July 18, 2014

5 Development Mistakes that Can Lead to Security Breaches

Despite all the attention on the need to write secure code, vulnerabilities continue to show up in applications. How does it happen? InfoWorld put together a list of five coding practices that can compromise security: Trusting third-party code that can’t be trusted. Hard-coding passwords and backdoor accounts. Failing to check

Tie designer thread of love to the wrist of your brother

Raksha Bandhan is the festival of joy, love and happiness. It is the celebration of love between brother and sister. Make this celebration bright and beautiful with the beauty of designer threads and gifts. Send Rakhi to UK at right price through online shopping and express your best love and

Skewering Some Buzzword Baloney

Making up new words for old concepts – or using old words for new concepts – goes on all the time in the world of marketing, so you’d think we’d all be used to it by now. But sometimes these efforts at out-buzzing the next guy’s buzzword just end up

Intro to Apache MapReduce 2 (YARN)

Since Hadoop version 0.23, MapReduce has changed significantly. It is now known as MapReduce 2.0 or YARN. MapReduce 2.0 is based on the concept of splitting the two major functionalities of job tracker?resource management and job scheduling?into separate daemons. In this article, we will discuss YARN/MapReduce 2.0 and the functionalities