SEARCH KEYWORD -- HTTP Cache



  Is ERP on Cards? - Here is a Comprehensive Buying Guide for the Solution

2015 is around the corners, knocking at the doors!!And it usually happens; with year coming to a closure; a lot of speculations are already under way for the next year!  As a matter of fact, with a constant technological progress, the business world has been set abuzz with numerous theories about the possible and path-breaking trends which might change the course of action. And customized ERP software solution has not been left out of these speculations. It is usually seen that implementati...

   erp, enterprise, erp software solution, erp system     2015-01-20 04:50:51

  Singleton Design Pattern in Java

Singleton is frequently used in applications where resource may be expensive to create and no instance specific state needs to be maintained. For example, when creating database connection, a singleton may be needed. Today we will share the famous Singleton design pattern in Java. 1. Definition Singleton design pattern is a design pattern that restricts the instantiation of a class to one object. It is one of the most well-known design patterns. 2. Application Singleton ...

   DESIGN PATTERN,SINGLETON,MULTITHREAD,JAVA     2020-04-11 02:16:28

  Some measures for improving Linux server security

The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...

   Linux server,Server security     2012-08-21 05:08:50

  HeartBleed: Inside the heart, what happens to a normal WEB user?

To be brief, our email, IM, facebook etc. are at the risk, so try to minimize the access in these few days. Especially we should try to avoid log into our internet-banking, because we may expose our user id and password. Also later when the service providers fix the bug, we would better to change a new password for all the web accounts that are important to us. Here comes the technical explanation. You might notice before that a lot of websites use URL starting with "https". For example, https:/...

   HeartBleed,Analysis     2014-04-09 22:41:43

  Necessary Elements for Developing a Website

Website has given businesses a great way to communicate with their existing customers. Without a user-friendly and attractive website, you may not receive as many customers as you may have expected prior launching your website. Therefore, it is usually advisable to outsource your web development services to one of the best web development companies in Singapore. Web development services in Singapore ensures proper development of your website without missing out on any important element. These a...

   WEB DEVELOPMENT SERVICES IN SINGAPORE     2015-09-30 07:07:27

  Top 8 website operation laws

As a website operator, in addition to have some necessary professional knowledge to master a website, such as prototype planning, interaction design, SEO, as well as basic html code, you should also know more about some of the theories which are good for site operations to ensure that the site can be long-term, stable. 1. Law of 250 Girard thinks every person knows at least 250 people. If you win the goodwill of a customer, it means you win the goodwill of 250 individuals; Conversely, if you off...

   Website management,Rules     2012-09-13 20:55:50

  8 powerful Chrome extensions

Chrome is a powerful browser, one reason why it's so powerful is that it has abundant extensions. There are various extensions in Chrome Web Store. They can meet all kinds of needs you have and they are very easy to install as well. Here we share with you 8 powerful extensions on Chrome. All of them can be downloaded from Chrome Web Store Holmes A bookmark search tool, if you have lots of bookmarks and you even don't know where they are. Hplmes can help you find them in real time by matching tit...

   Chrome,extension     2013-07-31 01:24:18

  5 good anti SOPA designs

The Stop Online Piracy Act (SOPA) is a United States bill to expand the ability of U.S. law enforcement to combat online copyright infringement and online trafficking in counterfeit goods. Its goal is to protect the intellectual-property market and corresponding industry, jobs and revenue. However since its proposal, many organizations protest against it as they believed it would threaten free speech and innovation, and enable law enforcement to block access to entire internet domains due t...

   SOPA,PIPA,design     2013-12-24 03:26:31

  Efficiency of code execution

If you want to optimize your program codes, you need to find their Hotspot, i.e, the codes which are executed most frequently. If you can optimize this portion of codes a bit, you may gain much improvement of your code efficiency. Here I give you three examples about efficiency of code execution.1. PHP's Getter and Setter (From Reddit)This example a quite simple, you can skip it if you want.Consider the code below, we can find it's slower when we use Getter/Setter method to read a member variabl...

   Code, Efficiency,Analysis,Trick     2012-07-13 10:59:21

  What does super.clone() do?

Object class has a protected clone() method declared to make it possible for all classes make a clone of itself when needed. The clone() is often used when a new instance of the class is needed while at the same time to maintain the same state as the original object. Any class which wants to have clone enabled has to implement the marker interface Cloneable. If a class which implements Cloneable doesn't override the Object.clone() method, the Object.clone() method will be called to just make a b...

   Cloneable,super.clone(),clone,Java     2015-01-07 05:25:52