SEARCH KEYWORD -- SESSION KEY TYPE
Microsoft is transforming XBox into a PC controlled by expressions
According to the Voice of China "News Coverage" report. When Apple products are changing the world, the original computer giant Microsoft is also quietly looking for their new foothold in the field of electronics. This time the breakthrough is from its game console Xbox.Xbox was originally a single function console, there are signs that Microsoft may be planning for the Xbox into the computer with new functions. The selling point of this new product lies in its function of communic...
Bill Gates : Ctrl+Alt+Del was a mistake
Microsoft chairman Bill Gates admitted that Ctrl+Alt+Del command was a mistake when he was in a fund raising campaign at Harvard University last week. This command was initially designed to reboot the system. David Rubenstein, the Harvard fund raising campaign chairman, asked Bill Gates : "Why when I turn on my software or computer do I need to have my three fingers to press control,alt and delete? Whose idea was that?" The answer given by Bill Gates is : "Basically because when you turn your co...
Bill Gates,Ctrl-Alt-Del,Mistake 2013-09-26 23:28:37
Different types of keystore in Java -- PKCS11
PKCS11 keystore is designed for hardware storage modules(HSM). It's an interface to talk to the HSMs. It doesn't actually store any keys but provide a set of classes to communicate with the underlying HSM. The actual keys and certificates are stored on the HSMs. The reason for storing the keys and materials is to ensure security and efficiency. Since the keys are on the HSMs, they are safe to be stolen. All encryption/decryption operations are performed on the HSMs as well, this incre...
Different ways to print "Hello world" in Java
This post is not about best practice to print "Hello world" in Java, it is about exploring different capabilities offered by Java. Also there are articles about printing "Hello world" in different programming languages, but this post is not about that. Standard literal The most commonly used way is to use System.out to print"Hello world". System.out.println("Hello world"); Enumeration An enumeration can define a set of values belonging to one category. For example, an enumeration for all months ...
Polymorphism in OOP Programming
Polymorphism is the capability of an action or method to do different things based on the object that it is acting upon. This is the third basic principle of object oriented programming. Overloading, overriding and dynamic method binding are three types of polymorphism. Overloaded methods are methods with the same name signature but either a different number of parameters or different types in the parameter list. For example 'spinning' a num...
JAVA,OOP,POLYMORPHISM,OVERLOADING,OVERRI 2014-10-23 08:11:50
A small trick on using console.log to print data in JavaScript
When debugging JavaScript application, one may frequently use console.log to print data so that it is easy to debug when issue occurs and also helps on understand the data flow. The common way of printing a variable would be something like. let user = { name: "test" }; console.log(user); In this case it will print: { name: 'test' } This is OK when there is no much logging or the program is not complicated. But it becomes difficult to debug if there are lots of variables to be printed ...
JAVASCRIPT,CONSOLE.LOG,DEBUGGING 2019-09-03 10:24:24
Hexadecimal and long in Java
Today I encountered a hexadecimal operation problem when I was implementing a bit reverse function for integer type. Basically in the implementation, there is an operation which is to do the bit operation & between one long integer and a hexadecimal number 0x00000000FFFFFFFFF. I was expecting that the high 32 bits of the long integer will be zeroed. But unfortunately I didn't get the expected result. The basic implementation is: long num=0x00F0_0000; num = (num>>16) | (num<<16); ...
Hexadecimal,long,Java,bitwise operation 2014-06-18 23:44:32
The Risks of Prioritizing Features Over Security in China's EV Industry
In recent years, China's electric vehicle (EV) industry has seen a surge in innovation and growth. Companies like BYD, NIO, XPeng, and Xiaomi have become household names, not just in China but globally. These companies have been at the forefront of integrating cutting-edge technology into their vehicles, often promoting new features such as autonomous driving, advanced infotainment systems, and seamless connectivity. However, this rapid pace of innovation has raised concerns about whether these...
Impact of AI on UI/UX design
The growth of computerization and Artificial Intelligence implanted into our regular daily existences in the course of recent years is only productive, we're no longer talk about fantasy since machines are going on at this very moment. This quick advancement has propelled a radically new age of designers to search for client-focused arrangements through the extent of these innovations. Along these lines, we need to investigate what this implies for UX plan in 2018 and what standards we should gr...
All I Know About Certificates -- Clients
Finally, in last article we’ve covered the responsibilities of CAs, showing that being a CA isn’t simple and has high management costs, explaining why issuing certificates costs money! This article we will cover the client in this chain. Verifying Certificates as a Client For clients, verifying certificates isn’t simple either. Articles introducing TLS handshakes often mention "the server sends back a certificate, and the client verifies it," but in reality, as ...
CLIENTS,WEBSITES,SSL CERTIFICATE,CERTIFICATE AUTHORITY,CA 2024-07-26 22:24:30
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>