SEARCH KEYWORD -- JAVA TECHNOLOGY



  Alibaba CEO Daniel Zhang is no longer president of Taobao Software Co. Ltd

According to a recent change record from Chinese company registration information portal, the Chinese e-commerce giant Alibaba Group CEO Daniel Zhang is no longer the president of TaoBao Software Co. Ltd. His successor is Shan Dai, who is one of the founders of Alibaba and now Taobao CEO. Along with the change, Daniel also quits as the president of Tmall technology company which is also one of the subsidiaries of Alibaba Group focusing on big brands. Taobao (China) Software Co., Ltd. was establ...

   CEO,ALIBABA,TAOBAO,DANIEL ZHANG     2022-04-24 07:45:48

  TIOBE : Where is that next big programming language?

TIOBE has released the Programming Community Index for May 2012 a bit late. The top 3 languages do not change compared to last Month TIOBE : C overtakes Java as the No.1 programming language, they are still C,Java and C++. However, the share of Java is continuing dropping, Objective-C is steadily rising  Other languages which have rising trend are Visual Basic.NET,PL/SQL and Logo.The last 8 years not much has changed in the top 10 of the TIOBE index except for Objective-C (in) and Del...

   TIOBE,2012,May,King     2012-05-12 01:18:27

  3 meanings of Stack

We may frequently see stack when we read programming books. But many times we may be confused about the different meanings of it. This term actually has three common meanings. Here we explain the three different meanings of Stack in programming. 1. Data structure The first meaning of Stack defines a method for storing data. Its feature is LIFO9Last In First Out). In this data structure, data are accumulated level by level. The data last put in is added at the top of the stack. When using the dat...

   Stack,Memory,Data structure     2014-02-24 04:56:46

  Is Facebook News Feed copied from Google+?

According to Sina Tech, Facebook released its new News Feed this week. However, this design is considered to be copied from Google social network the Google+.Google senior vice president of technology infrastructure Urs Holzle said: "Proud to see +Mark Zuckerberg promote G+.  Imitation is the sincerest form of flattery!"Although technology companies will learn from each other's designs and there are not any effective ways to display pictures on the web and mobile devices, Facebook's ne...

   Facebook,News Feed,Google+     2013-03-10 04:37:18

  4 types of programmers

Not every one who writes code is a programmer. Programmers are people who live with programming. There are 4 types of programmers: scientist, coder, expert and artisan.Scientist, they are more like mathematicians rather than programmers. They invented various theories, algorithms and terminologies. Proofs and calculations in textbooks are all from these people. Moreover other programmers more or less benefit from their work. Sometimes one paper published by them can change the way of thinking of...

   Programmer,Coder,Expert     2013-07-13 09:19:03

  Introduction to DTLS(Datagram Transport Layer Security)

Secure communication has become a vital requirement on the Internet. Lots of information transferred through the Internet are sensitive data such as financial transactions, medical information, media streaming etc. To ensure security of data transferred on the Internet, a few secure protocols have been designed including SSL/TLS and IPsec. Many large websites in the world have adopted TLS. Apart from SSL/TLS, there is some other protocol designed to be used in special cases. One of them is ...

   JAVA 9,DTLS,TLS,SECURITY     2016-04-02 05:55:36

  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10

  What's wrong with us in Mobile Era?

Every day when I surf the Internet, I find much news about new smartphones and Android, iOS apps. Also I can find many people use iPhones and other smartphones with Android OS. Apparently we are now in Mobile era. People can find tons of news that says how Mobile has changed our life, made our life simpler and how easy we can know the world with mobile technology. Yes, it's true, now we only need to press a button, we can know what happens in USA which is thousands kilometres away from us. We ca...

   Mobile,Cold,Stay away,Smartphone     2012-01-07 12:10:35

  Let 's write some front end codes

I've seen a lot of arguments that there is no much technical value writing web portal, I think that the vast majority of good programmers will try many different things. The low level development and machine learning are not the only technologies which are  full of wisdom and challenges, I wrote web site for a few years, it is difficult to say that this is my initial interest, although I touched on other technologies as well, I still feel building website is challenging. Front end developme...

   Front end development, JavaScript,CSS     2013-01-22 04:00:24

  Java development company briefs about Lazy and Eager fetch in JPA/Hibernate

Normal 0 false false false EN-IN X-NONE X-NONE

   JAVA,JAVA DEVELOPMENT COMPANY,LAZY FETCH,EAGER FETCH,JPA,HIBERNET     2016-07-08 06:08:28