SEARCH KEYWORD -- version control



  Expectations, Desperation And Anticipation All You Need To Know About iOS 9.3

With so much anticipation filled among the audience, iOS 9.3 on contrary came out to be as a blooper. All the users were filled with a lot of enthusiasm about the latest advancements in the software, but the final release went to several crest and troughs. iOS 9.3 was quite important for the users when it comes to mobile OS update, however this did not go as it was expected to be for the iOS. The latest software in some cases is locking users. Along with the users this has also creased the eye ...

   IPHONE APP DEVELOPMENT,IPHONE APP DEVELOPER,IOS DEVELOPER,IOS APP DEVELOPMENT,IPHONE APP DEVELOPERS     2016-04-11 03:05:15

  The story behind Sublime Text

Sublime Text is a cross-platform text and source code editor, with a Python application programming interface (API). The graphical user interface design was inspired by Vim.Its functionality is also extendable with plugins; Post its release, it gained much attention and wide popularity. Do you know what's the story behind Sublime Text? Jon Skinner left his job as a software engineer at Google in order to pursue a dream: to build a better text editor. The end result is the popular Sublime Text t...

   Sublime Text,Story,History     2013-09-22 11:05:36

  Amazon is a good company but doesn't have the best business model

Public opinion about a company is usually based on its performance. If it performs well, people will praise it, otherwise people will blame it. In 1999, Apple was still a broken apple(Steve Jobs's talent and effort was paid off yet). Public opinion about Apple was the closed model caused Apple's failure. They built hardware themselves, developed software themselves and delivered service themselves, this is certainly not sustainable. But Steve Jobs let everyone see this new model. In order to con...

   Business model,Amazon,Apple, Microsoft     2013-07-02 11:34:45

  Coming up Next for JavaScript Web Apps Is Next.Js 3

Are wondering who is going to be the next PHP of the internet; except JavaScript. Next.js is all set to bring the PHP experience to JavaScript with its latest version. As the technology continues to be considered as a “win” amongst a number of developers across the globe, professionals are trying to improve it as much as they can. Because of its minimalist approach to server-rendered apps, this highly customizable framework can be recommendable for beginners as well as experienced pr...

   NEXT.JS3,JAVASCRIPT     2017-11-20 23:43:38

  A simple example on implementing progress bar in GoLang

Sometimes when handling a long running process, there would be need to track the progress so that people know something is still running instead of doubting something goes wrong. In this case, a progress bar which indicates the current status and progress would be desired. This post will show an example on how to implement progress bar using GoLang. Let's take a look at the final outcome first before jumping into the implementation detail. The key in the implementation is actually just the \r ...

   TUTORIAL,EXAMPLE,GOLANG,PROGRESS BAR     2020-08-08 23:53:15

  etcd installation and usage

etcd is an open source and highly available distributed key-value storage system and is commonly used in critical data storage and service discovery and registration use cases. It is focusing on: Simple: well-defined, user-facing API (gRPC) Secure: automatic TLS with optional client cert authentication Fast: benchmarked 10,000 writes/sec Reliable: properly distributed using Raft etcd and Redis both support key-value storage and can be set up in distributed systems. Also Redis supporst more key...

   ETCD,TUTORIAL,RAFT,DISTRIBUTED SYSTEM     2021-03-07 03:10:33

  Sales of phones with NFC capability increased by 300% in 2012

According to Sina Tech, Research firm Berg Insight latest report shows that the global NFC smartphone sales increased by 300% to 140 million units in 2012.The report said that the compound annual growth rate of NFC smartphones sales will reach 48.2% in next few years, and in 2017 the number of smartphones sold will reach 1 billion units.NFC is widely used in mobile phones began in 2011, In 2012, the top ten mobile phone manufacturers launched nearly 100 models of NFC mobile phones. In addition t...

   NFC,Apple,2012     2013-06-20 08:51:09

  Access control in Java -- doPrivileged

Previously we have introduced how Java performs permission check to protect resource access. What if sometimes we need to give some class the temporary access to some resource which it initially doesn't have? AccessController provides six doPrivileged methods to fulfill this requirement. These six methods have below signatures : static T doPrivileged(PrivilegedAction action)static T doPrivileged(PrivilegedAction action, AccessControlContext context)static T doPrivileged(PrivilegedExceptionA...

   JAVA,SECURITY,DOPRIVILEGED     2016-03-08 05:46:42

  The biggest change ever of iOS--iOS 7

In this year's WWDC, Apple unveils its new iOS--iOS 7. The new iOS has the most significant change since it first came to the public. But many people may be disappointed about this. I am not one of them. In WWDC, Tim Cook said iOS 7 is more flatter than before and it has a completely new user interface design, new slide to unlock feature, official share and weather apps are redesigned. The weather apple now has almost the same feature as the newly updated Yahoo weather application. Ive said the...

   iOS 7,new design,Apple     2013-06-10 22:39:45

  Access control in Java -- Permission check order

Previously we showed you how to turn on SecurityManager in Java. After SecurityManager is turned on, a series of permission checks will be applied on the code you are calling in your application to protect some resources against malicious access such as files, sockets etc. To perform these permission checks, a set of Permissions will be created and checked using the AccessController. The AccessController has three purposes : To decide whether an access to a critical system resource is to be all...

   JAVA,SECURITY,ACCESSCONTROLLER     2016-03-07 04:17:40