Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Authoring tool



  An open letter to those who want to start programming

First off, welcome to the fraternity. There aren’t too many people who want to create stuff and solve problems. You are a hacker. You are one of those who wants to do something interesting. “When you don’t create things, you become defined by your tastes rather than ability." – WhyTheLuckyStiff Take the words below with a pinch of salt. All these come from me – a bag-and-tag programmer. I love to get things working, rather than sit at something and over-o...

   Programming,Tips     2011-06-09 23:45:45

  An open letter to those who want to start programming

First off, welcome to the fraternity. There aren’t too many people who want to create stuff and solve problems. You are a hacker. You are one of those who wants to do something interesting. “When you don’t create things, you become defined by your tastes rather than ability." – WhyTheLuckyStiff Take the words below with a pinch of salt. All these come from me – a bag-and-tag programmer. I love to get things working, rather than sit at something and over-o...

   Tips,Programming,C,C++,Java,Skill,Develo     2011-08-11 11:24:50

  Scala feels like EJB 2, and other thoughts

At Devoxx last week I used the phrase "Scala feels like EJB 2 to me". What was on my mind?ScalaFor a number of years on this blog I've been mentioning a desire to write a post about Scala. Writing such a post is not easy, because anyone who has been paying attention to anti-Scala blog posts will know that writing one is a sure fire way of getting flamed. The Scala community is not tolerant of dissent.But ultimately, I felt that it was important for me to speak out and express my opinions. As I s...

   Scala,Module,EJB,Concurrency,Feature     2011-11-22 08:29:44

  7 Ways Tablets are Better than Laptops or Smartphones

Imagine a situation of preparing for a short weekend trip to a smaller village or a countryside with beautiful nature, fresh air and breathtaking scenery, where your cousins are eagerly expecting you for their twentieth marriage anniversary; you seem to be almost ready, but one thing is missing!  A considerable amount of work is still ahead of you, and you also want to stay in touch with your friends, which makes it a bit difficult to decide whether it would be more suitable to take your l...

   TABLETS,SMARTPHONE,LAPTOP     2018-07-25 05:32:44

  The business of software

Inspired by a talk I gave yesterday at the BOS conference. This is long, feel free to skip!My first real job was leading a team that created five massive computer games for the Commodore 64. The games were so big they needed four floppy disks each, and the project was so complex (and the hardware systems so sketchy) that on more than one occasion, smoke started coming out of the drives.Success was a product that didn't crash, start a fire or lead to a nervous breakdown.Writing software...

   Software,Design,Business,Software design     2011-10-29 07:22:09

  Why, oh WHY, do those #?@! nutheads use vi?

Yes, even if you can't believe it, there are a lot fans of the 30-years-old vi editor (or its more recent, just-15-years-old, best clone & great improvement, vim). No, they are not dinosaurs who don't want to catch up with the times - the community of vi users just keeps growing: myself, I only got started 2 years ago (after over 10 years of being a professional programmer). Friends of mine are converting today. Heck, most vi users were not even born when...

   Linux,Vi,Vim,Advantage,History     2012-02-05 07:21:17

  What is the Right Length of a Blog Article?

The length of your blog posts can build your website or break it. If you thought that this is a myth then you are wrong. Pleasing the search engines is one of the targets of SEO efforts. However, you have to please your visitors as well. With good traffic then you will get good ranking on the Search Engine Results pages (SERPs). One of the best ways to increase your traffic is to make sure that once a visitor lands on your site then they will come again for more information. The length of your b...

   DIGITAL MARKETER ,SEO,SEO TOOLS     2016-03-05 04:18:28

  The Greatest Hacks of All Time

Reader's advisory: Wired News has been unable to confirm some sources for a number of stories written by this author. If you have any information about sources cited in this article, please send an e-mail to sourceinfo[AT]wired.com. In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company. With another noi...

   Hack,Greatest,All time     2012-02-29 05:05:42

  Some measures for improving Linux server security

The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...

   Linux server,Server security     2012-08-21 05:08:50

  File System vs Core Data: the image cache test

Code for this project is on GitHub While doing a full re-write of Droplr's iOS app for the 2.0 launch, I couldn't find any good file/image caches out there had a particular feature I really wanted: extending item expiration whenever it's touched. I set out to write my own — which wasn't that much of a challenge — but somewhere along the process I had this crazy idea that perhaps (SQLite-backed) Core Data would be a much better tool for the job: No mismatch between cache index ...

   File system.Image cache,Multimedia     2012-02-01 08:52:02