Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Android security



  10 super useful PHP snippets you probably haven’t seen

When working with PHP, it is very useful to have a “toolbox” of handy functions and code snippets that can save lots of time when needed. Today, I’m going to show you 10 super useful code snippets that you probably never heard of. Text messaging with PHP using the TextMagic API If for some reason, you need to send text messages to your clients cell phones, you should definitely have a look to TextMagic. They provide an easy API which allow you to send SMS to cell...

   PHP,Code,Snippet,Useful code segment     2012-01-19 11:07:16

  JavaScript is now a necessity

I've long looked at JavaScript as a second-class citizen in the programming world. Early on, it was the source of numerous security problems; it was a nice bit of glue to patch together HTML applications with a bit of styling, but nobody would use it for serious code; and so forth. Java, Ruby, Python, they were the languages for doing real work. But my attitude toward JavaScript has changed completely in the past few years. JavaScript has "grown up." I'm sure there are many JavaScript dev...

   JavaScript,HTML5,Necessary,Client langua     2011-06-24 00:50:14

  bakercom1 5 Ways to Make Your IT Staff Unpoachable

When it comes to hiring practices, the tables have turned – capsized, actually. After a global recession saw thousands of jobs lost in IT departments everywhere, now the race is on to hire swarms of top talent. The trouble is: There isn’t enough talent to go around, and the threat of losing key staff to “poachers” is growing daily. “In the current war for talent in Silicon Valley, a lot of leaders believe that it is not possible to compete with the Google an...

   IT,Experts,Keep,Unpoachable     2011-07-25 08:35:49

  Ruby WinRM undefined method `split' for nil:NilClass

WinRM service is a service provided by Windows to enable remote access a Windows system. It is similar to what SSH is for *nix. And it is frequently used in applications which want to automate process or accessing remote Windows system and perform actions on them. Ruby also provided the WinRM gem which is an implementation of the WinRM service.  When using WinRM gem, one may often want to use :negotiate as the transport protocol for authentication. This transport will negotiate using d...

   RUBY,WINRM,INIT_AUTH,PROXY     2017-03-08 02:21:09

  When and Where to Use Pointers in Go

When declaring variables in Go, we usually have two syntax options: In some scenarios, pointers; in others, reference; sometimes, either. It’s great to have choices, but it is also confusing sometimes as to which one in which scenario. To be more reasonable in choice-making, I started from pointers, walked through their natures, and summarized some rules in using them in Go. from unsplash, Jordan Ladikos Pointers Go has pointers. A pointer holds the memory address of a ...

   POINTER,GOLANG     2022-05-01 02:24:43

  The 10 Greatest Hacks of My Life

My co-founder and I briefly considered applying to YCombinator for the Winter 2012 session. We eventually decided to bootstrap Curvio initially, and raise a seed round on our own after we launch (so far so good!). But looking over the YC application, one question intrigued me:Please tell us about the time you, tansey, most successfully hacked some (non-computer) system to your advantage.Now, there are a lot of ways to interpret this. A mechanical interpretation would be about...

   Hack,Most important,Example,Curvio     2011-10-22 12:47:42

  Windows 8 Possible Features: Ribbon, Metro, Apps, Cloud Integration

Microsoft may still be plugging away at selling Windows 7 to consumers and the enterprise, but rumors have already started about the next version of the popular operating system—dubbed "Windows 8" by many in the media. Rafael Rivera and Paul Thurrott, two bloggers with a track record of delving into Microsoft's proprietary code base, recently sparked a fresh round of chatter with a dissection of a supposed Windows 8 early build, adding their voices to a discussion that extends back to 201...

   Windows 8,New features,Touch,Metro     2011-04-11 02:10:12

  10 rules of PHP-masters

1. Use PHP only when it is necessary – Rasmus Lerdorf There is no better source than the creator of PHP, to learn what he can do. Rasmus Lerdorf created PHP in 1995. Since then, the language has spread like a wildfire rate in the developer community, incidentally changing the face of the Internet. However, Rasmus did not create PHP with these intentions. PHP was created for the needs of web development. As is the case with many other projects wi...

   PHP,Master,Experience,Advice     2011-12-16 09:38:07

  Difference Engine: Luddite legacy

AN APOCRYPHAL tale is told about Henry Ford II showing Walter Reuther, the veteran leader of the United Automobile Workers, around a newly automated car plant. “Walter, how are you going to get those robots to pay your union dues,” gibed the boss of Ford Motor Company. Without skipping a beat, Reuther replied, “Henry, how are you going to get them to buy your cars?”Whether the exchange was true or not is irrelevant. The point was that any increase in productivity required...

   Artificial intelligence,Engine,Difference,Human,Computer     2011-11-07 08:33:16

  Ajax file upload tutorial

Step 1 - AJAX file uploadAJAX file upload tutorialFirst of all I have to say that to create a pure AJAX file upload system is not possible because of security limitations of JavaScript. All of the Ajax upload systems I know use some third party tool/package or only mimics the AJAX feeling. Even so it makes file upload process a bit nicer. In the next section I will present you a solution which imitates the AJAX process, but uses a normal upload process and iFrames.The concept: Create a simp...

   Ajax,File upload,PHP,Tutorial,IFRAME     2011-04-22 13:34:33