SEARCH KEYWORD -- Font size
Is programmer really profession for youth only?
- dedicated to the new programmers just into the workplace.
One young Chinese friend asked me: is programmer meant only for less experienced youth? Should I consider transition once if I work on it until 30 years old?
Programmer,Youth,Product,Project,Career,Analysis 2012-03-18 07:06:44
How to Create Dynamic PDF with Image and Content in Asp.Net Development?
Aegissofttech .net developers are specialized in developing real time web applications. While working on one of such real time web app development projects, our asp.net development team discovered an easy way to create PDF template from user inputs. The developers used Java Script and web service to accomplish PDF template development. To learn how to develop these dynamic PDF with content and graphics, you can follow the below tutorial. In real time web applications, we often require to generat...
asp.net development, 2015-04-27 01:11:40
8 most successful open source products
Open source itself is a successful product. It is not only liked by many personals, many famous enterprises like itAlthough there are numerous open source projects and open source products, which is the most successful among them? "Success" is defined as the widely used + well known here. In many successful open source products, only a minority leaders. Here we share 8 most successful open source products we think they deserve to be.LinuxReason: Linux + GNU = GNU / Linux. It has been almost 2...
Open source,MySQL,Linux,BIND,BSD 2012-04-19 08:29:00
How I explained MapReduce to my Wife?
Yesterday I gave a presentation at Xebia India office on MapReduce. It really went well and audience was able to understand the concept of MapReduce (as per their feedback). So, I was happy that I did a good job in explaining MapReduce concept to a technical audience (mainly Java programmer, some Flex programmer and few testers). After all the hard work and a great dinner at Xebia India office I reached back my home. My wife (Supriya) asked me “How was your session on …ââ‚...
Python SSH Connection Tools
Program Design Purpose: We aim to create a simple Python SSH tool library that facilitates SSH communication, SCP file transfer, and SSH port forwarding through multiple jump hosts in an SSH tunnel chain. The library is designed to provide a simple API for establishing nested SSH tunnel connections through multiple jump hosts with customizable TCP ports. This allows users or their programs to automate SSH tasks such as: Batch processing SSH connection tasks, such as connecting to multiple ser...
There are no free lunches on the internet
Hot data: An IT technician checks the network servers at a data farm. Alamy Photograph: Juice Images/AlamyPhysics has Newton's first law ("Every body persists in its state of being at rest or of moving uniformly straight forward, except insofar as it is compelled to change its state by force impressed"). The equivalent forinternet services is simpler, though just as general in its applicability: it says that there is no such thing as a free lunch.The strange thing is that most use...
Free lunch,Facebook,Google,Privacy information 2011-11-21 03:03:31
Oracle CEO Mark Hurd : IBM PureSystem is far behind Oracle
Oracle CEO Mark Hurd had an interview with Chinese media in San Francisco on 19th April. Mark Hurd first introduced different levels of Oracle's overall strategy: 1) the product must achieve best among similar products; 2) system open, vertical integration to provide customers with maximum performance; 3) Industry specific solutions; 4) give users the right to choose and the integration of the cloud environment (private cloud, public cloud, mixed cloud). In addition, Mark Hurd share his own...
Oracle,IBM,Pureystem,Hardware/Software 2012-04-19 07:17:24
The 10 Greatest Hacks of My Life
My co-founder and I briefly considered applying to YCombinator for the Winter 2012 session. We eventually decided to bootstrap Curvio initially, and raise a seed round on our own after we launch (so far so good!). But looking over the YC application, one question intrigued me:Please tell us about the time you, tansey, most successfully hacked some (non-computer) system to your advantage.Now, there are a lot of ways to interpret this. A mechanical interpretation would be about...
Hack,Most important,Example,Curvio 2011-10-22 12:47:42
IBM Launches Maqetta HTML5 Tool as Open-Source
IBM announced Maqetta, an HTML5 authoring tool for building desktop and mobile user interfaces, and also announced the contribution of the open-source technology to the Dojo Foundation. LAS VEGAS – At the IBM Impact 2011 conference here, IBM announced both Maqetta as well as the open-source contribution of its Maqetta HTML5 visual authoring tool to the Dojo Foundation. Maqetta is an open-source project that provides WYSIWYG visual authoring of HTML5 user interfaces using drag-and-drop ass...
IBM,Open Source,Dojo foundation,HTML 5,W 2011-04-12 01:59:29
Seven Ways to Boost Employee Morale
Do your employees drag themselves into work? Is office laughter a vague memory? Your employees' morale may need a boost.After all, low morale can lead to poor cooperation, low productivity and increased turnover -- and ultimately hinder a business from reaching its goals.Since employee morale can quickly build or break a company's success, effective leaders often keep a close eye on it and enlist simple and creative approaches to strengthen it. Here a few tactics to think about adapting for your...
Employee,Working, active,Attitute,Passion,Encouragement 2011-10-09 07:37:36
RECENT
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- more>>