SEARCH KEYWORD -- IBM
How can you test if your VPN is working properly?
Installing a VPN on your device is one of the essential steps you need to take in order to have a safe and pleasant online experience. It good functioning is in your best interest and this is why you need to make sure that your VPN is working properly. Unfortunately, a lot of problems can occur if it turns out that your VPN is not up to the task and that it has some leaks. Can a leak really occur? To answer you most directly – Yes! Yes, it can! Unfortunately, no system is perfect an...
VPN 2020-09-17 06:53:19
IDEs for Java programmers
IDEs are great helpers to programmers. They can help programmers write less error-prone programs with less time. They have become an inevitable part of many programmers. As a Java developer, you may be familiar with Eclipse already. But do you know other IDEs for Java programmers? We will give an overview of different IDEs for Java programmers. These IDEs are Eclipse, Intellij IDEA, NetBean and BlueJ. Eclipse Eclipse is the most widely used IDE for Java programmers. It's an open source IDE whic...
How Kafka achieves high throughput low latency
Kafka is a message streaming system with high throughput and low latency. It is widely adopted in lots of big companies. A well configured Kafka cluster can achieve super high throughput with millions of concurrent writes. How Kafka can achieve this? This post will try to explain some technologies used by Kafka. Page cache + Disk sequential write Every time when Kafka receives a record, it will write it to disk file eventually. But if it writes to disk every time it receives a record, it would ...
Unix directory hierarchy history
As a beginner user of Unix or Linux, people would frequently get confused about the use of different directories of the system. For example, there is a /bin directory under root(/), it is used to store binary files. However, there are /usr/bin and /usr/local/bin under /usr which are used for storing binary files as well. Some systems even have /opt/bin. What are the differences among them? Though there are articles explaining different directories in *nix such as Filesystem Hierarchy Stan...
UNIX,LINUX,FILESSYTEM,DIRECTORY HIERARCHY,HISTORY 2016-10-21 23:47:17
Amazon is a good company but doesn't have the best business model
Public opinion about a company is usually based on its performance. If it performs well, people will praise it, otherwise people will blame it. In 1999, Apple was still a broken apple(Steve Jobs's talent and effort was paid off yet). Public opinion about Apple was the closed model caused Apple's failure. They built hardware themselves, developed software themselves and delivered service themselves, this is certainly not sustainable. But Steve Jobs let everyone see this new model. In order to con...
Business model,Amazon,Apple, Microsoft 2013-07-02 11:34:45
How Artificial Intelligence Is Helping Fight Environmental Challenges
Environmental challenges like climate change, global warming, air pollution, etc., all pose a severe threat to humans. According to the World Health Organization (WHO), around 3.6 billion people are already living in areas vulnerable to climate change. Climate change is predicted to result in an additional 250,000 deaths between 2030 and 2050. To solve environmental problems that have long presented difficulties for ecosystems and communities, artificial intelligence (AI) is emerging as a...
AI, ENVIRONEMNT 2025-02-17 04:06:08
Oracle CEO Mark Hurd : IBM PureSystem is far behind Oracle
Oracle CEO Mark Hurd had an interview with Chinese media in San Francisco on 19th April. Mark Hurd first introduced different levels of Oracle's overall strategy: 1) the product must achieve best among similar products; 2) system open, vertical integration to provide customers with maximum performance; 3) Industry specific solutions; 4) give users the right to choose and the integration of the cloud environment (private cloud, public cloud, mixed cloud). In addition, Mark Hurd share his own...
Oracle,IBM,Pureystem,Hardware/Software 2012-04-19 07:17:24
Building Security onto Your Mobile Application
Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...
Web Application Development Company, iPhone App Development Company 2015-08-21 07:22:32
Generating CSR using Java
A CSR(Certificate Signing Request) is a kind of request generated by an application and is to be sent to a Certificate Authority to create a signed certificate which can be distributed. It usually contains certificate information such as subject name, public key info and signature info. In Java, keytool can be used to generate a certificate request with option -certreq. But sometimes if an application wants to create a CSR programmatically, keytool will not do a favor, instead you should u...
JAVA,SECURITY,CSR,CERTIFICATE REQUEST 2016-05-25 04:49:17
Java Cipher encryption/decryption example
In Java, Cipher is the API for doing data encryption/decryption. Many cryptographic algorithms such as AES, DES, RC4 etc can be specified when creating Cipher instance. The Cipher instance calls the underlying algorithm specific implementation to do the actual encryption/decryption. Before doing the encryption/decryption, a key needs to be created and it will be used to do the encryption/decryption. A sample program for performing all these is : import java.security.Key; import javax.cryp...
Java, Java Security, Cipher, Example, Sample 2015-08-14 07:07:10
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>