SEARCH KEYWORD -- Data mining



  When a CA becomes untrustable

Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...

   APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN     2016-10-01 23:03:44

  Jelly Bean distribution reaches 0.8% in all Android distributions

Jelly Bean (Android 4.1) is a surprise Google I/O conference bringing to us. After three weeks, Google official statistics said Jelly Bean distribution had reached 0.8% in all Android distributions.The latest Android ecosystem data shows Jelly Bean has a very good start, HSPA+ version of Galaxy Nexus can upgrade the system to Android 4.1(Jelly Bean) began in early July. The Ice Cream Sandwich system distribution rose to 15.8% from 10.9%, it became the second largest system version  followin...

   Jelly Bean,Distribution,Share     2012-08-03 15:11:27

  How to Create Dynamic PDF with Image and Content in Asp.Net Development?

Aegissofttech .net developers are specialized in developing real time web applications. While working on one of such real time web app development projects, our asp.net development team discovered an easy way to create PDF template from user inputs. The developers used Java Script and web service to accomplish PDF template development. To learn how to develop these dynamic PDF with content and graphics, you can follow the below tutorial. In real time web applications, we often require to generat...

   asp.net development,     2015-04-27 01:11:40

  Is Google still in China?

According to Tencent Tech, data from traffic statistics agency CNZZ shows that Google only ranks fifth in China's search engine market calculating by page views. Its market share is 2.13% in China. and although Baidu is still at the first place, its market share also declined and the its market share is less than 70%. Overall, Google's market share in China drops continuously. At the same time, Baidu also faces competition from other search engines, especially from new entrants Qihoo. Qihoo laun...

   Google,China,Market share     2013-07-05 07:12:58

  C++/CLR int to System::String^

In C++/CLR (for Microsoft), sometimes we need to convert int to System::String type or vice versa. The simple way is :From System::String^ to int int num= int::Parse(str); // System::String^ to int From int to System::String^ System::String^ str = num.ToString(); // int to System::String^For all the other data types, similar ways can be adopted....

   C++,CLR,Microsoft,System::String,Convert,int     2011-12-15 12:47:22

  The Pitfall of WebSocket Disconnections Caused by Browser Power-Saving Mechanisms

Preface Recently, while using WebSocket (WS) connections, we encountered frequent disconnection issues, occurring hundreds of times per day for a single user. Although using the auto-reconnect feature of socket.io allowed us to quickly restore connections after disconnections, it did not guarantee that every reconnection would successfully receive WS messages. Therefore, we conducted several investigations and tests. Ultimately, we identified the root cause of the issue: the browser's power-savi...

   WEBSOCKET,JAVASCRIPT,POWER SAVING,TROUBLESHOOTING     2024-06-23 01:19:39

  How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks

According to statistics, the average cost of a data breach reached $4.88 million in 2024, marking the highest recorded average to date. Moreover, 68 percent of data breaches in 2024 involved a human element. Cyber-attacks are no longer rare events—they’re an everyday risk for businesses. When a business isn’t prepared, even a minor attack can lead to costly downtime, disrupt operations, and harm its reputation. The good news is that businesses can reduce these impacts with pro...

   CYBER SECURITY ,CYBER ATTACK     2024-11-14 02:38:42

  Testing LLM on MacOS with Llama

As a programmer, I always believe that the best way to understand something is by actually getting the hands dirty by testing it out ourselves. In past few years, with the introduction of ChatGPT, AI and associated technologies such as LLM come to a hot spot in tech industry and there are lots of platforms available and different models coming out for people to test out. This post I will demonstrate a step-by-step guide on how to run Llama(a Meta LLM) on a MacOS machine with a model. This will j...

   GUIDE,LLAMA,LOCAL,HUGGING FACE,QWEN     2024-11-17 13:36:28

  How to Find User Participants To Test Your Project

Image Source: Unsplash Recruiting the right participants is important to test your projects properly, but it's essential that your research participants are able to represent your target group, or the results won't translate into something you can use. Since recruiting for specific criteria can be time-consuming, follow these considerations that should make getting these types of user participants easier.  Sharply Define Recruitment Topic Criteria There needs to be a required criteria befo...

   USER RESEARCH,USER REQUIREMENT,TESTING     2020-08-26 07:53:28

  GoLang Interview Questions

Below lists some frequently asked GoLang interview questions and their corresponding answers based on the author's experience. The list is updated frequently with new understandings. Stay tuned. What is the GMP model of GoLang? GoLang uses goroutine to achieve concurrency and it is famous for high concurrency support as the language defines its own goroutine dispatching and processing system which is well known as GMP model. How it works is that M is normally defined as the OS thread being spawn...

   MEMORY,CONCURRENCY,INTERVIEW QUESTION,GOLANG     2024-05-25 03:08:18