SEARCH KEYWORD -- Windows.ISB device



  Do NOT use boolean variable as function parameters

We follow lots of coding styles and coding standards when we do programming, but we may frequently forget one. The forgotten one is that do not use boolean parameter as the function parameters. The reason is it would greatly reduce the readability of the code. Don't believe it? When you read the following code, what does this code mean? widget->repaint(false); Do not repaint? Or what does this mean? After looking at the document, we know that this parameter is whether ...

   CODING STYLE,BOOLEAN,FUNCTION PARAMETER,CODING STANDARD,METHOD PARAMETER     2012-04-22 02:38:45

  8 Essential Mobile Game App Development Tools

Who doesn’t love playing a game on their mobile? Temple run had caught the whole world’s attention to such an extent that right from children to elder people in the household were glued to this game. It is indeed interesting that mobile games can keep your kids occupied. In fact, they are the best stress busters available in the present times. Remember how you used to steal some hours just to play candy crush while on the break? This way you used to relieve yourself of the stress bun...

       2014-10-09 05:00:05

  Here is what XcodeGhost author says

The first compiler malware in iOS was disclosed by Chinese iOS developers on Wednesday(Beijing time). The name of this malware is XcodeGhost as described by Alibaba researchers who released the analysis of this malware.  The malicious code is located in a Mach-O object file that was repackaged into some versions of Xcode installers. These malicious installers were then uploaded to Baidu’s cloud file sharing service for used by Chinese iOS/OS X developers. Xcode is Apple’s offic...

   IOS,SECURITY,XCODEGHOST,APP STORE,APPLE     2015-09-18 20:51:38

  How to make select in WinSock exceed the 64-socket limit

When doing cross-platform network programming, the only API available on Windows that corresponds to the epoll/kevent style reactor event model is select. However, it has a limitation: the number of sockets passed into select cannot exceed FD_SETSIZE, which is set to 64. Therefore, select in Java’s NIO on Windows also has the same limit. Many services ported to Windows that use the reactor model face this constraint, which often gives the impression that server programs on Windows hav...

   EXCEED,SELECT,JAVA,WINDOWS     2024-10-31 23:47:50

  17 Best Practices One Must Follow While Using Mobile Apps

      It is no secret that we use mobile applications everyday but we don't know how to use them optimally. As a result, we face plenty of problems with our mobile phones as well as the installed applications. Here are some best practices you can follow to avoid to any mobile phone and application anomalies.  Over the past several years, smartphones have started to dominate the technology scene.  These phones have installed mobile applications installed that can complete...

   mobile apps, best practices, iphone, android     2015-01-27 20:12:25

  Jelly Bean becomes the most popular Android OS

Google released the latest Android usage stats on Monday. Jelly Bean becomes the most popular Android OS for the first time. It takes 37.9% Android market share(32.3% from 4.1.x and 5.6% from 4.2.x). Ginegerbread is at the second place and it has 34.1% Android market share. This is a good news to many Android developers as they can use many new features provided in the new system if there are more and more users are using the new OS. Also if Google wants to attract news users, they have to enco...

   Android,Jelly Bean,Usage     2013-07-09 04:52:28

  How to Encrypt Your Online Conversations

Do you ever get the feeling that somebody might be listening to or reading your private conversations? You're not crazy.  Online platforms don’t hide that they use data from chats, searches, emails, and other places for targeted advertisements. Aside from being a massive invasion of privacy, it also puts your security at risk.  But it is possible to prevent people from snooping on you. All you need is a little encryption. Check out these different ways you can add encryption into...

   DATA SECURITY,VPN     2020-01-30 07:33:29

  Best Tips for a brilliant responsive design

Portability of mobile devices have made it easier for the users to access internet. Consequently , this has increased a lot of of mobile traffic and has given birth to new terms such a mCommerce. Now the point is that as we know that technology is ephemeral , will we keep on investing time and money every time a new gadget is launched? Indeed yes, because this is what market demands!  But what if I say a that there is a technology which is independent of the size of the devices or a technol...

   responsive, mobile     2015-07-01 01:25:37

  Mac shortcut key cheatsheet

More and more people are using Mac computers or switch from Windows or other OS to MacOS, there are lots of shortcut keys which can help improve the work efficiency or ease operations. This post will try to list some commonly used shortcut keys in Mac. But before that, let's first know some common keys on a Mac computer keyboard. There are four major function keys: Command, Control, Option and Shift. Most of the shortcut keys will combine the functional key and other key. Basic Command key is t...

   SHORTCUT,SCREENSHOT,COMMAND,SHORTCUT KEY,MACOS     2019-02-05 07:13:06

  Google launched new Chromebook in cooperation with Samsung

According to report from technology blog GigaOm, Google and its partner Samsung launched a new Chromebook and Chromebox yesterday, mainly targeting at education and corporation market.New Chromebook looks like any other 12.1 inch computer, while Chromebox is a mini PC that can be connected to peripherals such as keyboard, mouse and monitor, just like Apple’s Mac Mini. Currently prices for Chromebook and Chromebox are $499 and $329 respectively.They both are equipped with Intel Core proces...

   Google,Chromebook,Samsung     2012-05-30 04:58:28