SEARCH KEYWORD -- Web Application Development Company
Google+ doesn't support Firefox 23?
Mozilla just released a new version of Firefox--Firefox 23, but after upgrading to the new version. We cannot login to Google+ anymore, instead it will show a page which says "Your browser is no longer supported" and it gives some choices to download new web browsers. It also allows to download Firefox. But the thing is we have updated to the latest version. Also when clicking on the "Download Firefox" link, it is redirected to the download Firefox for Android page, is it weird? Is this becaus...
Firefox 23,Google+ 2013-08-10 21:46:27
Accessing Reddit top posts using OAuth
Previously one can use the https://www.reddit.com/r/rprogramming/top.json API to access one subreddit's top posts. This API doesn't require any access token to fetch the data. However, this API may not work all the time. Reddit may block the API's request if it finds that you are using a script or some app which accesses the API now and then. For an app or script which needs to fetch the data routinely, what should we do? Reddit provides one method which can be used to fetch this kind of to...
What to put on whiteboard during an interview
As a programmer, you may go through different kinds of programming tests while interviewing for jobs. The most famous and difficult one may be the whiteboard test for lots of people. Usually the interviewer will give the candidate an algorithm problem or case study and ask the candidate to implement the algorithm with his/her favorite programming language. The code to be written is not too much but it requires the candidate to thoroughly consider different edge cases. So wha...
TIPS,INTERVIEW,WHITEBOARD TEST 2014-08-29 20:34:52
Privacy & Security What Is the Difference?
When we discuss the internet today, there are two terms that we frequently here: privacy and security. While you may think that these two terms mean the same thing and are thus interchangeable, this isn’t true. As such, you’ll want to take a moment to learn the difference between these two terms. Understanding the Difference Between Privacy and Security When you open a checking account you share your p...
SECURITY,PRIVACY,CYBERSECURITY 2018-12-27 00:29:57
Measure the improvement of Google search algorithm
On the day of Google's 15th birthday, Google released its new "Hummingbird" search algorithm, this is the first time that Google changes its search algorithm since 2010 after the Caffeine algorithm. It will affect 90% of search results, according to Amit Singhal, Lead of Google Search. Some may be curious about how Google measures the improvement of a new search algorithm. There are many factors need to be considered, for example, accuracy, relevance, search depth etc. According to Amit Singhal...
Google search,Algorithm, improvement 2013-09-29 23:25:53
Different ways to pass query parameters in EmberJS
In EmberJS, one could pass query parameters when retrieving resources with store.query() method. But what if there is a requirement that one wants to pass query parameters when calling store.findRecord()? Or there is a requirement that one wants to pass query parameters to a relationship when calling model.get('hasManyAttribute') in a RESTful style? In this post, we will explain how these can be achieved. In the store.query() case, one could easily pass the query parameters by passing ...
RELATIONSHIP,EMBERJS,QUERY PARAMETERS 2018-05-18 10:47:56
IT System Cyber Attack Case Study 01: Malicious Macro and Backdoor Trojan Attack on IT-Network
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop showcasing a practical demonstration of a red team attacker implementing an IT system/network attack via a Malicious Macro MS-Office-Word file (CVE-2015-1641) and phishing email generation program to penetrate multiple layers of firewall defenses and implant a backdoor trojan into the railway system's OT network. Related Links: GitHub Project Link , LinkedIn Post Link Attacker Vector: Malicious Macro ...
Kualitee: For better Test Management in the year 2020
New IT trends will dominate in 2020. Big data management, customer satisfaction, security concerns, mobile apps, artificial intelligence (AI), test automation, DevOps and agile methodologies are a few of these rising technologies and trends. With their rise, Quality assurance (QA) has to take the testing game a notch up, especially with using smart test management tools for their testing. Test Automation Stays A report by Research and Markets estimates the global automation testing ...
The most stupid C bug ever
I have been programming for a number of years already. I have seen others introduce bugs, and I have also introduced (and solved!) many bugs while coding. Off-by-one, buffer-overflow, treating pointers as pointees, different behaviors or the same function (this is specially true for cross-platform applications), race conditions, deadlocks, threading issues. I think I have seen quite a few of the typical issues. Yet recently I lost a lot of time to what I would call the most stupid C bug in ...
C,Bug,Comment,Back slash 2012-04-22 03:40:49
New features in Java 9
Java 9 is planned to be released in March 2017. It will be 3 years since Java 8 was released. Are you still excited about the new features introduced in Java 8 such as Lambda, new Date APIs etc? Now Java 9 is to be released and there are also quite a few fantastic new features to be introduced. Below is a list of major new features in Java 9. Modular system. Java 9 will introduce a brand new modular system to organize Java codes. The modular system will divide different packages into diffe...
JAVA,NEW FEATURE,JAVA 9 2016-04-05 09:56:01
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>