SEARCH KEYWORD -- COMMAND LINE
Different types of keystore in Java -- JCEKS
JCEKS stands for Java Cryptography Extension KeyStore and it is an alternative keystore format for the Java platform. Storing keys in a KeyStore can be a measure to prevent your encryption keys from being exposed. Java KeyStores securely contain individual certificates and keys that can be referenced by an alias for use in a Java program. The process of storing and loading different entries in JCEKS is similar to what JKS does. So please refer to the article Different types of keystore in Java -...
How Is The POS Machine Conquering The Market Economy?
In today's market, cash is losing its importance. Online transactions have taken over the market with credit cards, and debit cards used a lot by the customers. You are way behind your times if you still use just cash for your business and do not have a credit card machine. For all those businessmen, who do not have a credit card machine, here's a list of benefits that a credit card machine offers you. Knowing these benefits will help you in getting into the market by accepting cashless ...
POINT ON SALE MACHINE,ONLINE PAYMENT 2018-11-23 03:25:14
How Cloud Computing is changing the Face of Business
The world of information is getting bigger and bigger and so does the need for cloud computing is felt broadly across various industries and platforms. The ever growing popularity and adoption are due to the fact that cloud computing is efficient, reliable and secure than any other business model. However, the way cloud computing is adopted across different enterprises may vary. How cloud computing has been adopted worldwide by companies- let us have a look at few statistics that would blow you...
CLOUD COMPUTING,SOFTWARE DEVELOPMENT,CLOUD SERVICES,CLOUD SOLUTION,SOFTWARE SOLUTIONS 2017-08-22 02:49:53
What is pjax and why we should use it?
What is pjax? Now many websites such as Facebook, Twitter support one browsing style which is when you click one link on their sites, the page will not be redirected, instead only the page contents are updated and URL on address bar is changed. This kind of user experience is much better compared to load the whole page with a blink. There is one important component in the above browsing experience, these websites' AJAX refresh support browser history, when refreshing the page, the address on the...
Check file readability in Java
File operation is quite platform dependent. Although Java is a cross platform programming language, the file operation in Java is also platform dependent. The obvious evidence is the file permission check. In Java, we can call canRead(), canWrite() and canExecutable() to check whether the program can read, write or execute the file specified. However, on Windows, when we call canRead() on a File object, we may get unexpected result. Actually, on Windows, when we call canRead() on a File object, ...
Differences among Enter,F5 and Ctrl+F5 in webpage refresh
When we press Enter, F5 or Ctrl+F5 to refresh a webpage, is there any difference among them? Actually it's yes, we can find the difference from the request header and response header information. There are two cases about pressing Enter in the address bar. First if the page requested is cached and not expired in the browser, we can find the header information sent by the browser is : Host 192.168.3.174:8080 User-Agent Mozilla/5.0 (Windows NT 5.1; rv:5.0) Gecko/20100101 Firefox/5.0 Accept ...
Remove duplicated elements in JavaScript array
During interviews, one frequent question asked would be something like how to remove duplicated elements in a JavaScript array and how many different ways you can think of. The interviewee would also be asked to write the code down. In real applications, normally front end would not need to handle this case since normally it would be done by backend, but still it's necessary for front end developers to know different ways of doing this. This post will share some of the common ways to remove dupl...
JAVASCRIPT,ARRAY,DUPLICATED ELEMENT 2018-09-21 22:32:10
New features in PHP 5.5
Just a few days ago, the PHP official website was redesigned. It seems we directly go from Web 1.0 era to Web 2.0 era. In addition to this new change, PHP 5.5 was also released. Some new features are added in this release. Here we summarize some of them. Enable OPCache by default When installing PHP 5.5, the Zend OPCache will be compiled as OPCache by default and OPCache is enabled by default. Some changes to the language itself Add Generator function getLinesFromFile($fileName) { if (!$file...
PHP 5.5,New features,Generator 2013-07-05 03:13:22
How small should a function be?
"The well-designed functions are often relatively small, large function design is often a mess or there is a lot of room for optimization."Maybe you think there is no need to discuss the size of functions, because the nature of the function design is cohesive, its size is only its manifestations. But it is necessary to discuss about the size of function because the statement above .First let's understand the concept of minimum code processing unit : a basic operation (assignment, comparison, etc...
Function size,Optimization 2012-12-18 13:58:07
Speech balloon with pure CSS--One step further
Many of us want to add cool features to our websites to make our websites user friendly ad more attractive. Especially in Web2.0 era. Today we are talking about adding speech balloon feature to our webpage so that we can display beautiful help windows while users mouse over some help icons on our page. First, let me introduce one post written by Umar Ashfaq named "How to create a speech balloon with pure CSS". He also explains how this works. You can also refer Magic CSS shape for more informati...
Speech balloon, Pure CSS,border 2013-03-16 04:11:58
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>