07-03 07:56:20
Be Aware of these 10 mistakes while designing Your Mobile App!
So you have finally decided to enter the world of technology and you are going to design an application for your business. The time has become when you have to give all the nitty-gitty grins a look and design your own mobile app for promoting your business online. Well when you have finally decided to design your mobile application, here are some mistakes that you are not allowed to make. Have a look: Do Not Start Designing Your App Without Wireframes Normal 0 false ...
How big company CEOs spend their time in work
As a company's steer holder, the CEO or founder takes plenty of pressure ordinary people even cannot imagine. They usually need to deal with different aspects of daily operation of a company including technology, business, marketing, public relationship etc. Lots of meetings, negotiations and presentations are waiting for them every day. Hence time is a precious resource for them. Let's take a look at how these CEOs spend their time in their work. 1. Apple CEO Tim Cook Gets up at 3:45 am ...
CEO,STEVE JOBS,TIM COOK,ELON MUSK,JACK MA,MARK ZUCKERBERG,PONY MA 2016-08-13 13:29:00
Former Microsoft Executive Vice President Qi Lu joins Baidu
Former Microsoft Executive Vice President Qi Lu joined Baidu(The largest search engine in China) on January 1, 2017. Qi will be group president and COO at Baidu. He will be in charge of Baidu's products, technology, sales and marketing and operations. And he will be the second most powerful person in Baidu just behind Robin Li, the founder and CEO of Baidu. At the same time, Robin Li will step away from daily operation of Baidu. In a statement, Robin Li said “Dr. Lu possesses a ...
Introduction to DTLS(Datagram Transport Layer Security)
Secure communication has become a vital requirement on the Internet. Lots of information transferred through the Internet are sensitive data such as financial transactions, medical information, media streaming etc. To ensure security of data transferred on the Internet, a few secure protocols have been designed including SSL/TLS and IPsec. Many large websites in the world have adopted TLS. Apart from SSL/TLS, there is some other protocol designed to be used in special cases. One of them is ...
Alibaba gains spotlight due to female employee alleging sex harassment from supervisor
During the weekend, the Chinese e-commerce giant Alibaba gains spotlight from Chinese general public due to a hot discussion going on on various Chinese social media platforms where a female employee alleges that her supervisor(alias Yi Qu) conducted sex harassment on her during a previous business trip. The case happened a couple of weeks back where the female employee at Alibaba was asked by her direct supervisor to go for a business trip to Shandong province(a northern province in China), sh...
ALIBABA,SEX HARASSMENT 2021-08-07 22:27:02
The 9 lines of code of Google
Are you still remembering the then hot debated news about Oracle suing Google allegedly copying a small portion of codes from Oracle's Java in 2010. At that time, Oracle experts estimated that Google owes Oracle between $1.4 billion and $6 billion in damages if liable. But the court thought Oracle was eligible only for statutory damages for that copying, which were not expected to exceed a few hundred thousand dollars. At last, Oracle agreed the zero damage result. Are you curious about whi...
Google,Java,Open source 2014-08-15 20:29:52
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>