SEARCH KEYWORD -- SYSTEM DESIGN



  Different types of font icons

A website with just text belongs to the pre Web 2.0 era. A modern site will have different icons appearing on different places on the site. This will give the visitor a better visual feeling. But to have a set of consistent and well crafted icons is not an easy task. It may even require a dedicated icon designer to design them. Fortunately, we now can use font icons provided by many people around the web. Today we will introduce some of them. Font Awesome Font Awesome is an open source font ico...

   font icon, web design, font awesome     2015-07-19 06:22:48

  5 good anti SOPA designs

The Stop Online Piracy Act (SOPA) is a United States bill to expand the ability of U.S. law enforcement to combat online copyright infringement and online trafficking in counterfeit goods. Its goal is to protect the intellectual-property market and corresponding industry, jobs and revenue. However since its proposal, many organizations protest against it as they believed it would threaten free speech and innovation, and enable law enforcement to block access to entire internet domains due t...

   SOPA,PIPA,design     2013-12-24 03:26:31

  Oval engagement rings from MoonOcean: Elegance of form and individual approach

Welcome to the enchanting world of MoonOcean, a premier destination for unparalleled elegance in the heart of London's vibrant jewellery scene. Immerse yourself in our exclusive collection, where the spotlight is on the captivating allure of oval engagement rings, embodying both exquisite craftsmanship and a commitment to individuality. Nestled in the heart of London, MoonOcean stands as an emblem of sophistication, redefining the jewellery experience. Our curated array of oval engagement rings ...

   ENGAGEMENT RING,MOONOCEAN     2024-03-18 07:56:20

  Google releases Analytics real time API

According to Tech Crunch, Google finally released its Analytics real time API. Although this feature was launched two years ago, there was no convenient way for webmasters to adjust the data so that they can be viewed properly. Now developers can use the API to get what they want and utilize these data to do what they want to. Developers need to apply for using the API now. Once you get access to this API, then you can search your own real time data and utilize these data as you want to. For ex...

   Google Analytics,API,Real time     2013-08-02 00:05:56

  What is blocking and how would you troubleshoot it?

Blocking is a common occurrence in an SQL server context, but if you are new to the world of database management you might not know what this issue entails and perhaps even fear that it is a sign of serious underlying problems. To allay your fears and clear up the mystery, here is a brief overview of blocking and the steps you can take to tackle it. Image Source: Pixabay SQL blocking explained SQL blocking according to SentryOne is an offshoot of the way that concurrent databases operate. Becau...

   SQL,DEADLOCK     2020-09-17 08:50:55

   7 Incorrigible Mistakes Of Mobile App Design

Plethora of mobile apps are launched every day, let alone a month or a year. With such a rising competition making an app which is not liked by people is a committal sin not just from a user's perceptive but also due to so many people and their efforts attached to it. In this blog we will discuss some of the very important factors which one should know before crafting an app. It's obviously not worth crying over the split milk as 80% of the users not even open an app again if they encounter ...

   Mobile App     2015-06-18 08:08:48

  Python Process Protection Watchdog

Project Design Purpose: During participating the cyber exercise as red team member, we found that the injected malware or attack launching program can easy be stopped by the blue team or defense program / mechanisms via killing the process / deleting the file. To address this, our project aims to develop a robust watchdog program designed to bind to target programs, diligently monitor their execution states, and ensure uninterrupted functionality. Continuous Monitoring: Establish a vigilant wa...

       2024-09-14 11:09:14

  Reflection in Java

What is Reflection? Reflection is a feature in Java that allows a program to obtain information about itself at runtime and dynamically manipulate the properties, methods, and constructors of classes or objects. With reflection, we can instantiate objects, call methods, and set properties without knowing the exact class name beforehand. The core of the reflection mechanism is the Class object, which represents a class. The Java Virtual Machine (JVM) automatically creates this Class object when i...

   JAVA REFLECTION,TUTORIAL,FIELD,METHOD     2024-06-27 07:52:12

  Does My Online Business Need Log Aggregation?

Logs crop up all over the place. They are generated by everything from web servers and databases to the firewalls which protect them from breaches. Because logs accumulate in large volumes from all of these different sources, log aggregation is an important process which works to organize and impose order over otherwise disparate log files. That sounds good, but should your online business be eager to jump on the log aggregation bandwagon? Here is a look at the main benefits and considerations t...

   SOFTWARE DESIGN,LOG AGGREGATION     2021-10-12 21:44:39

  Mount DD image on Linux

Yesterday, my Raspberry Pi running Arch Linux was not able to boot with error: Kernel Panic, not syncing: no init found. I spent a night on it, but could not find a working solution. The last option is easy: reinstall the system. That is really the last resort, for I do not want to re-setup everything I have done: samba server, Time Machine server, Xunlei Offline Downloader… Unable to mount the SD card The system does not boot, so I need to find a way to get into the file system to identi...

   LINUX,DD IMAGE     2014-06-24 07:49:14