SEARCH KEYWORD -- HOSTING SERVICE



  How Digital Technology is Transforming Healthcare?

Digitalization is the trendsetter for every industry. Healthcare has also been greatly influenced by digital technology. In fact technology has greatly improved the working of healthcare organization and in turn, outcomes of healthcare services have risen to new heights. This is not an overnight dream but result of immense hard work and efforts done by IT industry. The amalgamation of IT and healthcare has yielded a new era of healthcare that is quick and more reliable as compared to olden days...

   HEALTHCARE TECHNOLOGY,PATIENT MANAGEMENT SYSTEM     2017-05-05 04:09:33

  How to monitor user behavior in webpage

Sometimes there is a need for website owners to monitor user behavior on the site so that they can know what pages are mostly visited and which parts are more popular so that they can provide better service to their users. These behavior usually contain user clicks, user mouse over events etc. These data can be sent back to server when triggered with some meta data. In this post, we will cover a few ways to monitor user behavior on a web portal and send data back to backend sever. 1. Synchronous...

   HTML,BEACON API,PING,USER BEHAVIOR     2019-06-29 06:06:59

  How to Impact the User Experience by Adding Surprising Details to Your Website?

Internet is improving day by day and the competition is also increasing for every businessman. Having an online presence is a necessity but just online presence won’t work you have to do something extra to grab your potential customers. Websites that are successful online are basically because of three reasons (1) Web technologies are evolving constantly and are allowing for more unique and advanced designs. (2) Technologies have become more accessible than they were earlier, and are empow...

       2015-01-29 23:46:01

  4 ways to obtain access token in OAuth 2.0

OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...

   OAUTH2,ACCESS TOKEN,REFRESH TOKEN     2019-06-29 07:12:03

  Fix WampServer offline issue

WampServer is a web server on Windows which provides easy to use features for PHP developers. You can easily setup a web server by installing WampSserver without much hard to understand configurations. After installing it and with a simple configuration, you just need to double click it and start all services and your server is gonna up.  If the server starts up normally, you will see a green icon which indicates the working status at the taskbar. But if you don't see the green icon shown u...

   APACHE,PHP,WAMPSERVER     2015-09-13 01:59:38

  10 notorious computer virus

The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...

   Computer virus,History,Security     2013-07-16 21:09:22

  Top 10 Tell Tale Signs Your Computer Has a Virus

The true genius of the 'computer' is its ability to make human lives easier. This is only achieved from the ability of running software such as word processing, number crunching with Excel or learning from the worlds largest source of knowledge, via web browsers. Today being connected to the internet is fundamental to leading a productive modern life. While internet is a boon it comes with its own share of problems. As internet users increase so does the instance of com...

   COMPUTER VIRUS, INTERNET SECURITY, DATA SECURITY, ANTIVIRUS, COMPUTER REPAIR     2017-03-19 21:05:12

  How to check why Vim is slow

On *nix, some processes may not be able to start up, software runs very slowly suddenly and software's "Segment Fault" are some issues faced by many *nix users. Here we show you how to use truss to trace why Vim becomes slow suddenly. Operating system : FreeBSD-5.2.1-releas vim version is 6.2.154, after typing vim on command line, sometimes we need to wait for a few minutes to get into the edit interface and there is no error output. After carefully checking .vimrc and all vim settings, there ar...

   vim, truss, linux     2012-11-26 11:54:35

  Resolve high CPU usage issue caused by file_get_contents in PHP

Sometimes a Linux server which runs Nginx + PHP-CGI(php-fpm) web service may experience sudden system load increase and the CPU usage is around 100% for many php-cgi processes when checking with top command. If this happens, file_get_contents may be the cause if it's used in the PHP script. In lots of web applications, normally there are lots of API requests based on HTTP. Many PHP developers like to use file_get_contents("http://example.com/") to get the API response because it's simple to...

   PHP,FILE_GET_CONTENTS,PHP-CGI     2018-11-09 21:35:00

  5 Innovative Web Design Trends Startups Should Consider Adopting

Nowadays, every market has the tendency to shift and change on a whim, and it is no different in the world of web design. No one in their right minds has the time to sit and watch the market for possible shifts as it takes up too much time and no one can really predict what’s going to happen so we’re just forced to adapt and improvise. Currently, there are 5 trends that have caused an uproar and have reshaped the online marketplace and are worth looking into. Think Big First an...

       2017-11-02 06:12:47