Maintaining the security of your private key is of critical importance, both to you and to the user. If you allow someone to use your key, or if you leave your keystore and passwords in an …
Category: Technology
Torbjorn has been working with IT technology since 1980, Torbjorn is sharing his view and experiences on digital technology
When you want to release your Android application to Google Play, you need to first sign your app. To do that there are some prerequisites. My examples are for Eclipse users. Before you can sign your …
Developing Android Apps on a Windows 7 platform and you need to find your android debug.keystore key, then do the following. step 1: go to – C:Program FilesJava<your java version>bin – and run jarsigner.exe first ( …
Skype is a great service, that I use frequently to keep in touch with friends and family. Skype is changing, I learned today that Skype is going to serve up “Conversation Ads” during audio calls. One …
For various reasons, database tables could get corrupted, and when it happens you should not panic. Reasons could be many, table corruption should be rare when using MySQL (though an overheating server continually restarting at the …
PCs and associated peripherals contribute approximately 31 percent of worldwide information and communication technology (ICT) energy use, and many companies would like to pare this down, but don’t know where to start. …
In today’s world, we store large parts of our life on computers. Information such as pictures, documents, movie clips, contact lists, etc. is all stored on our computers. There are many ways your data could get …
Spring is here, which means office workers across Canada are getting ready to roll up their sleeves and clear workplace clutter. Not only does the annual chore slim storage cupboards and deep-clean desk drawers, but it …