SEARCH KEYWORD -- HTML WEBSITE
App Store Visibility – A Few Do’s and Don’ts
Discovery and Visibility are the two vital components for any mobile app, if the app publishing company is to derive some amount of revenue from their apps. However, the lack of organized marketing channels, a well-laid user acquisition strategy or even a poorly designed app often reduces the chances of being widely adopted by the users. In short, it hampers the possibility of the app being successful. Here is a list of few things to keep in mind while posting an app to the app stores. What to ...
Mobile Application Development Company, Android App Development Company, Mobile App Company, Android 2015-09-01 07:52:24
Hidden messages in logos
A logo is the simplest thing a user can remember about a product or a company. A good logo design will leave deep impression to customers. Each logo tries to convey either their product information or company vision to customers, this information may be easily understood with a glance or it contains some hidden messages which need us to figure out. Today we share some logos which contain some hidden messages. 1. Fedex The arrow between E and X means Fedex will deliver the product to the right p...
What has Google done on improving programming languages
Google is now becoming the most innovative IT company in the world. Every now and then they would deliver one revolutionary product to us such as Google Glass, Google Fiber, Automatic Mobile Cars etc. All these great products are backed up by the powerful software system built into. Google has used many programming languages to develop these software and they have put much resource in improving the programming languages they use and we use today. What has Google done in improving programming lan...
Google,Programming 2014-02-21 09:36:34
How does computer boot up?
The whole boot process of computer can be summarized in 4 phases. 1. BIOS In the 70's read-only memory(ROM) was invented. The boot program is written into ROM, the first thing the computer does is to read and execute this program when it's powered on. The program in this chip is called "Basic Input/Output System" (BIOS). 1.1 Power-On Self-Test The BIOS will first check whether the computer hardware can fulfill the basic conditions for booting up, this process is called Power-On Self-Test...
XMLHttpRequest Level 2 user guide
XMLHttpRequest is a web browser interface, it makes it possible for JavaScript doing HTTP(s) communication. Microsoft's IE5 first introduced XMLHttpRequest, because it's so useful that many other browsers also adopted this. AJAX came to the front since. However, this interface is not standardized, implementation among different browsers is different, with the emerging of HTML5, W3C is considering to standardize this interface. In February 2008, they proposed a XMLHttpRequest Level 2 draft. This ...
XMLHttpRequest, progress, upload, binary data 2012-09-19 11:51:50
IDEs for Java programmers
IDEs are great helpers to programmers. They can help programmers write less error-prone programs with less time. They have become an inevitable part of many programmers. As a Java developer, you may be familiar with Eclipse already. But do you know other IDEs for Java programmers? We will give an overview of different IDEs for Java programmers. These IDEs are Eclipse, Intellij IDEA, NetBean and BlueJ. Eclipse Eclipse is the most widely used IDE for Java programmers. It's an open source IDE whic...
Generate certificate from cert file in Java
A certificate is often used to prove the identity of a server. The certificate will contain information such as the subject and issuer of the certificate. It will also contain the validation date of the certificate. A certificate is often exported to an external cert file which is transferred over the internet. We will often see its use in SSL communication which provides secure communication between two entities. In this post, we will show how to read the data from an external certificate file ...
PKCS12,CertificateFactory,Example,Java,X509 2015-06-08 06:47:05
Top 3 Cybersecurity Trends to Watch Out for Today
One trend in cybersecurity that never changes is that it’s getting more important with every passing year. According to statistics, the number of cyberattacks and severity of the losses they incur are growing at an alarming rate. Every day about 24,000 of malicious mobile apps get blocked yet more pop up overnight. For a business today cybersecurity isn’t an option, it’s a necessary measure one needs to invest in heavily. And it’s essential to follow the trends and develo...
SECURITY,CYBER SECURITY 2019-05-14 09:03:24
Launch Java process programmatically in Java
In some cases while working on some automation testcase, developers would like to launch Java process programmatically so that the tests can be ran without manual intervention. Java provides such methods to achieve this. ProcessBuilder can be used to build a Java process which can be launched when everything is ready. Basically it can take a list of parameters which are similar to the command line options/arguments. For example, if you want to launch a Java process, you can do followi...
JAVA,PROCESSBUILDER,COMMAND LINE 2016-04-27 04:03:30
How many bytes a boolean value takes in Java?
Have you ever wondered how many bytes a boolean value takes in Java? One byte, this might be the answer comes out of your mind right away. But is it? Let's dig in more. Per Oracle documentation on boolean value definition, there is below statement: boolean: The boolean data type has only two possible values: true and false. Use this data type for simple flags that track true/false conditions. This data type represents one bit of information, but its "size" isn't something that's precisely defin...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>