SEARCH KEYWORD -- Security camera



  User experience : Exception handling

Exception handling is the process of handling emergencies or unpredictable operational errors. The specific time of the occurrence of unexpected events and the actual consequences of the specific situation are difficult to predict. How to handle this unexpected crisis is also related to the user experience of your users. Let's first look at how some famous products deal with unexpected exception encountered by users:1. Goodyear tires can automatically expand when leaking.Tire blast is one of the...

   User experience,Exception handling     2013-04-06 05:05:04

  Microsoft will drop support of IE8, IE9 and IE10

Microsoft will push the last set of security updates for IE8, IE9 and IE10 next Tuesday(January 12). Thereafter that Microsoft will drop support of these three versions of IE. These are some other old products given up by Microsoft since Windows 7.  IE11 will be the only Internet Explorer supported and Edge will be another star advocated by Microsoft. The good news is you will not get annoying notification from Microsoft anymore to ask you to upgrade your IE. But the bad news users&nb...

   MICROSOFT,IE,NEWS     2016-01-09 07:55:44

  Generating CSR using Java

A CSR(Certificate Signing Request) is a kind of request generated by an application and is to be sent to a Certificate Authority to create a signed certificate which can be distributed. It usually contains certificate information such as subject name, public key info and signature info. In Java, keytool can be used to generate a certificate request with option -certreq.  But sometimes if an application wants to create a CSR programmatically, keytool will not do a favor, instead you should u...

   JAVA,SECURITY,CSR,CERTIFICATE REQUEST     2016-05-25 04:49:17

  All I Know About Certificates -- Websites

In last article, we know the role of clients and their responsibilities for certificate verification. Finally, let's talk about websites. We've discussed many potential issues between CAs and clients concerning certificates, but the most frequent issue is with websites—many websites have faced this problem: certificate expiration. Websites need to ensure two things: Ensure their certificate does not expire. Protect their private key from being leaked. If someone else obtains the priv...

   CLIENTS,WEBSITES,SSL CERTIFICATE,CERTIFICATE AUTHORITY,CA     2024-07-26 22:33:29

  Those famous Emacs users

I don't think using Emacs can improve one's programming skills, I don't think some famous people used Emacs before can provide something, either. But these famous people encouraged me to learn Emacs when I wanted to give it up. Here I created a list of famous Emacs users. Most of people in this list are not famous because they developed or used Emacs, but they are famous and also use Emacs. Joe Armstrong -- Erlang's author In The Setup, Joe mentioned that "I write books using XML markup in emacs...

   Emacs,History     2013-07-28 21:36:09

  Alibaba gains spotlight due to female employee alleging sex harassment from supervisor

During the weekend, the Chinese e-commerce giant Alibaba gains spotlight from Chinese general public due to a hot discussion going on on various Chinese social media platforms where a female employee alleges that her supervisor(alias Yi Qu) conducted sex harassment on her during a previous business trip. The case happened a couple of weeks back where the female employee at Alibaba was asked by her direct supervisor to go for a business trip to Shandong province(a northern province in China), sh...

   ALIBABA,SEX HARASSMENT     2021-08-07 22:27:02

  5 Mistakes Developers Should Avoid before Launching Their API

Time is money in the API industry, and everyone wants to be timely for the API’s milestone event: its eventual launch. Delays in this event can be very costly, so the sooner the API can be integrated, the better. Many developers start their work knowing quite well that the clock is ticking. But prioritizing a quick launch—at the cost of everything else—can do a lot of damage in the long run. A rushed launch may result in unstable integration, a host of errors and bugs, lower en...

   TIPS,API DESIGN     2020-05-18 07:08:22

  What’s Custom Software Development in 2021?

Each year, custom software development shows us its new angles — those shaped by the technology trends and changes in customer behavior and preferences. Considering the highly impactful nature of 2020 with the outbreak of COVID-19, 2021 custom software development was formed around the technologies that have contributed to the minimization of the pandemic’s harmful impact. So what are these technologies? In this article, you will find out info about the top trends in software develop...

   CLOUD,SOFTWARE DEVELOPMENT     2021-11-04 01:22:37

  New Unreal Engine 5 and Nvidia Technology in Black Myth: Wukong

In this article, we explore the cutting-edge Unreal Engine 5 and Nvidia GPU technologies used in the highly anticipated AAA game Black Myth: Wukong this year to enhance its game graphical quality. Our insights are based on an interview article of the technical lead of Game Science Interactive Technology, Geekerwan's experimental analysis, and Nvidia's official Black Myth: Wukong showcase featuring the RTX 40xx series. As a software engineer, my perspective may differ from that of a game develop...

       2024-08-24 09:32:55

  Set file permission in Java

Prior to Java 6,  there is no good solution at the Java level to provide file permission management. You need to implement your own native methods or call the Runtime.exec() to invoke the system routine such as chmod in LInux. Since Java 6, Java introduces a set of methods which can be used to set the file permission at Java level. These methods include: File.setReadable(boolean); File.setWritable(boolean); FIle.setExecutable(boolean); File.setReadable(boolean, boolean); File.setWritable(bo...

   JAVA, FILE PERMISSION, POSIX,learnjava     2015-08-29 03:37:37