How Facebook Catches Bugs On Its 100 Million+ Lines Of Code Platform

As the giant of the web, there is only a few services with sophistication that par with Facebook.

Consisting of over 100 million lines of code (LOC), that is indeed a lot of typing. While Facebook teams of engineers managed that, they also have the responsibility to maintain those codes, by tweaking when necessary, adding more codes, or may even remove some.

With billions of users to serve, Facebook needs to make sure that its platform is up and secured, and capable of delivering all the contents it have under its sleeves to its ever-hungry users.

Polymorphic Malware, And How They Continually Change To Avoid Detection

There are a lot of variants of malware, with each having their own unique traits. Then there is one that continuously change.

This kind of malware is called 'polymorphic malware'. From viruses, worms, bots, trojans, or keyloggers, their polymorphic variants can have different characteristics every time they run, like having different file names and types or encryption keys.

With their ever-changing characteristics, polymorphic malware can be unrecognizable to many detection techniques.

The Ways Websites Can Survive Future Core Algorithm Updates, Advises Google

As the largest and the most popular search engine of the web, Google needs to tweak its algorithms to meet the ever-changing trends.

In any given day, Google usually releases one or more changes to its search engine algorithms to improve its search results. Most of the changes aren't noticeable, but in one way or another, they are meant to continually improve how Google Search works.

'Load Rage', And How People On The Internet Are Becoming Less Patient

Back in the late 1990s, the time when early generations of netizens started to know about the internet, the world was very different.

Using telephone number on a conventional telephone line, people use modems to 'dial' and connect to the internet using a mere speed of 56 kbit/s (using the V.90 or V.92 protocol), although in most cases, 40–50 kbit/s was the norm.

Fast forward to the matured internet, where netizens are pampered with fiber optics and megabits to gigabits of data per second, they are accustomed to speed.

The Reasons Why Super-Pricey High-End Smartphones Are So Good They Hurt Their Makers

When the world first experienced the internet and mobile phones, this created the hype where people spend their money to buy smartphones. But of course, at that time, high-end phones were cheaper, with the modern mobile future yet to be written.

Apple which was the one that sparked this trend, has used the demand to propel its business ahead, piggybacking the trend and became a $1 trillion company.

Anonymized Data Cannot Protect User Privacy, Researchers Said

In the world where data is transacted all the time, the cost includes unveiling user privacy.

This is regarded as a necessity in living in the modern connected ecosystem. From searching the web, using social media networks, to routine visit to the doctor, people are handing over an increasing amount of personal data to whoever they are interacting with.

From a privacy point of view, this is concerning.

How Blockchain Can Create Reliable Database That Cannot Be Corrupted

The problem with database is that, it needs to be accurate, with all of its transactions matched up. Then there are security issues needed to be addressed, access, reliability and cost.

With cloud computing and storage replacing conventional servers, database hosting has become increasingly cheaper, and yes, also more reliable. But when it comes to disaster recovery and permutability, the cloud may not be capable enough.

As a solution, blockchain can play its role.