SEARCH KEYWORD -- PROGRESSIVE WEB APPS



  How Can Your Data Be Stolen Online?

In 2019, according to Statista, nearly 165 million sensitive records were exposed in the US due to data breaches. Unfortunately, data theft is not going anywhere. Hackers are using increasingly sophisticated methods to steal information, but thankfully there are measures you can take to ensure your data stays safe. Here are some of the most common ways people get their data stolen online and how you can take precautions against the methods cybercriminals use. Human Error Hacking is one of the m...

   DATA SECURITY,PROTECTION KID     2021-01-27 19:46:05

  Cloud Computing’s most Basic Concepts-Service Models

With the containerization of Docker, Kubernetes, CNCF, and the development of open-source communities, related frameworks and technology is booming and iterating rapidly. Cloud Computing, been applied for many years, is pushing developers into the new technological era. Companies and developers who are not using or not planning to use Cloud-Native gradually feel tremendous pressure in keeping up with the technology trends. The first step is to understand the concepts of IaaS, PaaS, FaaS, SaaS, S...

   CLOUD,PAAS,IAAS,CONCEPT     2021-01-24 05:23:11

  The 10 most expensive domains on the Internet

Domain name is the name which we usually type on the web browser address bar. For example, we may type http://www.apple.com on the address bar, here www.apple.com is the domain name. Can you imagine that this domain is worth millions of dollars? We believe that most domains are initially for starting related business and easy for users to remember. But with the popularity of the business, some of the domains become valuable and they are more expensive than some small companies. Below are some mo...

   Domain name,Price     2013-01-01 10:32:06

  Kubernetes Authentication & Authorization 101

If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αὐθεντικÏŒς authentikos, “real, genuine”, from αὐθέντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...

   RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES     2021-06-05 23:19:18

  Xiaomi band with screen is around the corner

On May 10, the Chinese electronics company Xiaomi will hold a new product release conference to reveal its Xiaomi MAX, a new model of Xiaomi phone. Along with this phone, there will be other product releases as well, one of them will probably be the next generation of Xiaomi Band. In April, Lei Jun, Xiaomi CEO, seemed leak the look and design of a new wrist band while he was attending a company's year end party. This new wrist band should be the next generation of Xiaomi Band. The new band ...

   NEWS,XIAOMI,XIAOMI BAND,FIBIT,FITBIT ALTA,SMART DEVICE     2016-04-30 23:29:09

  CSS filter effects in action

CSS filter effects in action Ever since CSS filter effects landed in WebKit, I thought about theirs practical implementation. How will they fit with the current web design trends? At this time, my initial impressions are that the best way to showcase the power of CSS filters is something like an image gallery. With so many CSS filters to choose from, it will be fun to create image galleries in the future. Further in this article we’ll cre...

   CSS,filter effect     2012-05-02 05:57:11

  8 most successful open source products

Open source itself is a successful product. It is not only liked by many personals, many famous enterprises like itAlthough there are numerous open source projects and open source products, which is the most successful among them? "Success" is defined as the widely used + well known here. In many successful open source products, only a minority leaders. Here we share 8 most successful open source products we think they deserve to be.LinuxReason: Linux + GNU = GNU / Linux. It has been almost 2...

   Open source,MySQL,Linux,BIND,BSD     2012-04-19 08:29:00

  Examples of bad design

Good designs always help users solve their problems in a convenient and familiar way. It takes little or no time for users getting used to the product with a good design. In contrast, bad designs frequently introduce confusion and complexity to users. Before we design any product, we should think carefully about every aspect of the product. We share some really bad design here to show how they can affect people's life. 1. USB Connector Have you ever put one in right on the first try? We frequen...

   Bad design,Usability,Web design     2013-09-25 22:57:49

  HeartBleed: Inside the heart, what causes the bleeding?

Just after a few weeks since Apple's famous goto fail bug, there is one bug in OpenSSL which catches the attention from the world again. The bug is named HeartBleed, found in OpenSSL library, a famous open source library supporting lots of  SSL/TLS communication among server/client applications. The reason why this bug catches the attentions from the world is it affects almost all sites which are using the affected OpenSSL library, these includes many applications like Nginx server, some v...

   OpenSSL,HeartBleed     2014-04-09 05:47:30

  Programming language choices for an IT manager

A TechRepublic reader named Aaron emailed me and posed excellent questions; here’s an excerpt from his email:“I manage a small IT department and all my skills are self-taught. At times I struggle with complex business initiatives and I believe if I had some programming skills I would be more adept at handling the initiatives. Can you recommend a programming language? Is formal education the best path or have you found that programming can be self-taught?”I’m sure a lot ...

   IT Manager,Programming,Skills,Programming knowledge     2011-10-21 08:37:10