SEARCH KEYWORD -- IOS APPLICATION DEVELOPMENT
Resolving error "SSL certificate problem: self signed certificate in certificate chain"
In a PHP application, cURL is frequently used to make connection to remote server to request some resource. It can be used to transfer data with different protocols such as HTTP, HTTPS, FTP etc. While using cURL in PHP, someone may get an error with message similar to "SSL certificate problem: self signed certificate in certificate chain". This may happen when cURL tries to make a SSL connection server and the server returns a server certificate which is self-signed and it's not trusted by the c...
Turn on SecurityManager in Java
SecurityManager in Java is to check whether the application codes can access some restricted resource such as file, socket etc. This can be used in applications which have high security requirements. With this feature turned on, our system resources can be secured with only permitted operations. When JVM starts, it will first check whether the SecurityManager is on by checking the system property java.security.manager, if it's on, then an instance of SecurityManager will be created and it can be...
SecurityManager,enable,program 2013-12-16 05:03:53
Why MySQL 8 drops support of query cache
Many of you may have heard or used MySQL's query cache, because it used to be a popular way to improve MySQL's performance. As an important feature for improving MySQL's performance, the query cache was often recommended as a solution for slow queries. However, why has MySQL 8 abandoned the query cache? Today, we will analyze and explore this decision. What is query cache? According to official document: The query cache stores the text of a SELECT statement together with the correspon...
MYSQL 8,QUERY CACHE 2023-03-11 09:05:17
Tribute to Java On Successful Completion Of 20 Years
There is a great news for fans of Java that this week Java have completed its 20 years of success and that’s why it is celebrating its 20th anniversary. Java is a language which show legacy with the piece of technology and this is virtually important as the powerful programming methods and related machines are JVM (java virtual machine). SUCCESSFUL LAUNCH OF NEW VERSIONS Java developers are specially celebrating their event due to the huge success of their language and they get success a...
Java software development, Java development services 2015-05-29 08:23:52
JavaScript's New Features: Exploring the Latest Additions to the Language
As the web continues to evolve, so too does the JavaScript ecosystem. With the release of ECMAScript 2023 (ES2023), JavaScript developers can now leverage a range of new features that promise to improve code quality, readability, and maintainability. In this blog post, we'll dive into some of ES2023's most exciting additions and provide practical examples of how they can be used in your projects. 1. Private Fields and Methods in Classes One of the most anticipated features in ES2023 is the intro...
JAVASCRIPT,ES2023 2023-04-16 01:41:58
World of Father of Ruby
"I am Yukihiro Matsumoto, I believe keyboard can change the world" is a video about Father of Ruby -- Yukihiro Matsumoto. This video introduces us a father, a husband rather than a programmer. Yukihiro Matsumoto shared his understanding about programming in this video. Computer is not quite smart, it cannot understand human languages, so if we want computers to complete jobs we assign to them, then we need something both human beings and computers can understand. That's why we have program...
Yukihiro Matsumoto 2013-08-30 22:45:26
Mobile devices are facing new threats
More and more companies allow employees to use smartphones and tablet PCs in workplace, but they are facing a new potential threat - malware embedded in games and applications.Dan Hoffman, network security company Juniper Networks mobile security director, said the application store is quickly becoming the main delivery mechanism of infected applications. Consumers purchase applications for their equipments through an online application store.As the consumers are free to download applicatio...
Mobile device,Data security,Malicious software 2012-04-05 13:00:57
Rebirth of Microsoft?
Only from the point of view of design and products, Microsoft may seem like an ongoing decline of the old giant: IE browser market share continues to drop, PC market continues to shrink where Windows depends on and tablet PC market gets rapid expansion, Windows Mobile, Windows phone perform not so well, even CEO Steve Ballmer is often ridiculed and accused. All these seem to indicate that Microsoft's golden era is over. But on the other hand, while its net profit for the past two years has ...
Commonly used AJAX frameworks
Have you ever wondered to design your website like desktop applications? Fortunately, with AJAX we can achieve this. By using AJAX, we no need to refresh the whole page when we just want to update a portion of a website such as the weather information or news panel. This makes our web apps look like desktop applications and bring good user experience to our visitors. You can create an XMLHttpRequest object every time when you want to initialize an AJAX call, unfortunately you may need repeat eve...
Stream API in Java 8
Overview In this lesson on Stream API in Java, we will study how we can put Streams to use to write efficient and much more maintainable code. We will also write code with and without Streams so that we are able to compare the two versions. Before doing all this, we must know how to create a Stream and process it and that is what we will get started with. Introduction to Streams We will be starting with creating Streams. Let us get started with the Stream<T> API which enables us to play w...
STREAM API,JAVA 8,DEVELOPMENT,TEAM 2018-01-30 00:14:46
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>