SEARCH KEYWORD -- SOURCE CODE
Exploring Open edX: A Global Platform for Online Education
Understanding Open edX The digital education sector has seen a rise in platforms that enhance global learning access. Open edX, in particular, has made a significant mark with its comprehensive and robust features. Companies like Raccoon Gang offer specialized open edX services to further enhance this platform's capabilities. This article delves into the essence of Open edX, highlighting its key components and global appeal. Open edX Core Features Course Authoring: User-friendly tools for cou...
3 reasons why Alibaba invests on Sina Weibo
Last night, Alibaba announced acquisition of 18% shares of Sina Weibo with $586 million, according to sources close to the deal, after the completion of this deal, Alibaba will become the second largest shareholder of Sina Weibo and may become the largest shareholder in the future.This deal was supposed to be completed before Chinese Spring Festival, but because Alibaba and Sina had a heated argument about the share holding of Sina Weibo which resulted in substantial delay in the time to complet...
Alibaba,Sina Weibo 2013-04-29 20:30:05
File upload in PHP
File is a special kind of form data, when being uploaded to the server through HTTP POST request, PHP will create a $_FILES global array, the relevant file information will be stored in this global array. We will illustrate file upload with some code snippets using PHP and look into the internal work mechanism. Lastly will talk about file upload security. File upload In order for users to upload files in client side, we have to provide a form on the user interface. Since the uploaded file is a s...
File upload,PHP 2012-11-30 22:01:28
Understanding abstract interface in Java
Have you read about an interface declaration as public abstract interface InterfaceName in Java? At the first glance, is it a weird declaration? Why should we declare an interface as abstract? For example, we may see below code in some projects: public abstract interface MyInterface { public void check(); public abstract boolean check(boolean really); } Actually here abstract is redundant, an interface is implicitly abstract, we no need to put an abstract in front of interface. But it do...
Java,abstract interface 2014-08-18 23:07:27
Using JSON in PHP
Currently JSON has become one of the most popular data exchange formats. Many website APIs support it. Since PHP 5.2, PHP provides json_encode() and json_decode() method to handle JSON encoding and decoding.1. json_encode()This function is used to transform array and objects to JSON format. First let's look one array example. $arr = array ('a'=>1,'b'=>2,'c'=>3,'d'=>4,'e'=>5);   echo json_encode($arr);the result is{"a":1,"b"...
JSON,PHP,json_decode(0,json_encode() 2012-05-06 06:04:42
How to help new joiners involve in projects
Usually when a new joiner involves in a new project, he will spend much time on understanding the background of the project, the current status of the project and the requirements of the project etc. It is very easy for them to get lost in this stage. So to effectively help them involve in the project, we need have some people guiding them, giving them some useful instructions. What should we do to help them? Here are some steps I take.1. Project backgroundIn this phase, I will introduce to them...
New joiner,Experience 2012-05-05 11:06:18
Building Security onto Your Mobile Application
Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...
Web Application Development Company, iPhone App Development Company 2015-08-21 07:22:32
Useful functions to provide secure PHP application
Security is a very important aspect of programming. There are many functions or modules in any kind of real programming language providing security functionalities In modern websites, we may often get inputs form users all around the world.There is a famous saying which says that never trust user input. So in web programming languages, we will often see functions which will guarantee the security of the data input from users. Today we will cover some of these functions in the most famous o...
PHP,security,SQL Injection,XSS,AJAX 2014-10-30 04:21:59
The concept of Iterative Model in a Software Development Life Cycle (SDLC)
The iterative model implemented in any Software Development Life Cycle is all about an initial, simplified implementation which may or may not gain more complexity in future. Furthermore, it is can even be called as a broader feature set until and unless the final system is accomplished. Now while discussing the model, chances are there that he concept of incremental development will also often be used liberally and interchangeably. This means incremental alterations made during the design and i...
SOFTWARE DEVELOPMENT,SDLC,ITERATIVE MODEL,SOFTWARE DEVELOPMENT LIFE CYCLE 2017-09-11 06:02:39
10 cool iOS app websites
No matter how big the iOS 7 design change is or no matter how unhappy you you fee about iOS 7, you cannot deny that iPhone is still the best phone on earth and App Store is the best software eco-system. There are lots of excellent apps on iOS, the overall quality of apps on iOS are better than other platforms. Some apps are also only available on iOS. These apps may also have excellent websites to promote. Now let take a look at some cool app websites. Currency Converter App TriplAgent Pic...
App Store,Website,Website design 2013-06-26 04:10:23
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>