SEARCH KEYWORD -- IMAGE LOADING



  Strict mode in JavaScript

1. Introduction In addition to normal mode, ECMAScript 5 includes the other mode : strict mode. It means it will make JavaScript codes execute in a more strict environment. The purposes to have strict mode are: Remove some unreasonable and parts of JavaScript syntax. Reduce some of the quirk behaviors. Remove some insecure parts of code execution. Make the execution environment more secure Improve interpret efficiency and increase the execution speed Build foundation for future JavaScript versi...

   JavaScript, Strict mode. Introduction     2013-01-17 05:00:26

  Using public key authentication in SSH

SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc.  To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...

   LINUX,DEBUG,SSH,PUBLIC KEY     2016-09-10 05:55:46

  What happens on the Internet in one minute?

In one minute, 216,000 images are shared on Instagram, $83,000 sales happen on Amazon, 1.8 million Likes are clicked on Facebook, also 72 hours videos are uploaded to YouTube. This image is from Omee and it shows us what happens on the Internet in one minute. For example, how many Tweets are posted, how many pictures are viewed, how many minutes communication through Skype. The data on the graph is from PC Mag, Business Insider and other websites. In one minute, 2 million searches on Google, 70...

   Infographic,60 seconds,Internet     2013-08-01 06:47:51

  Cross platform portable class libraries and .net

What’s that happy little feature developers are admiring? Oh that’s Portable class libraries that have been chugging along, during their thing and delivering to the point results wherever used by developers. If a developer is not writing .net applications for multiple targets, then he likely hasn’t bumped into these libraries. However, developers who are writing .net apps and want these apps to run on every platform from watches to tablets to desktops to the cloud, they can ava...

   asp.net, Cross platform     2015-01-12 05:06:44

  Sass Style Guide: A Sass Tutorial on How to Write Better CSS Code

Writing consistent and readable CSS that will scale well is a challenging process. Especially when the style sheets are getting larger, more complex, and harder to maintain. One of the tools available to developers to write better CSS are preprocessors. A preprocessor is a program that takes one type of data and converts it to another type of data, and in our case CSS preprocessors are preprocessing languages which are compiled to CSS. There are many CSS preprocessors that front-end develop...

   CSS,SASS,TUTORIAL     2015-09-17 06:40:47

  Chrome to block mixed content downloads in version 86

Google has announced its plan to block mixed content downloads in Chrome in February 2020 and now the day to block mixed content downloads is coming soon as we are nearing October when Chrome 86 is supposed to be released. What is mixed content downloads? According to Google, it is non-HTTPS downloads started on secure pages. For example, if you access a page called https://example.com/download, and in this page, there is a download link to http://download.example.com/something, ...

   CHROME,MIXED CONTENT DOWNLOADS     2020-09-18 21:10:53

  How big is sizeof structure?

First let's see the codes of a structure: struct node{ int a; int b; }; Question : What's sizeof(node)? The answer is very simple, on a 32 bit machine, an int will take 4 bytes and two ints will take 8 bytes. So sizeof(node) is 8. The answer for the above codes is 8, then how about the following structure: struct node{ char a; int b; }; Question : Then what's sizeof(node) now? int takes 4 bytes, char takes 1 bytes, is the answer 5? Now the answer may not be 5, on some mac...

   Data structure alignment, pack     2012-10-29 12:13:37

  Different types of keystore in Java -- PKCS12

PKCS12 is an active file format for storing cryptography objects as a single file. It can be used to store secret key, private key and certificate.It is a standardized format published by RSA Laboratories which means it can be used not only in Java but also in other libraries in C, C++ or C# etc. This file format is frequently used to import and export entries from or to other keystore types. Next we will explain the operations which can be performed on PKCS12 keystore. Create PKCS12 keystore Be...

   Java, PKCS12, keystore, tutorial     2015-01-04 21:08:49

  Apple patent shows they are developing "Killer" 3D Camera

This is not the first time that Apple patent shows they have interest on 3D camera technology. In November last year, one Apple patent shows that Apple is developing advanced three-dimensional object recognition and verification technology. According to PatentlyApple report (March 30,2012) one patent released this week shows that Apple is developing a 3D camera technology for the future iOS devices. This 3D camera is described as an advanced component with advanced micro-lens, depth, chrom...

   3D Camera,Apple,Patent     2012-04-03 07:46:35

  E-commerce "Whampoa Military Academy" in Guangdong

There are five projects being initiated this year in Guangdong Province to help the young graduates to find jobs or become entrepreneurs, such as providing more internship opportunities to university graduates and setting up total 200 million amount loans to help starting their own business. Among all the announced plans, the “Youth E-Business Elite Plan” attracts the most attention. This plan relies on Taobao University of Guangdong Youth College to train various e-commerce talents...

   e-commerce,Guangdong     2013-04-01 06:49:32