Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Auto tweet



  5 Pro Tips Social Media Managers Swear By

Digital marketing is ruling the world, and rightly so. It's cost-effective, it increases business growth and helps in building a brand reputation. But to get successful results, it is important to target the right audience. This is where a social media manager’s experience helps. Social media managers create and manage a brand’s promotion strategy by monitoring the activity of their core audience. They are responsible for handling social media accounts and running marketing campaigns...

   SOCIAL MEDIA     2021-05-02 06:51:18

  Popular Golang JSON libraries evaluation

JSON (Javascript Object Notation), a prevailing data exchange format, is widely used in various platforms and languages. Golang, of course, will never miss the support for JSON. And with its own standard library, such as those interfaces like the REST API from the API Service in Kubernetes, it can easily process JSON. Although Go’s library works great, we can still seek those open-source JSON libs in Github to maximize our efficiency. Then the features, performance, applicability of these ...

   FASTJSON,JSON LIB,JSON LIB COMPARISON,GO-JSON     2021-12-11 23:13:23

  Don’t Call Yourself A Programmer, And Other Career Advice

If there was one course I could add to every engineering education, it wouldn’t involve compilers or gates or time complexity.  It would be Realities Of Your Industry 101, because we don’t teach them and this results in lots of unnecessary pain and suffering.  This post aspires to be README.txt for your career as a young engineer.  The goal is to make you happy, by filling in the gaps in your education regarding how the “real world” actually works.  ...

   Career,Programmer,Advice,Low level,Development     2011-10-29 07:09:23

  Kubernetes Authentication & Authorization 101

If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αὐθεντικÏŒς authentikos, “real, genuine”, from αὐθέντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...

   RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES     2021-06-05 23:19:18

  Multi-master,NoSQL and MySQL

The MySQL family has been innovating rapidly. New features need names and sometimes those names are confusing. Describing something as multi-master or a NoSQL solution has confused me.Multi-master requires one of conflict prevention, conflict resolution or faith. MySQL Cluster provides both conflict prevention and resolution as described in these great posts. Regular MySQL has minimal support for conflict prevention (auto-increment-offset can prevent insert conflict...

   MySQL,NoSQL,Comparison,RANT,Master     2011-10-17 11:30:42

  What is the Right Length of a Blog Article?

The length of your blog posts can build your website or break it. If you thought that this is a myth then you are wrong. Pleasing the search engines is one of the targets of SEO efforts. However, you have to please your visitors as well. With good traffic then you will get good ranking on the Search Engine Results pages (SERPs). One of the best ways to increase your traffic is to make sure that once a visitor lands on your site then they will come again for more information. The length of your b...

   DIGITAL MARKETER ,SEO,SEO TOOLS     2016-03-05 04:18:28

  10 Easy Things to Do to Enhance Your Online Security Today

If you think you don’t need to take extra steps to increase your cyber security, you are wrong. Statistics on cybercrime are shocking and clearly prove that you can’t have ‘too much security’ while using the Internet today. For example, did you know that by 2023 cybercriminals will have stolen over 33 billion private records or that 15 million Americans became victims of digital identity theft in 2017 (Norton)? That’s not even mentioning millions of monetary losses ...

   DATA SECURITY,SECUIRITY     2019-01-21 07:01:37

  How Google Tests Software - Part Three

Lots of questions in the comments to the last two posts. I am not ignoring them. Hopefully many of them will be answered here and in following posts. I am just getting started on this topic.At Google, quality is not equal to test. Yes I am sure that is true elsewhere too. “Quality cannot be tested in” is so cliché it has to be true. From automobiles to software if it isn’t built right in the first place then it is never going to be right. Ask any car company that has ever h...

   Google,Software,Testing,Quality,Fidelity     2011-03-22 14:31:00

  The several flavors of random in Java

Random number generation is one of most basic features in any programming language. The basic utilization is always the same: generate a random number between 0 and 1. With such a simple resource at hand we sometimes overlook some interesting features. What do we learn from the books? The most obvious and maybe intuitive way to generate random numbers in Java is simply calling: java.lang.Math.random() Random generation is in the Math utility class with abs, pow, floor...

   Java,Random,Thread,Math,Type     2012-03-22 14:17:44

  Interaction between JavaScript and Frameset

ou want to change more than one frame at a time? OK, well here is how to do make the trick work for you! The first thing you will need is a frameset to get you started. Again, I will use a frameset with two frames. Here is the code for the frameset page: <HTML> <HEAD> <TITLE>Frames Example 5</TITLE> </HEAD> <FRAMESET cols=\"20%,80%\"> <FRAME SRC=\"page1.htm\" name=\"left_frame\"> <FRAME SRC=\"page2.htm\" name=\"right_frame\"> </FRAMESET> <...

   interaction,javascript,html,frameset,fra     2011-03-22 12:50:47