SEARCH KEYWORD -- type system
The history of the name Google
Google now is known almost by everyone who has internet access. It's the most frequently accessed search engine around the world and it provides fast speed and high quality search results. While you are using Google, have you ever wondered how the name Google comes? According to Steven Levy, the author of the book In The Plex: How Google Thinks, Works, and Shapes Our Lives. The original name for the project was named BackRub and was coded by Sergey Brin. He was thinking that web pages made thei...
GOOGLE,HISTORY,GOOGLE NAME,GOOGOL 2016-12-03 20:58:06
Generate signed certificate from CSR in Java
In our previous tutorial, we have explained how to generate CSR which can be sent to CA for generating a signed certificate. In this tutorial, we will explain how to generate the signed certificate from CSR in Java. We will not use an actual CA but a self-signed certificate to act as a CA certificate. Since the CSR contains the subject information where a certificate needs to be generated and signed for. The key here is to extract the subject information from the CSR and then set it as the subje...
JAVA,CSR,SIGN CERTIFICATE 2020-10-24 07:03:17
Using Nlog Logging Framework With Vnext In Asp.Net
In this article, asp.net development company experts will brief you about asp.netVNext and its features. They will also explain how to use NLog Logging framework in Asp.net. Read this article and learn what they want you to understand. Overview of Asp.Net VNext The next level of Asp.Net after Asp.Net 5 is Asp.Net VNext. Currently, the code is run in Asp.Net with same CLR as that of desktop apps. There is a need for cloud optimized version of Asp.Net for getting higher throughput with lesser memo...
ASP.NET ,ASP.NET DEVELOPMENT COMPANY,ASP.NET VNEXT 2016-10-26 01:14:53
Microsoft releases Windows 8 RTM
Microsoft's Windows 8 RTM version now is available for download to MSDN and TechNet subscribers. This RTM version will be the same as the final Windows 8 release version. Windows 8 may be released on 26th October.Microsoft Software Assurance users will be able to get RTM version of the new system on 16th August. Volume License customers without Software Assurance will be able to purchase Windows 8 through Microsoft Volume License Resellers starting from 1st September.. Although this version is a...
Windows 8 RTM, Release,MSDN,TechNet 2012-08-16 15:04:10
Using Fabric to deploy web app
Many people may use FTP and rsync to synchronize codes to server, this way is fine but it may be troublesome when you need to deploy many times a day, actually there is a simple way if you can spend time on finding the fast way. We introduce Fabric today for deploying web app to remote server. Fabric is a deployment tool written with Python, the biggest feature if it is you no need to login to remote server, you can execute remote commands locally. Here is s simple deployment script written with...
Fabric, Web deployment,SSH,Python 2012-12-08 03:16:00
4 ways to obtain access token in OAuth 2.0
OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...
OAUTH2,ACCESS TOKEN,REFRESH TOKEN 2019-06-29 07:12:03
Mobile devices are facing new threats
More and more companies allow employees to use smartphones and tablet PCs in workplace, but they are facing a new potential threat - malware embedded in games and applications.Dan Hoffman, network security company Juniper Networks mobile security director, said the application store is quickly becoming the main delivery mechanism of infected applications. Consumers purchase applications for their equipments through an online application store.As the consumers are free to download applicatio...
Mobile device,Data security,Malicious software 2012-04-05 13:00:57
Hey, you may be happy to know these mottos about programming languages
Different programming are similar in helping people build staff work as people want them to. But they all have their own features which differentiate them from other programming languages. The language type may be different, for example Java is OOP, some may have different syntax. A programming motto usually can best describe the characteristic of the programming language. For example, "Write once Run everywhere" for Java. But today we are going to take a look at "unofficial mottos" about some p...
motto,programming language 2014-04-05 20:02:13
Python Disrupts the Programming Language World- Gets Hot and Popular
Python is one of the fastest growing languages currently. It is undeniable that more and more programmers use Python and deploy it to the best of their use. Everyone, from the freelancer and startups to giant corporations and even governments, is using Python. Let us have a look at the reasons that make it so popular. Training: According to research, 8 out of 10 tech schools in the US teach Python over JAVA. Even the three major MOOC platforms, edX, Coursera, and Udacity have a similar app...
DEVELOPMENT,PYTHON,TEAM 2018-06-07 01:02:03
Use Delve to debug GoLang program
If you don't know how to debug program, you are not a real programmer. gdb can be used to debug go program, but according to golang website, delve is a better option. Note that Delve is a better alternative to GDB when debugging Go programs built with the standard toolchain. It understands the Go runtime, data structures, and expressions better than GDB. Below is a simple go program. package main type Person struct { Name string Age int } func main() { var me Person me.Nam...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>