SEARCH KEYWORD -- Address
IBM Launches Maqetta HTML5 Tool as Open-Source
IBM announced Maqetta, an HTML5 authoring tool for building desktop and mobile user interfaces, and also announced the contribution of the open-source technology to the Dojo Foundation. LAS VEGAS – At the IBM Impact 2011 conference here, IBM announced both Maqetta as well as the open-source contribution of its Maqetta HTML5 visual authoring tool to the Dojo Foundation. Maqetta is an open-source project that provides WYSIWYG visual authoring of HTML5 user interfaces using drag-and-drop ass...
IBM,Open Source,Dojo foundation,HTML 5,W 2011-04-12 01:59:29
The False Ideals of the Web
WE who love the Internet love the fact that so many people contribute to it. It’s hard to believe that skeptics once worried about whether anyone would have anything worthwhile to say online. There is, however, an outdated brand of digital orthodoxy that ought to be retired. In this worldview, the Internet is a never-ending battle of good guys who love freedom against bad guys like old-fashioned Hollywood media moguls. The bad guys want to strengthen copyright law, and make ...
Web,False idea,Free,SOPA 2012-01-19 10:24:25
Java is not the new COBOL
If you Google “Java is the new COBOL†you’ll find a glut of articles proliferating this mantra. I don’t know its origins, however I’m inclined to think it’s mostly repeated (and believed) by the Ruby community. Ruby, from a developer’s perspective is a low-friction language. A developer can just sit down at a text editor and start banging out code without really thinking about such superflous things as types. Java on the other hand, well, you h...
Java,Ruby,Type,COBOL,Comparison 2011-11-10 10:40:56
How To Find Link Prospects Without Using Google
I’m obsessed with Google. (I mean, you kind of have to be if you’re in this industry.) But sometimes, you need a break from the hand that feeds. There’s no denying the power of advanced search queries, but you’d be surprised how many other and different prospects you can find without using the search engine at all. Curated Lists OK, I lied. You do have to use Google for this, but not nearly in the capacity you would with normal searches. With lists, you have less ...
Search engine,Web site prospect,SEO 2012-02-25 12:02:50
SQL Injection through HTTP Headers
During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to SQL injection flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever. What about other HTTP header parameters? Aren’t they potential input vectors for SQL injection attacks? How can one test all these HTTP parameters and whic...
Code security,SQL injection,HTTP header 2012-04-05 11:42:04
The Giant Mafia
There is an old Chinese saying "Things of a kind come together. People of a mind fall into the same group.". In the wave of Web 2.0, there are many emerging IT giants coming out the world. And many of them are founded by a group of people who previously worked together at the same company such as PayPal and Facebook. This is called giant mafia. Let's see what people from the big IT giant have done after leaving the original company. The PayPal mafia Peter Thiel, co-founder and CEO of PayPal bef...
Facebook mafia,PayPal mafia,Twitter mafia 2015-04-04 10:32:00
How does computer boot up?
The whole boot process of computer can be summarized in 4 phases. 1. BIOS In the 70's read-only memory(ROM) was invented. The boot program is written into ROM, the first thing the computer does is to read and execute this program when it's powered on. The program in this chip is called "Basic Input/Output System" (BIOS). 1.1 Power-On Self-Test The BIOS will first check whether the computer hardware can fulfill the basic conditions for booting up, this process is called Power-On Self-Test...
Are college students learning?
In his State of the Union address last Tuesday, President Obama proposed several measures to lower college tuition. University leaders responded cautiously, warning that cost-cutting reforms might also cut into instructional quality. But here's the big open secret in American higher education: Most institutions have no meaningful way to measure the quality...
College students,Learning,Survey 2012-02-02 07:10:02
Service discovery with etcd
In previous post, we have talked about etcd and its usage. This post we will cover how to implement server discovery with etcd. Service discovery is to solve one of the most commonly seen scenarios in distributed system where how to find the corresponding target service to talk to. In short, it is to find some server which one can talk to based on some service name. A complete service discovery system include below three key functions: Service registration: A service must register itself to so...
ETCD,SERVICE DISCOVERY,DEMO,TUTORIAL 2021-03-08 05:36:29
Data as code
What is a good command line parser API? A good command line parser should consider below 5 aspects: Support convenient help information generation Support sub commands, for example, git has push,pull,commit sub commands. Support single character option, word option, flag option and option with parameter. Support default option, for example, if no -port is set, set it as 5037 Support usage model, for example, tar's -c and -x is mutually exclusive, they belong to different usage models. Here are...
Command line,API 2013-08-08 22:40:36
RECENT
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- more>>