SEARCH KEYWORD -- CLOUD SERVICES
A new SSL 3.0 vulnerability named POODLE is released
Today a new SSL v3 security vulnerability is released by Google and it affects all products which is using SSL v3 protocol as this vulnerability is introduced by a design flaw. Google revealed details of the design flaw on Tuesday, and dubbed it POODLE – short for Padding Oracle On Downgraded Legacy Encryption. It is a blunder within the blueprints of SSL 3.0 rather than a software bug, so it affects any product following the protocol – from Google Chrome and Mozilla Firefox to Micro...
SSL v3, vulnerability, Google, POODLE 2014-10-15 04:48:59
How Is The POS Machine Conquering The Market Economy?
In today's market, cash is losing its importance. Online transactions have taken over the market with credit cards, and debit cards used a lot by the customers. You are way behind your times if you still use just cash for your business and do not have a credit card machine. For all those businessmen, who do not have a credit card machine, here's a list of benefits that a credit card machine offers you. Knowing these benefits will help you in getting into the market by accepting cashless ...
POINT ON SALE MACHINE,ONLINE PAYMENT 2018-11-23 03:25:14
Samsung will build its own mobile browser
According to the Korean IT News, Samsung is developing its own brand mobile browser based on WebKit, make its the default browser for future Gaxlaxy products.Samsung has posted recruitment advertisements for recruiting Webkit developers in its Advanced Software Platform Lab located in the Silicon Valley. Webkit is an open-source browser engine, Apple's Safari and Google's Chrome are based on this open source engine.For many users, the phone's built-in default browser is still the most used, so S...
How to Convert Images on Mac Finder
If you have a lot of images in different formats and you want to convert them to a common format, you can use the Mac Finder to do it easily and quickly. Here are the steps to follow: 1. Open the Finder and navigate to the folder where your images are stored. 2. Select the images that you want to convert. You can use the Shift key or the Command key to select multiple images at once. 3. Right-click on the selected images and choose Services > Preview from the context menu. This will open the ...
MACOS,FINDER,IMAGE CONVERSION 2023-04-16 02:09:54
A Brief Guide to Voice Navigation and the Future of UX Design
Voice devices are now everywhere, whether you like them or not. Amazon's Alexa, Google's Assistant, and Apple's Siri have proved that voice interactions are not from science fiction films but part of our new reality. Just as touch screens, voice interaction with devices will completely revolutionize how we interact with our computers, smartphones, and watches (and even cars and houses) in the coming years. But you might ask yourself, why is it evolving at such a fast speed? Well, there are many ...
UX DESIGN 2021-11-25 02:24:55
Steps to connect to MySQL on Windows Command Line
To connect to MySQL database on Windows through Command line, there are some steps to be followed.1. You need to start the MySQL service, you can go to Start->Control Panel->System and Securities->Administrative Tools->Component Service->Services(local), then on the right panel, you can find one service name called MySQL and you should start this service2. Go the the MySQL installation folder, which is something like this : C:\Program Files\MySQL\MySQL Server 5.1. In this folder, ...
MySQL,Window,Command line,Connection,mysqld 2011-11-05 08:22:39
Good bye, IE8, Google Apps leaves you
Google Apps team annouced not supporting IE 8 and lower version of IE, this will affect every Google App user including commercial, education and government. The time for leaving IE 8 is 15 November, at that time, IE 10 will be released for a few weeks. Google Apps team explained here: As we announced last year, we support the latest version of Google Chrome (which automatically updates whenever it detects that a new version of the browser is available) as well as the current and prior major re...
IE8, Google apps 2012-09-17 11:33:00
Will HTML5 ever overtake native mobile apps?
Since now HTML5 has become a very hot topic. It can be used develop some highly functional and amazing applications on desktop and mobile devices. Also, there are many libraries which are using HTML5 to develop some native app like applications on iPhone and Android systems such as PhoneGap. Someone on Quora asked a question which many people are concerning about.: Will HTML5 ever overtake native mobile apps? It seems that the number of people who are agreeing with it equals to the number of peo...
HTML5,Native app,Mobile 2012-05-10 06:51:46
Kubernetes Authentication & Authorization 101
If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αá½θεντικÏŒς authentikos, “real, genuine”, from αá½θÎντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...
RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES 2021-06-05 23:19:18
Why doesn't Google copy successful startup ideas?
Google is definitely one of the largest players in Internet world. It owns the most popular search engine, mobile operating system and mapping service. It not only has huge user base but also is extremely rich. It can copy and create any product that is proven to be successful with its talent pool and money. But why doesn't Google copy those successful startup ideas? Based on the current status quo and culture gene of Google, there are several reasons Google doesn't copy startup ideas. First, Go...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>