SEARCH KEYWORD -- Pentaho BI ETL tools
Advantages and disadvantages of GoLang
GoLang is a strong typed language which means it is less flexible than interpreted languages by nature. But Go provides Any type(interface) and Reflect mechanism which make the language very close to interpreted languages on flexibility. More and more people start to learn GoLang. This post is mainly for listing down some of the advantages and disadvantages of GoLang. Advantages Performance(Machine code) GoLang is a compilation language which can be compiled to machine code and the compiled bina...
GENERICS,GOROUTINE,GOLANG,DISADVANTAGE,ADVANTAGE 2018-11-10 20:46:45
Capture Screenshot of Dropdown Menu
As an IT professional, we often need to capture screenshot of what we are working on to give proof of what we are doing and why we do it. The screenshot will provide a good sense to other people. You may be familiar with taking screenshot with different tools such as snagit, snipping tool or the Windows PrtSc button. But do you know how to take a screenshot of a dropdown menu? Here we show you how to capture screenshot of dropdown menu with the snipping tool provided since Windows 7. Below are t...
WIDNOWS,SCREENSHOT,DROPDOWN MENU,CAPTURE 2014-11-20 06:20:20
Top 9 Web Design Trends in 2020
To stay in demand, a top-level design agency must be aware of the current trends. This will improve their professional skills, help them to keep an eye on the latest events, and offer the clients relevant models that will increase conversion, website traffic, and customer loyalty. Read on to find out which nine web design trends are popular in 2020. UL animation There is a stereotype that it makes no sense to develop a complex, high-quality animation because it will not be supported by devices w...
WEB DESIGN,UX 2020-09-04 10:06:52
Introduction to DTLS(Datagram Transport Layer Security)
Secure communication has become a vital requirement on the Internet. Lots of information transferred through the Internet are sensitive data such as financial transactions, medical information, media streaming etc. To ensure security of data transferred on the Internet, a few secure protocols have been designed including SSL/TLS and IPsec. Many large websites in the world have adopted TLS. Apart from SSL/TLS, there is some other protocol designed to be used in special cases. One of them is ...
Five Copyright Pitfalls Every Web Designer Should Avoid
If you work in the world of web design, it is crucial you do not infringe upon copyright laws. If you do, you could end up paying some hefty fines or even being prosecuted. So, check out these five common copyright pitfalls you need to avoid. Not Copyrighting Your Own Work While most copyright infringement pitfalls web designers face are to do with avoiding using copyrighted materials, you also need to know how to protect your own work to ensure no one else steals it. For things like patents, t...
COPYRIGHT,WEB DESIGN,PATENT 2021-02-18 02:41:10
Maintain multiple versions of Go in one single environment
In a development environment, there might be multiple projects going on at the same time and they may require different development environments with different versions of build tool. In many programming languages, it is possible to have multiple versions of different build tool or development tool on a single environment. For example, there can be multiple JDKs, multiple versions of Ruby using RVM. For GoLang, there is a similar tool called GVM which can also be used to maintain multiple versio...
GOLANG,GVM,GVM PKGSET,RVM 2019-11-10 00:43:47
10 Tools Every Software Developer Should Use in 2018
The main problem I noticed about most programmers is that even though they know about latest software development tools, they never really spend significant time to learn them well. As a programmer, I always try to learn new tools and latest technologies. At the same time, I also look to improve my knowledge of tools which I have been using for many years. Whether you're a front-end developer, full-stack programmer or part of a DevOps team, you should familiarize yourself with the latest develop...
SOFTWARE DEVELOPMENT, SOFTWARE DEVELOPMENT TOOLS, PROGRAMMING TOOLS 2018-04-28 07:08:00
How to password protect a Winzip file
Winzip files are great ways of sharing documents and images of large sizes over the web or through email, since their reduced size makes it possible for them to be sent and received. Also, it is easier to manage one attachment than multiple. But what if the file contains sensitive information you don’t want snoopers to see? Simply add a password protection in Winzip. Adding a password will ensure more security and reliability of the transported files. How to add a Password to your Zip Fil...
DATA SECURITY,WINZIP 2019-08-29 11:42:41
As A Hottest Job Ever, What Should You Know As A Front End Web Developer?
The front end web developers are the openers for the visitors to visit the web page. It is also known as the client-side development, works predominantly with HTML, CSS, and Javascript. The tools and techniques are the important players of the front end web development. The developer must be aware of the updation of web technologies.The scope is evergreen with this technology as every company or business needs a website to showcase their profile. There are many objectives must be measured while ...
FRONT END DEVELOPER,WEB DEVELOPERS,SOFTWARE DEVELOPERS,TOP SOFTWARE COMPANIES 2019-08-12 05:36:28
Steps to connect to MySQL on Windows Command Line
To connect to MySQL database on Windows through Command line, there are some steps to be followed.1. You need to start the MySQL service, you can go to Start->Control Panel->System and Securities->Administrative Tools->Component Service->Services(local), then on the right panel, you can find one service name called MySQL and you should start this service2. Go the the MySQL installation folder, which is something like this : C:\Program Files\MySQL\MySQL Server 5.1. In this folder, ...
MySQL,Window,Command line,Connection,mysqld 2011-11-05 08:22:39
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>