SEARCH KEYWORD -- file system



  Generate signed certificate from CSR in Java

In our previous tutorial, we have explained how to generate CSR which can be sent to CA for generating a signed certificate. In this tutorial, we will explain how to generate the signed certificate from CSR in Java. We will not use an actual CA but a self-signed certificate to act as a CA certificate. Since the CSR contains the subject information where a certificate needs to be generated and signed for. The key here is to extract the subject information from the CSR and then set it as the subje...

   JAVA,CSR,SIGN CERTIFICATE     2020-10-24 07:03:17

  Microsoft releases Windows 8 RTM

Microsoft's Windows 8 RTM version now is available for download to MSDN and TechNet subscribers. This RTM version will be the same as the final Windows 8 release version. Windows 8 may be released on 26th October.Microsoft Software Assurance users will be able to get RTM version of the new system on 16th August. Volume License customers without Software Assurance will be able to purchase Windows 8 through Microsoft Volume License Resellers starting from 1st September.. Although this version is a...

   Windows 8 RTM, Release,MSDN,TechNet     2012-08-16 15:04:10

  The hidden risk of passing slice as function parameter

In Go's source code or other open source libraries, there are lots of cases where a slice pointer is passed to function instead of slice itself. This brings up a doubt why not passing slice directly as its internal is backed by an array pointer to point to underlying data? For example, in log package, the formatHeader function takes a parameter buf as type *[]byte instead of []byte. func (l *Logger) formatHeader(buf *[]byte, t time.Time, file string, line int) {} Let's understand the r...

   GOLANG,SLICE,SLICE POINTER     2020-12-13 06:11:14

  Mobile devices are facing new threats

More and more companies allow employees to use smartphones and tablet PCs in workplace, but they are facing a new potential threat - malware embedded in games and applications.Dan Hoffman, network security company Juniper Networks mobile security director, said the application store is quickly becoming the main delivery mechanism of infected applications. Consumers purchase applications for their equipments through an online application store.As the consumers are free to download applicatio...

   Mobile device,Data security,Malicious software     2012-04-05 13:00:57

  Python Disrupts the Programming Language World- Gets Hot and Popular

Python is one of the fastest growing languages currently. It is undeniable that more and more programmers use Python and deploy it to the best of their use. Everyone, from the freelancer and startups to giant corporations and even governments, is using Python. Let us have a look at the reasons that make it so popular.  Training: According to research, 8 out of 10 tech schools in the US teach Python over JAVA. Even the three major MOOC platforms, edX, Coursera, and Udacity have a similar app...

   DEVELOPMENT,PYTHON,TEAM     2018-06-07 01:02:03

  Singleton Pattern in Golang

Singleton pattern is the simplest design pattern in software design. It ensures that only one instance of an object exists globally, regardless of how many times the object is instantiated. Based on the characteristics of the singleton pattern, it can be applied to scenarios such as global unique configuration, database connection objects, file access objects, etc. In Go language, there are multiple ways to implement the singleton pattern. Today, let's learn together about some of these approach...

   GOLANG,SINGLETON PATTERN,TUTORIAL     2023-08-18 23:52:05

  Is Utah a good place for startups?

If you’re thinking of starting a business soon, then know that it’s a really good time to do so despite current circumstances. Rieva Lesonsky, a writer for the US Chamber of Commerce, highlights that today’s “new normal” has brought new customer demands and improved business technologies that you can take advantage of. In fact, many of the most successful businesses in the world, like Microsoft and Netflix, were created during an economic downturn. But this begs th...

   STARTUP,BUSINESS,UTAH     2020-11-19 06:12:05

  GCC is compiled with C++ compiler

On 15 Aug, 2012, GCC merged a patch--Merge from cxx-conversion branch . This means GCC will be compiled with C++ compiler in the future, it also means that GCC will be implemented using C++. You may have following two puzzles: Why does GCC turn to C++? Without C++ compiler, how can we compile C++ codes? Why using C++? In GNU's C++ Conversion, we can find this description in the background section: Whether we use C or C++, we need to try to ensure that interfaces are easy to understan...

   GCC,C++,Compiler     2012-09-04 02:36:06

  Why doesn't Google copy successful startup ideas?

Google is definitely one of the largest players in Internet world. It owns the most popular search engine, mobile operating system and mapping service. It not only has huge user base but also is extremely rich. It can copy and create any product that is proven to be successful with its talent pool and money. But why doesn't Google copy those successful startup ideas? Based on the current status quo and culture gene of Google, there are several reasons Google doesn't copy startup ideas. First, Go...

   Google,Startup,Copy     2013-09-11 07:03:02

  A mini guide to HTTP referer

In HTTP header, there is a field named Referer which is to provide the referrer of the current accessed page. In this post, we will introduce the usage of HTTP referer field. On the web, when a user visits a webpage, s/he must be from some place. This place is usually referred a s referer. This information is very important to some website operators and server owners as they want to know where they get the traffic from and this helps them provide better service for potential targeted users. In t...

   HTML,HTTP REFERER,REFERRERPOLICY     2019-06-29 02:23:25