SEARCH KEYWORD -- Java software development



  Management Myth #1: The Myth of 100% Utilization

A manager took me aside at a recent engagement. “You know, Johanna, there’s something I just don’t understand about this agile thing. It sure doesn’t look like everyone is being used at 100 percent.”“And what if they aren’t being used at 100 percent? Is that a problem for you?”“Heck, yes. I’m paying their salaries! I want to know I’m getting their full value for what I’m paying them!”“What if I told you...

   Management,Utilization,Efficiency,Innovation     2012-01-05 08:13:41

  Why Apple Mac switches its CPU? The war between Intel and ARM

About three months ago, the new iPad Pro was released and it supports touch pad and mouse. It conveys a clear message to users that they want people to treat iPad Pro as a laptop.  As we know, iPad and iPhone are both using iOS, if iOS can run on laptop,  it means MacOS and iOS can merge and become a unified OS. And if Mac and iPhone can share the same OS, it means the same app can run in all places. It is becoming clearer and clearer that Apple is planning to do this exact thing. Late...

   APPLE,INTEL,ARM,WWDC,A14     2020-06-20 00:19:02

  Privacy & Security What Is the Difference?

                       When we discuss the internet today, there are two terms that we frequently here: privacy and security. While you may think that these two terms mean the same thing and are thus interchangeable, this isn’t true. As such, you’ll want to take a moment to learn the difference between these two terms. Understanding the Difference Between Privacy and Security When you open a checking account you share your p...

   SECURITY,PRIVACY,CYBERSECURITY     2018-12-27 00:29:57

  Using public key authentication in SSH

SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc.  To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...

   LINUX,DEBUG,SSH,PUBLIC KEY     2016-09-10 05:55:46

  Pair Programming: The disadvantages of 100% pairing

I’ve written a lot of blog posts in the past about pair programming and the advantages that I’ve seen from using this technique but lately I find myself increasingly frustrated at the need to pair 100% of the time which happens on most teams I work on. From my experience it’s certainly useful as a coaching tool, as I’ve mentioned before I think it’s a very useful for increasing the amount of collaboration between team members and an excellent way for ensuring ...

   Software development,Paring,Disadvantage     2012-01-11 12:08:47

  Cloud Computing’s most Basic Concepts-Service Models

With the containerization of Docker, Kubernetes, CNCF, and the development of open-source communities, related frameworks and technology is booming and iterating rapidly. Cloud Computing, been applied for many years, is pushing developers into the new technological era. Companies and developers who are not using or not planning to use Cloud-Native gradually feel tremendous pressure in keeping up with the technology trends. The first step is to understand the concepts of IaaS, PaaS, FaaS, SaaS, S...

   CLOUD,PAAS,IAAS,CONCEPT     2021-01-24 05:23:11

  Latest : Asp.Net 5 Beta 7 Is Now Available

Asp.net developers can now use the latest update asp.net 5 Beta 7 on both NuGet and Visual Studio 2015 to make good asp.net development practices. The update also has the first public preview of .Net Execution Environment for Linux and Mac without any need of Mono. To know how to use asp.net 5 beta 7, read this article further. You need to install the update first to use its features with Visual Studio 2015. You can download and install it from Microsoft’s official site. The update brings ...

   ASP.NET 5 BETA 7     2015-09-18 06:33:54

  ICO Checklist: How to Launch a Successful Initial Coin Offering

Amongst the many important things that took place in Blockchain industry in 2017, Initial Coin Offerings (ICO) may be considered as the most important of all. ICO helps business/idea owners to pre-sell access to their services or products and in a way to fund the development of those services or products. To help founders/ startups define an effective launch process and provide perspective on everything that they will need on their ICO journey, we have jotted down few points which will serve as...

   INITIAL COIN OFFERING,ICO CHECKLIST,INITIAL COIN OFFERINGS (ICO)     2018-05-28 07:32:53

  4 Things Every Great Online Teacher Knows

Virtual classrooms have become the new norm for education during the pandemic. Teachers from every school have to adjust to this new reality to ensure students keep learning even in the absence of a physical classroom setup.  Thankfully, there are various digital solutions to help teachers conduct online classes without much hassle. One such tool that has revolutionized the online learning market is a Learning Management System (LMS). For schools, the in-house learning management department...

   EDUCATION,ELEARNING,ILEARNING     2021-02-12 03:23:43

  Fujitsu CTO: Flash is just a stopgap

Flash is a necessary waystation as we travel to a single in-memory storage architecture. That's the view from a Fujitsu chief technology officer's office. Dr Joseph Reger, CTO at Fujitsu Technology Solutions, is that office-holder, and – according to him – flash is beset with problems that will become unsolvable. He says we are seeing increases in flash density at the expense of our ability to read and write data. Each shrink in process geometry, from 3X to 2X and onto 1X, ...

   Flash,Memory,Bottleneck,Limitation,Futur     2011-08-12 07:31:34