SEARCH KEYWORD -- MAIN PACKAGE
Generate certificate in Java -- Self signed certificate
This is the first post in this series which I will show you how to generate SSL certificate in Java programmatically. Certificates are frequently used in SSL communication which requires the authentication of server to client. This is to make the client to trust that the server is actually the one it claims. Certificates are really important on the Internet. All HTTPS communications on the Internet need the server side to present their certificates signed by trusted CAs. The basic flow of a requ...
Java,Certificate,X509 2014-07-30 07:42:18
Only 4G can resolve the conflicts between China Telecom Carriers and WeChat ?
Why WeChat has made the three big Chinese telecom companies uncomfortable? Let's analyze from both technical and commercial levels. From a technical point of view, Mr. Huang, Dean of China Mobile Research Institute, described the impact of "always online service" applications like WeChat. Instead of using technical terms, we will explain in simple vivid phrases. First, mobile QQ, or WeChat, will have their own "request frequency". These requests are sent to the carrier network, to check the re...
$40 million per year to keep Wikipedia running
Wikipedia is an incredibly frugal and efficient nonprofit organization. It serves half a billion visits per month. But do you know how much it costs to keep this huge website running? According to 2012-13 Wikimedia Foundation Annual Plan, the expected spending is around $40 million. Some may argue that Wikipedia is just a site with "just text", why does it cost so much? Oliver Emberton shared his view. To keep Wikipedia running and serve 500 million visits per month. First, you're going to need ...
9 fields platform companies need to fight for
If you are person reading technology news much, you will find a large part of the tech news are about a few companies : Apple, Google, Facebook, Amazon and Microsoft, in which the first four are today's "Big Four (platform)" as said by Google Chairman Eric Schmidt. These giants have both competition and cooperation in many areas, and each has its own place in the world, with Schmidt's words, Google dominates search, Apple designs device, Amazon occupies e-commerce and Facebook leads social. Alth...
Big four, Future,Software and hardware 2012-10-20 09:50:43
Eight C++ programming mistakes the compiler won’t catch
C++ is a complex language, full of subtle traps for the unwary. There is an almost infinite number of ways to screw things up. Fortunately, modern compilers are pretty good at detecting a large number of these cases and notifying the programmer via compile errors or warnings. Ultimately, any error that is compiler-detectable becomes a non-issue if properly handled, as it will be caught and fixed before the program leaves development. At worst, a compiler-detectable error results in los...
C++,Compiler,Error detection 2012-04-08 09:55:20
Chrome’s WebRTC roadmap
Last January, Chrome was the first major browser to preview WebRTC, HTML5's new real time audio and video stack. Since then, we've been hard at work keeping up with the evolving specification, fixing bugs and listening to the web community’s feedback. The main parts of the WebRTC specification are now stable and are coming soon to all 200M+ Chrome users. With this blog post, we want to help developers plan for what will be introduced in this first stable release later this year. ...
WebRTC,Google,Open source,Roadmap 2012-04-12 10:27:51
Our Go Cache Library Choices
In Build a Go KV Cache from Scratch in 20 minutes, I walked you through what matters when writing a local cache, and eventually implemented one, whose performance was beaten badly by that of the popular go-cache on Github though. However, the bright side is that we can learn a lot from those excellent Github Go cache products, studying their features, applicable scenarios, and implementations, and extracting what we need. In this article, I will mainly analyze and compare the four...
GOLANG,CACHE,GO-CACHE,BIGCACHE,GOURPCACHE 2022-04-16 07:48:11
Access control in Java -- doPrivileged
Previously we have introduced how Java performs permission check to protect resource access. What if sometimes we need to give some class the temporary access to some resource which it initially doesn't have? AccessController provides six doPrivileged methods to fulfill this requirement. These six methods have below signatures : static T doPrivileged(PrivilegedAction action)static T doPrivileged(PrivilegedAction action, AccessControlContext context)static T doPrivileged(PrivilegedExceptionA...
JAVA,SECURITY,DOPRIVILEGED 2016-03-08 05:46:42
Remote execute command in Java example
Frequently there is a need to logon to a remote system and run some commands or programs to get the output, many software can serve this purpose such as putty and gitshell.These software usually provide secure access to the remote system. But have you ever wondered what to do if you need to run commands on many different systems at the same time and get all these results back at a single place? Especially in big data era, many tasks may run on different distributed systems and you want o have a ...
JSch, Example, Distributed system, SSH2 2014-12-12 03:20:19
Pros and cons of 6 most popular test automation frameworks
Not everyone dappling into systems for test automation knows how to leverage the maximum benefit and keep them going in top shape for a long time. That's where test automation frameworks come in – they're basically sets of rules, standards, protocols and guidelines which can be incorporated into practice or simply followed to provide beneficial execution environments for automation test scripts. Why are test automation frameworks important? Test automation frameworks offer m...
RECENT
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- more>>