SEARCH KEYWORD -- TRUE RANDOM
Top 10 Tell Tale Signs Your Computer Has a Virus
The true genius of the 'computer' is its ability to make human lives easier. This is only achieved from the ability of running software such as word processing, number crunching with Excel or learning from the worlds largest source of knowledge, via web browsers. Today being connected to the internet is fundamental to leading a productive modern life. While internet is a boon it comes with its own share of problems. As internet users increase so does the instance of com...
COMPUTER VIRUS, INTERNET SECURITY, DATA SECURITY, ANTIVIRUS, COMPUTER REPAIR 2017-03-19 21:05:12
The Best Laptops for Freelancers
Whether you’re answering emails, beating a deadline, or looking for even more freelance gigs, many professionals simply can’t imagine their career without a laptop. It has become the ultimate work gadget of the 21st century, which many laptops now powerful enough to be used like a PC. However, not all freelancers are the same—and as such, require different tools to get the job done. That being said, here are some of the best laptops for every kind of freelancer imaginable. Best...
Java Interview Questions
Currently there are many articles online which summarize the list of Java interview questions. Some cover lots of basic questions and some cover some specific questions in specific area such as multithreading. In this post, we will not cover the really basic questions, we will cover something different. For basic question, you can read Java Interview Questions。 Basic What is primitive data type? How many primitive data types in Java? What are they? -- A primitive type is prede...
JAVA,SECURITY,INTERVIEW,CAREER,MULTITHREADING,QUESTION,JAVA INTERVIEW,JAVA CORE 2019-01-21 07:07:08
It looks like TechCrunch blocks GoDaddy server access
Recently, I encountered an issue with an app I maintain—it suddenly stopped pulling RSS feeds from TechCrunch. At first, I suspected that the RSS feed URL might have changed. However, after further investigation, I discovered a different story. The URL itself was unchanged, but the results varied depending on where the request was coming from. To troubleshoot, I started by setting up a local web server and running a test with my script to see if it could still pull the RSS feed. The script...
TECH CRUNCH,GODADDY,AI,BLOCK ACCESS 2024-08-17 12:31:52
Peculiarities of cloud infrastructure
MarketsandMarkets claims that the cloud computing market is worth more than $545 bln nowadays. Moreover, by Thales, nearly 60% of worldwide commercial data is stored in the cloud today. Nay, under Exploding Topics, about 90% of large companies across the world use cloud infrastructure. So, the mentioned technology is incredibly popular among business owners worldwide presently. However, not so many company holders, as well as managers, know enough about the specified solutions. That's because mo...
CLOUD INFRASTRUCTURE,DATA STORAGE 2022-12-30 12:00:44
The details and analysis of capturing gRPC packets
Introduction If you're only using gRPC at the application layer, I believe studying the examples on the gRPC official website is sufficient. However, when planning to extensively use gRPC within a team, you will face many challenges, such as authentication schemes between services, routing solutions for multi-region services, and compatibility solutions with existing RESTful services. I recently realized that applying a technology stack requires mastering a wealth of information about that stack...
Why init() is not recommended in Go
golangci lint Currently, the unified CI's .golangci.yml includes the gochecknoinits checker: # golangci-lint v1.46.2 # https://golangci-lint.run/usage/linters linters: disable-all: true enable: ... - gochecknoinits # Checks that no init functions are present in Go code. ref: https://github.com/leighmcculloch/gochecknoinits ... If Go code uses the init() function, the following error will occur: # golangci-lint run foo/foo.go:3:1: don't use `init` function (gochecknoinits) func i...
Generate certificate in Java -- Store certificate in KeyStore
In previous post, we have explained how to create a certificate chain in Java. After generating the chain, we need to store it somewhere so that it can be used later when we are doing the actual SSL communication, either in a key store or trust store. This post will show you how to store the private key and its associated certificate chain in a keystore file. There are different types of keystore in Java, in this post, we will choose the JKS to demonstrate how to store the certificate chain. Whe...
Java,Certificate chain,Keystore 2014-08-20 03:56:39
Kubernetes Authentication & Authorization 101
If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αá½θεντικÏŒς authentikos, “real, genuine”, from αá½θÎντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...
RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES 2021-06-05 23:19:18
6 Great Ways to Design Amazing PWA’s
Why PWA v/s Native Mobile apps a wrong question to ask. PWA has already gathered a lot of momentum recently and is structured to give “App like” experience to its user base. Reveal all the extra layers underneath and create magic with brand new ideas to design progressive web apps. What comes to your mind when you imagine leading a progressive life? Definitely, it is going to be far better than the previous one. Progressive Web Apps (PWA’s) are going to work to outweigh ...
WEB DESIGN,PROGRESSIVE WEB APPS,PROGRESSIVE WEB APP TECHNOLOGY,COMMON UI/UX MISTAKES 2018-02-28 03:30:46
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>