SEARCH KEYWORD -- SOFTWARE BUSINESS
10 Easy Things to Do to Enhance Your Online Security Today
If you think you don’t need to take extra steps to increase your cyber security, you are wrong. Statistics on cybercrime are shocking and clearly prove that you can’t have ‘too much security’ while using the Internet today. For example, did you know that by 2023 cybercriminals will have stolen over 33 billion private records or that 15 million Americans became victims of digital identity theft in 2017 (Norton)? That’s not even mentioning millions of monetary losses ...
DATA SECURITY,SECUIRITY 2019-01-21 07:01:37
Will China surpass United States on innovation?
I had some discussions on whether China would surpass United States on innovation with some entrepreneurs during last weekend's APEC. The conclusion is United Stats has advantages on innovation today, but in the future, China's innovation will be more widespread and successful. For the next 10 years, what advantages do United States and China have? Actually United States has obvious advantages, especially on innovation structure and innovation culture. Technology -- It's undoubted that Unit...
Innovation,China,United States 2013-07-15 04:40:12
Does My Online Business Need Log Aggregation?
Logs crop up all over the place. They are generated by everything from web servers and databases to the firewalls which protect them from breaches. Because logs accumulate in large volumes from all of these different sources, log aggregation is an important process which works to organize and impose order over otherwise disparate log files. That sounds good, but should your online business be eager to jump on the log aggregation bandwagon? Here is a look at the main benefits and considerations t...
SOFTWARE DESIGN,LOG AGGREGATION 2021-10-12 21:44:39
Books for entry level C programmers
In computing, C is a general-purpose programming language initially developed by Dennis Ritchie between 1969 and 1973 at Bell Labs Its design provides constructs that map efficiently to typical machine instructions, and therefore it found lasting use in applications that had formerly been coded in assembly language, most notably system software like the Unix computer operating system.To learn C, we need to read many C books and have many practices. Here we summarize a list of C books which may h...
Cracking the Data Lineage Code
What is Data Lineage? Data lineage describes the life-cycle of data, from its origins to how it is manipulated over time until it reaches its present form. The lineage explains the various processes involved in the data flow of an organization and the factors that influence each process. In other words, data lineage provides data about your data. Data lineage helps organizations of all sizes handle Big Data, as finding the creation point of the data and its evolution provides valuabl...
BIG DATA, DATA LINEAGE,BUSINESS 2019-08-08 12:41:42
How deep should unit test go?
There is a question on Stackoverflow which says "How deep are your unit tests?". It is asked by a guy named John Nolan. The question is not too new, but what catches me is the Best Answer given by Kent Beck, who is the creator of Extreme programming(XP) and Test Driven Development(TDD). Let's look at the question first. The thing I've found about TDD is that its takes time to get your tests set up and being naturally lazy I always want to write as little code as possible. The first thing I seem ...
Benefits and Drawback of a Layered Architecture
Most enterprises today are application centric. But the problem with the application is that their database schemas, user interfaces, programming interfaces and object models are tightly coupled and difficult to change. If you want to add a new field to a database table and you’re lucky, the change will reflect through the entire system. But often the change needs to be replicated manually across the entire system. And as applications are difficult to change, adding business rules or proce...
JAVA, PROGRAMMING,WEB DEVELOPMENT,ENTERPRISE APPLICATION 2017-05-04 08:19:34
App's user value doesn't necessarily bring business value
There is an old saying in Internet world, you can get business value as long as you can achieve user value. Is this statement outdated in mobile Internet era? This statement originated from PC Internet era, but now the time users spend on PC drops and user behavior tends to be stable and conservative. In contrast, people are more willing to stay on mobile devices. The difference between PC and mobile is that users are freely to move around on PC end. People can navigate from one link to another ...
App,Business value,User value 2013-06-25 10:52:12
Remove the Small Arrow on Desktop Application Shortcut on Windows
Maybe many of us have seen a small arrow on desktop application shortcut after we install the application on Windows. Some may like it but some people may think it doesn't look beautiful enough. We may need to remove these small arrows somehow the desktop can be clean. So how? Many people may use a third party software to remove the small arrow, then they must go to download the software and install them. But do we necessary do this in order to remove the small arrow?The a...
SMALL ARROW,SHORTCUT,DESKTOP,APPLICATION,WINDOWS 2014-10-25 08:39:58
Products born for Cloud
Cloud computing has become increasingly popularity among companies. It greatly saves the investment of infrastructure and training with everything is running on cloud, it also improves the accessibility and flexibility of service provided by companies. With its popularity, many products are born or becoming popular to help build and move the apps to the cloud. Some well known names of these products are Vagrant, Docker/LXC, Chef and OpenStack. These tools can help create, test and deploy applica...
Cloud,Openstack,Docker,Vargrant,LXC,Chef 2015-01-25 02:27:11
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>