SEARCH KEYWORD -- APPLICATION SUPPORT
What should Microsoft do after Steve Ballmer steps down?
Steve Ballmer decided to retire from Microsoft within 12 months last week. Where should Microsoft head to and what should they do on their products to maintain their influence.Whether you like or hate Ballmer, and regardless of who will replace him as Microsoft new CEO, his voice became a very important part of different Microsoft conferences, Ballmer said : "We need a CEO who will be here longer term for this new direction."Steve Ballmer is criticized for many things. Under his control, Micros...
try { return } finally {}
Do you know what value will be printed when following program is ran? class Test { public int aaa() { int x = 1; try { return ++x; } catch (Exception e) { } finally { ++x; } return x; } public static void main(String[] args) { Test t = new Test(); int y = t.aaa(); System.out.println(y); } } And before answering the above question, do you have answers to following questions? If ther...
JAVA,JAVA INTERVIEW QUESTION 2016-09-26 08:06:28
Kubernetes: Docker out
Recently,The hottest news in the Kubernetes circle that docker will be deprecated has been confirmed by the release of 1.20. Docker support in the Kubelet is now deprecated and will be removed in a future release. The Kubelet uses a module called “dockershim” which implements CRI support for Docker and it has seen maintenance issues in the Kubernetes community. We encourage you to evaluate moving to a container runtime that is a full-fledged implementation of CRI (v1alpha1 or v...
DOCKERSHIM,DOCKER,KUBERNETES 2020-12-19 21:10:21
Noteworthy Aspects of PSD to Markup Conversion
Are you a great designer but can't code to turn your pixel-perfect design into a mark-up language? You will certainly begin scrolling the web to seek out an expert PSD to mark-up conversion service provider. But before venturing out for a credible service partner, it's very important to decide the right platform for your website. Especially, when you're thinking about converting your photoshop document into a CMS (content management system), you will get a plenty of choices. However, WordPress, ...
PSD to WordPress, Convert PSD to Wordpress, Convert PSD to Wordpress Theme, PSD to Wordpress Service 2014-08-04 08:46:36
Check whether a remote server port is open on Linux
As a system administrator or network engineer or application developer, there is a need to check whether a port on remote server is open so that you can tell whether the service under check is running or not. In this post, we would cover a few methods to check whether a remote server port is open or not on Linux. telnet telnet is the most frequently used command on both Windows and Linux to check port. The simple usage for this command is telnet [host] [port] When the port is open, the o...
Weibo is testing an Instagram like app called Lvzhou
Weibo, the Chinese version of Twitter, is testing an Instagram like app called Lvzhou(Oasis in English). Now only invited people can access the app. You can download the app on App Store if you are an iPhone user or you can download online if you are an Android user. The vision of this app is to allow users to discover beautiful world, users can post photos or short videos and share with the rest of the world. Before you can access the app, you have to obtain an invitation code shared by y...
Do We Really Need Wi-Fi in Schools?
Why do I think Wi-Fi is needed in schools? Times have changed. We need to adapt to the changes. I believe the internet is probably the most important tool available today. The world- wide web contains information about anything you could possibly want or need to know. It allows an even playing field for people who don’t have the information and knowledge to be able to get it. Students today are the future. They need to be able to access as much knowledge as possible to be...
When a CA becomes untrustable
Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...
APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN 2016-10-01 23:03:44
Why exception would be thrown when deleting element while looping through HashMap in Java
HashMap and other Collection types are frequently used in Java application programming. This post will explain why exception would be thrown when deleting element with Map.remove() while looping through a Map using Iterator. This issue would also occur to other Collection types such as Set, List. Below is a sample code snippet demonstrating the exception thrown. Map<String,String> map = Collections.synchronizedMap(new TreeMap<String,String>()); map.put("key1","value1"); map.put("ke...
JAVA,HASHMAP,CONCURRENTMODIFICATIONEXCEPTION 2018-06-30 12:49:09
Useful functions to provide secure PHP application
Security is a very important aspect of programming. There are many functions or modules in any kind of real programming language providing security functionalities In modern websites, we may often get inputs form users all around the world.There is a famous saying which says that never trust user input. So in web programming languages, we will often see functions which will guarantee the security of the data input from users. Today we will cover some of these functions in the most famous o...
PHP,security,SQL Injection,XSS,AJAX 2014-10-30 04:21:59
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>