SEARCH KEYWORD -- HEALTHCARE APPLICATION DEVELOPMENT
JSP connect MySQL
To connect MySQL with Java Server Page(JSP). Some steps should be followed:Step 1: Download MySQL JDBC connector driver from the Internet. URL: http://dev.mysql.com/downloads/connector/j/Step 2: Put the jar file downloaded in Step 1 in the Tomcat common lib folder and add this jar file to the CLASSPATH so that the JSP page can find the specified class.Step 3: Create the JSP page with MySQL connection : Example is shown below: <% String driver="com.mysql.j...
MySQL,JSP,Connection,Driver,Download 2011-05-11 10:04:57
Handling Plugins In PHP
A common problem that developers face when building applications is how to allow the application to be "plug-able" at runtime. Meaning, to allow non-core code to modify the way an application is processed at runtime. There are a lot of different ways that this can be done, and lots of examples of it in real life. Over a year ago, I wrote a StackOverflow Answer on this topic. However, I think it deserves another look. So let's look at some patterns and common im...
What does a contemporary web developer need to know?
The early ages of web era mainly consisted of webpages of text and links. At that time,Netscape was the still dominant of web browser market. As a web developer, you could develop web apps(or better to call web pages) easily with knowledge of HTML only. But with the evolution of web, new technologies came out, we can see more robust web apps around us everywhere. Today as a web developer, the ability to run and configure a web server and edit HTML to create some simple web pages has lost almost ...
Web design,Advice 2013-12-20 06:31:51
Why do C++ folks make things so complicated?
This morning Miroslav Bajtoš asked “Why do C++ folks make things so complicated?†in response to my article on regular expressions in C++. Other people asked similar questions yesterday. My response has two parts: Why I believe C++ libraries are often complicated.Why I don’t think it has to be that way. Why would someone be using C++ in the first place? Most likely because they need performance or fine-grained control that they cannot get somewhere else. A Ruby programmer...
C++,Complicated,C++ PRogrammer,Design pattern 2011-12-31 15:45:39
Check whether a remote server port is open on Linux
As a system administrator or network engineer or application developer, there is a need to check whether a port on remote server is open so that you can tell whether the service under check is running or not. In this post, we would cover a few methods to check whether a remote server port is open or not on Linux. telnet telnet is the most frequently used command on both Windows and Linux to check port. The simple usage for this command is telnet [host] [port] When the port is open, the o...
6 Astounding Joomla Templates That Support EasyBlog
No doubt, blogging offers a fabulous platform where one can express his emotions, and share his views with others over the Internet. It can also help you leverage your business, as you can publish suitable blogs to efficiently promote your products and services. Moreover, one can also use blogs to exhibit his online portfolio and thus, benefit his business. Today, there are several blogging platforms that offer a brilliant blogging experience. However, Joomla makes a superior choice among ...
joomla, joomla templates, mobile template 2015-07-03 01:25:19
Why Objective-C is Hard
As an active member of "The Internet" and vocal Objective-C coder, I get a lot of questions surrounding the language. They're often framed around thinking about learning the language or trying to write an app, but they also usually involve a phrase like "Objective-C looks really hard" or "what are all those minus signs about?" Both of these are pretty good questions, and I'd like to address why someone might be more hesitant to jump into iOS or OS X development compared to, say, Ruby or J...
Objective-C,difficult,hard,reason,analysis 2012-03-07 05:11:28
When a CA becomes untrustable
Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...
APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN 2016-10-01 23:03:44
Four reasons we don’t apply the 80/20 rule
Why can’t we make more use of the 80/20 rule? I’ll review what the 80/20 rule is, explain how it can be powerful, then give four reasons why we don’t take advantage of it. What is the 80/20 rule? The 80/20 rule is amazing when you first learn about it. It says that efforts and results are often very unevenly distributed. You’ll get 80% of your results from the first 20% of your efforts. For example, maybe your top 20% of customers will provide 80% of your profit. O...
80/20,Development,Profit,Revenue,Effort 2012-02-08 10:03:50
Why I Will Never Feel Threatened by Programmers in India
I got a call from a friend of a friend the other night. It was a fellow with whom I’d talked 11 months ago about a project he and his partner were looking to start. We established then that I wasn’t the guy for him, that I was likely too expensive for their big-dreams, small-means budget. Fast forward to present day: their project is still not launched, it’s still not right. They’ve paid for something between 600-700 hours of development with a firm in India, an...
Indian programmer,Outsourcing,Poor quality,Low cost 2011-12-05 13:00:04
RECENT
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- more>>