SEARCH KEYWORD -- CLOUD AUTO DIALER



  When a CA becomes untrustable

Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...

   APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN     2016-10-01 23:03:44

  The Most Effective Stretches and Yoga Poses for Programmers

Programming software takes a tremendous amount of focus and effort. Working hard to transform code into software is an exciting feeling. It’s easy to get lost in your work as the hours fly by. I’ve done this many times. However, writing code can also be frustrating in many cases. I’ve been a programmer for many years, and I still spend hours debugging. Most of the time this level of debugging requires sitting down and focusing. After many years of this, you will be a prime ca...

   YOGA FOR PROGRAMMERS,STRETCHING GUIDE FOR PROGRAMMERS,YOGA FOR DEVELOPERS     2018-07-14 07:20:25

  A mini guide to HTTP referer

In HTTP header, there is a field named Referer which is to provide the referrer of the current accessed page. In this post, we will introduce the usage of HTTP referer field. On the web, when a user visits a webpage, s/he must be from some place. This place is usually referred a s referer. This information is very important to some website operators and server owners as they want to know where they get the traffic from and this helps them provide better service for potential targeted users. In t...

   HTML,HTTP REFERER,REFERRERPOLICY     2019-06-29 02:23:25

  9 Outstanding Ways Artificial Intelligence Can Transform Retail

Artificial intelligence has been around for quite some time. However, Amazon was the first company to apply it in the retail industry. Now, it automates most processes on the platform, replaces the people's’ work, and increases the productivity in every possible field. Here are nine useful ideas for you to start using AI in retail. 1. Tracking the Overstock and Out-of-Stock Items It is necessary to know exactly how many items are left in stock (or whether there are any left at all). Selle...

   BUSINESS,ARTIFICIAL INTELLIGENCE     2019-01-22 08:41:02

  PHP to get access token for Sina Weibo app

Previously I wrote two articles about getting access token for Facebook and Twitter apps using PHP. Today I will write one more article about getting access token for Sina Weibo app using PHP. OAuth 2.0 is now the authorization mechanism of Sina Weibo API. The API authorization process is similar to the process of Twitter. It has basically two steps: 1. Authorization; 2. Get access token. 1. Create an app. I hope you know how to create an app in Sina Weibo now. If not. You can access this page ...

   PHP,access token,Sina Weibo     2013-05-16 12:07:39

  Chrome to provide native image lazyload support

Previously we have introduced how Medium achieved loading images lazily, basically what they did was using lots of HTML tags and CSSs to change the images at different stage. It needs lots of code to do this. With the high demand of this feature for resource consumption and performance consideration, Chrome is now working on a feature to provide native support for loading images/iframes lazily. This feature is named lazyload. lazyload will allow three values: auto: the default behavior of ...

   CHROME,LAZYLOAD,IMAGE,IFRAME     2018-09-22 23:04:35

  Be careful when running knife vault command

While using Chef, one would frequently use knife commands which are used to manage resources on the Chef server. One can list all nodes, data bags, vault items and many other stuff on the Chef server. In this post, we would cover one command which may need your attention when using it -- knife vault. On Chef server, one can store data to data bags which can be accessed by registered clients. These data bags usually store the data in plain text format. In some cases, one would need to store data ...

   KNIFE VAULT,KNIFE DATA BAG,CHEF-VAULT,CHEF     2017-08-19 00:26:54

  A guide on installing and setting up GitLab server on Ubuntu

GitHub, GitLab and BitBucket are the three most famous code hosting platform in the world. They have different features which allow teams or individuals to share code with others remotely. In case you want to build your own code hosting server so that you can host and share the code by yourself, you can install and set up your own server. In this post, we will walk you through a guide on installing and setting up GitLab server on Linux environment. gitlab is a web based code hosting tool which i...

   UBUNTU,TUTORIAL,GITLAB     2020-04-25 07:05:33

  Exploring the Impact of a Loan Origination System on Financial Institutions

Every money lending organization needs to go through a process before executing a loan. From getting a loan to repaying it, there is a step-by-step process involved. However, these days, the process has changed a lot. Organizations are using loan origination software to get the work done quickly. As a result, it is helpful for both customers and businesses.  In this blog, we will see how loan origination software can be helpful for financial institutions.  1. Streamlines the Loan Proc...

   BUSINESS,LOAN,SYSTEM     2024-10-16 23:13:53

  How to monitor user behavior in webpage

Sometimes there is a need for website owners to monitor user behavior on the site so that they can know what pages are mostly visited and which parts are more popular so that they can provide better service to their users. These behavior usually contain user clicks, user mouse over events etc. These data can be sent back to server when triggered with some meta data. In this post, we will cover a few ways to monitor user behavior on a web portal and send data back to backend sever. 1. Synchronous...

   HTML,BEACON API,PING,USER BEHAVIOR     2019-06-29 06:06:59