SEARCH KEYWORD -- FIELD



  Bytes Matter

I love to profile applications, because I always learn something that surprises me. Initial Profiler Surprise: Client Side Case in point, I was recently profiling our Android application, the Famigo Sandbox. This app sends a lot of data back and forth with our API, as we try to determine which of the apps on your phone are safe for your kids. I always assumed that, if app performance suffered during some of the ...

   Byte,Low level,Operation,Importance     2012-02-28 08:07:22

  3 reasons why Alibaba invests on Sina Weibo

Last night, Alibaba announced acquisition of 18% shares of Sina Weibo with $586 million, according to sources close to the deal, after the completion of this deal, Alibaba will become the second largest shareholder of Sina Weibo and may become the largest shareholder in the future.This deal was supposed to be completed before Chinese Spring Festival, but because Alibaba and Sina had a heated argument about the share holding of Sina Weibo which resulted in substantial delay in the time to complet...

   Alibaba,Sina Weibo     2013-04-29 20:30:05

  The Go Pointer Magic

Go is a language with the pointer type, by which we can Pass pointer into a function and update value in-place. Add methods to a struct as (* T) A, which is different from (T) A(). However, the pointer is type-safe in Go, meaning that there are such restrictions of the pointer. Different types of pointers are unconvertible. Pointer type cannot be used for calculation. Pointer types cannot be compared, either == nor !=. No mutual assignment between different pointer-...

   GOLANG,POINTER,UNSAFE     2021-10-03 02:18:57

  XMLHttpRequest Level 2 user guide

XMLHttpRequest is a web browser interface, it makes it possible for JavaScript doing HTTP(s) communication. Microsoft's IE5 first introduced XMLHttpRequest, because it's so useful that many other browsers also adopted this. AJAX came to the front since. However, this interface is not standardized, implementation among different browsers is different, with the emerging of HTML5, W3C is considering to standardize this interface. In February 2008, they proposed a XMLHttpRequest Level 2 draft. This ...

   XMLHttpRequest, progress, upload, binary data     2012-09-19 11:51:50

  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10

  Microsoft is filing a new patent about transparent display

Microsoft is filing a new patent about transparent display screen, it may be used on augmented reality technologies of tablets, phones and laptops. Similar to the scenes in the movie Minority Report. Minority Report was showed in 2002, it described a world of 2054, at that time 3D technology is mature. But after 10 years of this movie, Microsoft not only invented the basis of this technology, but also make it more portable.Patent Bolt recently revealed a patent application of Microsoft about tra...

   Microsoft,Transparent display,3D,Patent     2012-05-10 05:31:16

  Do We Really Need Wi-Fi in Schools?

Why do I think Wi-Fi is needed in schools? Times have changed.  We need to adapt to the changes. I believe the internet is probably the most important tool available today. The world- wide web contains information about anything you could possibly want or need to know.  It allows an even playing field for people who don’t have the information and knowledge to be able to get it. Students today are the future.  They need to be able to access as much knowledge as possible to be...

   SCHOOL,WIFI,EDUCATION,COMPUTERS     2018-11-13 18:13:27

  Introduction to DTLS(Datagram Transport Layer Security)

Secure communication has become a vital requirement on the Internet. Lots of information transferred through the Internet are sensitive data such as financial transactions, medical information, media streaming etc. To ensure security of data transferred on the Internet, a few secure protocols have been designed including SSL/TLS and IPsec. Many large websites in the world have adopted TLS. Apart from SSL/TLS, there is some other protocol designed to be used in special cases. One of them is ...

   JAVA 9,DTLS,TLS,SECURITY     2016-04-02 05:55:36

  All I Know About Certificates -- Certificate Authority

One of the crucial steps in the TLS handshake is for the server to prove its identity to the client. While there is plenty of content explaining the principles of the handshake, there's less information about certificates, which are a critical component of TLS/SSL. This series of articles aim to explain what certificates are used for, how Google prevents others from impersonating Google, and why certificate issues frequently arise, among other topics. (Postscript: It took me a full 10 hours to w...

   CLIENTS,WEBSITE,CERTIFICATE,SSL CERTIFICATE     2024-07-26 22:22:28

  VirtualBox Q&A(Host OS: Windows; Guest OS: Ubuntu)

This is a Q&A post after sharing Guide for installing Ubuntu in VirtualBox on Windows 1. If the resolution of the installed guest OS on the VirtualBox is too small(For example 640x480) and you cannot adjust it through System Settings -> Display, what should you do? A: In this case, it is mostly probably you don't have the VirtualBox Guest Additions installed. You can install the Guest Additions on your guest OS by: sudo apt-get install virtualbox-guest-dkms Then restart the VM and you wil...

   VIRTUALBOX,HOST ONLY,RESOLUTION,Q&A,STATIC IP     2016-08-12 04:24:40