SEARCH KEYWORD -- Article



  How Java Application Developers Can Build Secure Internet Based Apps?

There are few compiled solution tested by experts to guide Java application development and maintenance team how they can start safe journey on Internet. Strong encryption, wise passwords, secure hardware are few of the tech tools that should be used by Java app development team to secure their Internet based apps.   The Internet is most amazing yet most risky platform where nobody knows either they are doing safe transaction on Internet or there is some dog watching out for data packets t...

   JAVA APPLICATION MAINTENANCE,JAVA APPLICATION DEVELOPMENT     2015-09-16 02:13:17

  Samijyon : A tablet from North Korea

According to Sina Tech, North Korea Tech posted an article about Samijyon. Samijyon is a model of Android  tablet manufactured by North Korea. You can buy it with $200 in North Korea. Smajiyon's hardware configuration is as good as Samsung and Apple, but it doesn't allow WiFi connection and ordinary North Koreans cannot connect to Internet as well, users can only connect to domestic network of North Korea. On this tablet, there are no built-in Google apps such as Gmail and Google Play. But...

   Samijyon,North Korea,Tablet     2013-08-03 22:01:35

  Google is returning back to China

It has been five years since Google announced its difficult decision to leave China in 2010. The well known reason was that Google didn't want to conform to China's censorship request on sensitive information. During these five years, many stories happened bbetween these two sides. Things may turn around now as there are a few indications where Google may return back to China at an appropriate time soon. The most convincing indication is that a customized Google play -- Google online shop may a...

   Google,China,Alphabet,Google play     2015-09-06 04:13:30

  Which program is using USB device?

Sometimes when we want to plug out our USB device, but the operating system tells us we cannot plug it out since some other processes are using the USB device. How do we know which process is using our USB device. Here is a simple solution.First, go to Start->All programs->Accessories->System Tools->Resource Monitor. (as in Windows 7, for other Windows systems, you may similar program called Resource Monitor but may not in the same location as in Windows 7).Then, open Resource Monito...

   Windows.ISB device,Plugout problem,Solut     2011-07-22 09:20:13

  Unix directory hierarchy history

As a beginner user of Unix or Linux, people would frequently get confused about the use of different directories of the system.  For example, there is a /bin directory under root(/), it is used to store binary files. However, there are /usr/bin and /usr/local/bin under /usr which are used for storing binary files as well. Some systems even have /opt/bin. What are the differences among them? Though there are articles explaining different directories in *nix such as Filesystem Hierarchy Stan...

   UNIX,LINUX,FILESSYTEM,DIRECTORY HIERARCHY,HISTORY     2016-10-21 23:47:17

  Do you have this kind of comments in your source code?

Writing runnable code is the essential skill of a programmer, writing understandable comment is also a skill a programmer should acquire. There is some famous saying that bad comment is worth than no comment. Usually your code will be maintained by other people, if you provide them some difficult to understand or misguided comments, this will be nightmare to them. While at some other time, programmers may put some funny comments in their codes which may make others laugh. Today we...

   COMMENT,HUMOR     2016-08-01 10:25:14

  Understanding Cursor and WindSurf's Code Indexing Logic

Background: The Importance of Context in AI Programming If the “intelligence” of large models, such as Claude 3.5 Sonnet, is the key factor driving a stepwise leap in AI programming capabilities, the other critical factor is the context length. Currently, Claude 3.5 Sonnet offers a maximum context length of 200k tokens. While this is more than sufficient for conversational models—capable of handling a 50,000 or even 100,000-word book with ease—it still falls far short for...

   COMPARISON,CURSOR,WINDSURF,INDEXING     2024-12-21 20:23:54

  Microsoft to launch Surface Pro 4 on October 6

Microsoft Microsoft has just updated on their website about an event to be held on October 6. This event will be held in New York at October 6 10am EDT.  As described by Microsoft : "We have some exciting news to share about Windows 10 devices". Although there are no details about what these Windows 10 devices are, many think this is the time when new Lumia Phones and Surface Pro 4 will be launched.  The Lumia devices will be Lumia 950 and Lumia 950XL. Both of them will be shipped wit...

   SURFACE PRO 4,MICROSOFT,WINDOWS 10,LUMIA     2015-09-15 07:31:56

  Send email from Ubuntu command line

First install exim4 and exim4-config using the package manager then install mailx sudo apt-get install mailutils and follow the prompts once this is set up use the command “mail” to check your mail. if you would like to send mail type “mail” followed by the email address to mail it to eg mail me@examplecom enter the subject and press enter the body and keep pressing enter as many times as you need to, when your body is finished, press “Ctrl” and “D" toge...

   Ubuntu,Email,Command line,mailutils     2011-04-25 15:58:10

  A trap about PHP random number

The method to get random number in PHP is very simple, we only need to use rand() function. int rand ( int $min , int $max ) One function call can return the random number in a specified range. But in fact, the random number in computer is actually pseudorandomness, generally to increase the randomness, we may set a random seed before calling rand(). void srand ([ int $seed ] ) According to other language features, we should pass a time value as a parameter to the srand() function, generally...

   PHP,rand,srand,mt_rand     2013-06-07 09:10:10