Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- HTML to Wordpress Conversion



  The war with spam comment

Spam comments are annoying and notorious. They are either malicious data from hackers to exploit the loopholes of the site or advertisements posted by robots. These kinds of comments have their own features and patterns, if we are careful enough, we can find ways to block most of them although it's not so easy. To block the comment with malicious executable codes such as JavaScript, we should remember one rule : never trust user input. So wherever there are user inputs, we need to check the vali...

   Spam comment,Block,Filter     2013-11-29 20:29:43

  What’s making Drupal gain momentum among government organizations?

Drupal has come up as a big splash in the world of Website development. Whether it’s an informative website or an e-commerce store, Drupal has been successfully utilized for meeting customized web requirements. It’s not surprising to find entrepreneurs, hailing from different business verticals, choosing Drupal for powering their websites. Joining this group of elite Drupal users are the representatives of government organizations. The noticeable popularity of Drupal has indeed made ...

   Drupal     2014-03-12 08:15:43

  How to Become a Successful Web Designer

All web designers walk a thin line between art and business. Their job is to make a business site flourish, generate leads and revenue, yet – it has to represent the company in the best possible light. In order to achieve greatness in the world of web design, you need a lot of patience, hard work, and persistence. Most of the average designers make quite similar sites, limited in certain ways, and they choose to keep to the already tried out technique, but this can come at a cost for any ...

   WEB DESIGN,WEB DEV     2017-06-30 07:17:42

  Microsoft’s “Picture Password”: A Breath Of Fresh Air On The Lock Screen, Of All Places

Remember that feeling you got back when Steve Jobs was unveiling the iPhone, and he did the “slide to unlock” gesture for the first time? I remember the way he said it – “You like that? Want to see it again?” Since then I haven’t seen a lock screen interface that has made me feel that same “how obvious, how elegant!” feeling – until today at the NVIDIA press conference, and later at the Microsoft keynote here at CES. It sounds a little silly...

   Microsoft,Windows 8,Picture Password,CES     2012-01-10 06:55:28

  Converting Decimal Fractions to Binary

Converting Decimal Fractions to Binary In the text proper, we saw how to convert the decimal number 14.75 to a binary representation. In this instance, we \"eyeballed\" the fractional part of the binary expansion; 3/4 is obviously 1/2 + 1/4. While this worked for this particular example, we\'ll need a more systematic approach for less obvious cases. In fact, there is a simple, step-by-step method for computing the binary expansion on the right-hand side of the point. We will illustrate the metho...

   Decimal,Fractional,Binary     2011-03-19 06:45:35

  Sequencing the Startup DNA on LinkedIn

What makes entrepreneurs different, and where do they come from? Are they born or taught? Are they unusually mobile in their careers? Does geography play a role? Do mentors and relationships matter?Numerous studies explore these questions by surveying hundreds of entrepreneurs. At LinkedIn, we take a different approach, on a different scale. By sifting through more than 120 million public profiles, we can analyze tens of thousands of startup founders’ [1]profiles – and find co...

   Startup,Linkedin,Experience,Tips,DNA,Seq     2011-09-07 10:38:58

  Tricks with Direct Memory Access in Java

Java was initially designed as a safe managed environment. Nevertheless, Java HotSpot VM contains a “backdoor” that provides a number of low-level operations to manipulate memory and threads directly. This backdoor – sun.misc.Unsafe â€“ is widely used by JDK itself in packages like java.nio or java.util.concurrent. It is hard to imagine a Java developer that uses this backdoor in any regular development because this API is extremely dangerous...

   Java,Directly memory access,Tricks,JVM     2012-02-13 05:31:19

  Australian software engineer got asked algorithm question when entering US

The whole world knows that security and background checks get tighten for people to enter US since Donald Trump took office. But have you ever heard about getting algorithm question asked during the immigration check interview while entering United States? Recently an Australian software engineer David Thornton had such an experience when he tried to enter US. (Image from kaytlentravels.wordpress.com) David is a software engineer from Sydney and he is a 24-year-old studied computer sci...

   NEWS,DONALD TRUMP,UNITED STATES     2017-03-04 12:07:54

  How to tell if this idea is a good idea.

Good Idea or Bad Idea?I’ve got an idea for a product. I’ve talked to some people. I know some people in the industry. I have been cold calling others. The idea is promising. The price point people have agreed with is about where I would like it to be. I’ve shown some mockups around and iterated on them. Now, I feel the need to start writing code because, well, I like writing code. And I’m comfortable writing code.But I see lean people.Steve Blank, Eric ...

   Idea,Good,Bad,Distinguish,Feature,Coding     2011-11-24 09:19:01

  Best Rich Text Editors ready to use in web projects

This post illustrates five interesting rich text editors ready to use in your web projects. I also provided some guidelines regarding how to implement them on your pages using a few lines of HTML code. Try them!1. Yahoo! UI Library: Rich Text EditorThe Yahoo! Rich Text Editor is a UI control that replaces a standard HTML textarea and is based on Yahoo! UI Library; it allows for the rich formatting of text content, including common structural treatments like lists, formatting treatments like...

   RTE,Example,Project,Open Source,Best,Sim     2011-07-27 10:57:33