SEARCH KEYWORD -- Windows.ISB device



  You know what UTF-8 is when you see it?

When we are coding we may often see some encoding specifications in our source codes such as UTF-8,GB2312. Do you know what these encoding mean and why we need them? In this post, Julián Solórzano will introduce the most widely used encoding specification around the world accomodating all different character sets in the world. UTF-8 is a method for encoding Unicode characters using 8-bit sequences. Unicode is a standard for representing a great variety of characters from many ...

   UTF-8,Encoding     2014-04-18 22:13:44

  Spurring the Consumer Feedback Loop with Connected Devices

In a press release from earlier this year, Gartner had predicted that by the year 2018 mobile devices would account for initiating 5% of consumer services cases, registering a marginal rise of 0.02% from 2014. Research shows that most businesses lose around a whopping $83 billion owing to poor consumer services (Source: kissmetrics) in the US alone while globally, the average cost of losing a consumer is $243. It is only viable to think of automating support services as a way to lower the costs ...

   Big Data Analytics Solutions, Loyalty Programs for Customers     2015-08-18 07:11:35

  Different types of keystore in Java -- PKCS11

PKCS11 keystore is designed for hardware storage modules(HSM). It's an interface to talk to the HSMs. It doesn't actually store any keys but provide a set of classes to communicate with the underlying HSM. The actual keys and certificates are stored on the HSMs. The reason for storing the keys and materials is to ensure security and efficiency. Since the keys are on the HSMs, they are safe to be stolen. All encryption/decryption operations are performed on the HSMs as well, this incre...

   PKCS11,keystore,HSM,Java     2015-01-08 00:39:12

  Ruby WinRM undefined method `split' for nil:NilClass

WinRM service is a service provided by Windows to enable remote access a Windows system. It is similar to what SSH is for *nix. And it is frequently used in applications which want to automate process or accessing remote Windows system and perform actions on them. Ruby also provided the WinRM gem which is an implementation of the WinRM service.  When using WinRM gem, one may often want to use :negotiate as the transport protocol for authentication. This transport will negotiate using d...

   RUBY,WINRM,INIT_AUTH,PROXY     2017-03-08 02:21:09

  Mount DD image on Linux

Yesterday, my Raspberry Pi running Arch Linux was not able to boot with error: Kernel Panic, not syncing: no init found. I spent a night on it, but could not find a working solution. The last option is easy: reinstall the system. That is really the last resort, for I do not want to re-setup everything I have done: samba server, Time Machine server, Xunlei Offline Downloader… Unable to mount the SD card The system does not boot, so I need to find a way to get into the file system to identi...

   LINUX,DD IMAGE     2014-06-24 07:49:14

  GIF’s - Effective Engagement Tool Of Elearning

Elearning has been continuously facing the challenge of keeping the learners engaged. Many methods are being used to ensure that the learner understands the concepts even without an instructor. The inclusion of various multimedia modes like informative audios, videos, games, animations, etc. has become almost necessary to include as these are considered to make the concepts easier to understand.  In a nutshell, there are many advantages of using multimedia in an eLearning program, however, ...

   GIF,ELEARNING     2021-09-23 07:17:52

  Building Security onto Your Mobile Application

Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...

   Web Application Development Company, iPhone App Development Company     2015-08-21 07:22:32

  Using Angular 2 with Asp.Net MVC/Asp.Net Core

Asp.net development professionals bring this post to explain the use of Angular 2 with Asp.net MVC/ Core. You will read the overview of Angular 2 and Asp.net Core at first in this post. Read the article to find how experts use Angular 2 with MVC / Core. Angular 2 Overview Angular 2 is the upcoming version of MV framework used for creating high level applications in browser. It contains everything needed to create a complex mobile or web apps from a variety of templates. Angular team recently re...

   ASP.NET DEVELOPMENT,ANGULAR 2, ASP.NET MVC     2016-10-29 05:15:06

  Developing an eCommerce Website? Here are 4 Things to Keep in Mind

  When it comes to Web development, it is a complicated process. There is a plethora of facets to assess, from performance to user experience. As far as building an eCommerce site is concerned, it is quite a challenging task. Most of the users tend to visit the website in order to gather information about and purchase products. For this reason, a Web Application Development Company tries its best to make this process intuitive and effortless. Besides considering usability, there are some po...

       2015-12-22 05:28:33

  User experience : Exception handling

Exception handling is the process of handling emergencies or unpredictable operational errors. The specific time of the occurrence of unexpected events and the actual consequences of the specific situation are difficult to predict. How to handle this unexpected crisis is also related to the user experience of your users. Let's first look at how some famous products deal with unexpected exception encountered by users:1. Goodyear tires can automatically expand when leaking.Tire blast is one of the...

   User experience,Exception handling     2013-04-06 05:05:04