All Blogs / Technology / Programming / Popular


Convert File into Zip and download With Ajax and Mvc

This article is about how to convert files into Zip and download as single Zip.

What, You Can’t Tell Two Lemurs Apart? Computers Can

New software that sees spots and stripes are helping biologists track animals in the wild without the tranquilizer guns and radio collars. The post What, You Can’t Tell Two Lemurs Apart? Computers Can appeared first on WIRED.

Best Adobe Lightroom presets for 2017

If you are a Photographer who is familiar with Lightroom for developing your photos, then you will no doubt be aware of the power of presets. Presets are settings that when applied to your photos can give a whole range of different effects...Show More Summary

A Super-Common Crypto Tool Turns Out to Be Super-Insecure

NIST has been warning about vulnerabilities in its SHA-1 cryptographic hash function for years, but some services still use it and the threats are growing. The post A Super-Common Crypto Tool Turns Out to Be Super-Insecure appeared first on WIRED.

A Look Inside Britain’s Plucky (and Criminally Overlooked) Space Program

A photographer combines his love of space and the UK in one remarkable project. The post A Look Inside Britain's Plucky (and Criminally Overlooked) Space Program appeared first on WIRED.

Additional PHP packages for RHSCL - Remi Collet

Current situation about official repositories providing PHP Software Collections for  RHEL and CentOS users. Since RHSCL 2.3 was released, RHEL users can install PHP 5.6 or PHP 7.0 without base système alteration, using the appropriate...Show More Summary

SPA^2 using ASP.Net Core 1.1 + Angular 2.4 - part 4

Add JSON Web Token Authentication (JWT) using OpenIDDict to our ASP.Net Core + Angular 2 SPA.

Editor's Soapbox: The Billable Hour

For every line of code that ends up in software the general public sees or interacts with, for every line in your Snapchats and Battlezone: Call of Honor Duty Warfare, there are a thousand lines of code written to handle a supply chain...Show More Summary

Build Realtime Clock Using Angular2, TypeScript, ASP.Net and SignalR

In this article we will see how we can create real time clock using SignalR and Angular2 and integrate the angualr2 app inside ASP.Net and see its results.

PHP Articles Report February 2017 Edition - PHP Classes

PHP Articles Report February 2017 Edition By Manuel Lemos This is the February 2017 edition of the podcast hangout recorded by Manuel Lemos and Arturs Sosins to comment on the latest outstanding PHP articles published recently. In this...Show More Summary

OAuth2 Framework explained with examples

A description of the OAuth2 grant types, explained using real world examples

Two accepted papers in ESWC 2017

Hello Community! We are very pleased to announce the acceptance of two papers in ESWC 2017 research track. The ESWC 2017 is to be held in Portoroz, Slovenia from 28th of May to the 1st of June. In more detail, we will present the following...Show More Summary

Visualizing Documents in 3D

Uses latent semantic analysis to visualize documents in 3D.

Hashcash or "Proof of Work"

Hashcash is a proof-of-work system used to limit email spam and denial-of-service attacks, and more recently has become known for its use in bitcoin (and other cryptocurrencies) as part of the mining algorithm.

New OpenStack Ocata stabilizes popular open-source cloud

Instead of new features, this latest OpenStack release focuses on improving stability and performance.

Just Enough Set Theory – When Sets Collide (Part 3 of 3)

Welcome to the final installment of this three-part series on set theory. The first piece, Set Theory Defined, detailed requisite foundational knowledge. The second article, Set Operations, outlined some beneficial set algorithms. This post develops the concepts laid out in the first two; therefore,

Get Out’s Stars Bravely Take Us on a Tour of Their Phones

Allison Williams' most frequently used emoji are pretty basic, in case you were wondering. The post Get Out's Stars Bravely Take Us on a Tour of Their Phones appeared first on WIRED.

Webinar Thursday, February 23, 2017: Troubleshooting MySQL Access Privileges Issues

Please join Sveta Smirnova, Percona’s Principal Technical Services Engineer, as she presents Troubleshooting MySQL Access Privileges Issues on February 23, 2017 at 11:00 am PST / 2:00 pm EST (UTC-8). Do you have registered users who can’t connect to the MySQL server? Strangers modifying data to which they shouldn’t have access? MySQL supports a rich […]

Percona Monitoring and Management (PMM) Graphs Explained: MongoDB with RocksDB

This post is part of the series of Percona’s MongoDB 3.4 bundle release blogs. In mid-2016, Percona Monitoring and Management (PMM) added support for RocksDB with MongoDB, also known as “MongoRocks.” In this blog, we will go over the Percona Monitoring and Management (PMM) 1.1.0 version of the MongoDB RocksDB dashboard, how PMM is useful in the […]

Copyright © 2015 Regator, LLC