SEARCH KEYWORD -- Internet application



  Best “must know” open sources to build the new Web

Here the dump of my ultimate collection of online Web development resources and directory, oriented for the Front-End user Interface (UI). HTML5 and all related open standards are moving fast, but for now, building a whole Website/WebApp on top of that can be very inconsistent, especially across various browsers experiences.   So… how to embrace new awesome web technologies ? Now, as Web Developers and Designers, we have to build on top of more stable framework. It’s her...

   Open source,Wbesite,Web application,HTML     2011-06-09 03:10:24

  All I Know About Certificates -- Clients

 Finally, in last article we’ve covered the responsibilities of CAs, showing that being a CA isn’t simple and has high management costs, explaining why issuing certificates costs money! This article we will cover the client in this chain. Verifying Certificates as a Client For clients, verifying certificates isn’t simple either. Articles introducing TLS handshakes often mention "the server sends back a certificate, and the client verifies it," but in reality, as ...

   CLIENTS,WEBSITES,SSL CERTIFICATE,CERTIFICATE AUTHORITY,CA     2024-07-26 22:24:30

  Why email is crucial to Google, Microsoft and Yahoo

Google, Microsoft and Yahoo. These three companies rule webmail withGmail, Hotmail and Yahoo Mail, the three largest email services on the Internet.What might escape a lot of people, though, is just how important email services are for the online presence of those companies (yes, even for Google). To give you an idea, let’s look at some rather interesting website traffic numbers.Webmail share of site trafficAlexa can give you an estimate of how many peop...

   Gmail,Yahoo,Hotmail,Important,Email,Stat     2011-05-27 12:44:05

  Different types of keystore in Java -- Overview

Keystore is a storage facility to store cryptographic keys and certificates. They are most frequently used in SSL communications to prove the identity of servers and clients. A keystore can be a file or a hardware device. Three are three kinds of entries can be stored in a keystore depending on the types of keystores. The three types of entries are: PrivateKey : This is a type of keys which are used in asymmetric cryptography. It is usually protected with password because of its sensitivity. It ...

   JAVA,KEYSTORE,OVERVIEW,JKS,PKCS12,JCEKS,PKCS11,DKS,BKS     2014-08-18 02:09:54

  10 design principles of Google data center

Google's data center supports the world's largest search engine, smart phone application platform and cloud computing services. The data center is Google's core engine and competitiveness. Over the years, Google also plays the role of the founder and innovator of large-scale web service data center technology. Its data center infrastructure design is also at the forefront of the industry, including renewable energy use, low-power refrigeration, new energy utilization as well as data center room ...

   Google,Data center,Design principle     2013-03-11 19:09:25

  Java Doesn't Need to Be So Bad

I do a lot of Java coding and I enjoy it. I admit that there is a lot of typing, often a lot of boilerplate and getting even simple tasks done can involve too much work. Most of the tools that try to fix these problems trade one moment saved for another lost. Maven's XML based configuration file is a good example: Thank you for making my project easier to manage and I won't forget that you made me edit XML to do so. These are the things that you live with, these are the things you trade for ...

   Java,Coding,Enterprise application,Tedious     2011-12-09 07:50:20

  Test-Driven Development? Give me a break...

Update: At the bottom of this post, I've linked to two large and quite different discussions of this post, both of which are worth reading... Update 2: If the contents of this post make you angry, okay. It was written somewhat brashly. But, if the title alone makes you angry, and you decide this is an article about "Why Testing Code Sucks" without having read it, you've missed the point. Or I explained it badly :-)Some things programmers say can be massive red flags. When I h...

   Test driven,Application design,tool     2011-10-17 10:19:16

  Why programmers work at night

A popular saying goes that Programmers are machines that turn caffeine into code. And sure enough, ask a random programmer when they do their best work and there’s a high chance they will admit to a lot of late nights. Some earlier, some later. A popular trend is to get up at 4am and get some work done before the day’s craziness begins. Others like going to bed at 4am. At the gist of all this is avoiding distractions. But you could just lock the door, what’s so special a...

   Programmer,Sleep,Later,Efficiency,Habit     2011-12-16 10:13:27

  The dystopia from “Blade Runner 2049” to come to mobile phones

Next Games, a Finnish mobile game developer and publisher is working along with Alcon Entertainment for the development of "Blade Runner 2049". The Next Games CEO, Teemu Huuhtanen disclosed the news this month in Electronics Entertainment Expo 2017. Besides displaying only a screenshot, the companies are yet to uncover the details regarding the release date and the title of the game. Alcon Entertainment is busy in the production of movie "Blade Runner 2049", a sequel to the 1982's dys...

   MOBILE GAME DEVELOPMENT, MOBILE GAME SERVICE,GAMES APPS SERVICE,GAME APPLICATION SERVICE     2017-06-29 12:33:18

  CASSANDRA data model

Cassandra is an open source distributed database, it combines dynamic key/value and column oriented feature of Bigtable. Features of Cassandra are: Flexible schema, no need to design schema first, it's very convenient to add or delete strings Support range search on keys High usability, extensible. The single node error will not affect the cluster. We can think Cassandra's data model as a 4 or 5 dimensional Hash. COLUMN Columns is the smallest data unit in Cassandra, it is a 3 dimensional data...

   Cassandra,database,sort     2013-06-08 22:07:40