Posts

Showing posts from April, 2014

What is Gimbal Pricing?

https://manager.gimbal.com/fee-schedule  

Any JS Encryption Libraries available?

http://stackoverflow.com/questions/793812/javascript-aes-encryption

What is Basic PhoneGap Architecture Like?

Image
  Source

Good Links for PMI Certification.

Here are a few suggestions: 1) Book (and other material) by Mike Griffiths - http://www.rmcproject.com/product/agile_prep.aspx 2) Online Course by Saket Bansal- http://www.izenbridge.com/pmi-acp/online-course/ 3) LinkedIn Groups 4) Discussions from the past on this group. Look at the files section as well. 5) Prep notes - http://pmi-acpexam.blogspot.in 6) Info from PMI - http://www.pmi.org/Certification/New-PMI-Agile-Certification/PMI-ACP-Exam-Prep.aspx

What are the Drawing basics

Image

Can PhoneGap work with local SQLite databases?

Short answer Yes   Long Answer http://stackoverflow.com/questions/9202354/can-phonegap-work-with-local-sqlite3-databases http://mindfiremobile.wordpress.com/2014/02/25/integrate-sqlite-plugin-in-phonegap-ios-application/comment-page-1/ https://github.com/lite4cordova/Cordova-SQLitePlugin https://github.com/nareshr/SQLite-Plugin http://community.phonegap.com/nitobi/topics/how_to_add_sqlite_plugin_to_phonegap_build_for_iphone_and_androin http://docs.phonegap.com/en/2.0.0/cordova_storage_storage.md.html https://github.com/davibe/Phonegap-SQLitePlugin  

How is AES different than SHA?

SHA belongs to the family of "Secure Hash Algorithms". You use the SHA functions to take any data like a document/password/text etc. and compute a "digest" or "hash" of the data. It's important to realize that this is a one-way process . You can't take back a hash/digest and get back the original data. MD5 or SHA are both crypto hash functions http://en.wikipedia.org/wiki/Cryptographic_hash_function       AES, on the other hand, is used to encrypt data, or prevent people from viewing that data with knowing some secret. AES is a family of functions called Symmetric-key algorithm that uses a shared key which means that the same key (or a related key) is used to encrypted the data as is used to decrypt the data at the receiver. This is different than Public-key cryptography family of algorithms that use a public key such PGP or SSL. http://en.wikipedia.org/wiki/Symmetric-key_algorithm