Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- CONTENT SECURITY POLICY



  10 HTML5 Demos to Make You Forget About Flash

You’ve probably been hearing a lot lately about how Flash is a dying technology and how it’ll soon be replaced by HTML5. Personally, I think that it will slowly replace Flash for some things, but Flash will always have a place, especially for developing complex games and rich internet applications. If you’ve yet to see what HTML5 can do, I’ve rounded up 10 demos that show off some of its capabilities. So what do you think – will HTML5 replace Flash? Canvas ...

   HTML5,CSS,Next web,Flash     2011-07-01 10:13:19

  Mobile devices are facing new threats

More and more companies allow employees to use smartphones and tablet PCs in workplace, but they are facing a new potential threat - malware embedded in games and applications.Dan Hoffman, network security company Juniper Networks mobile security director, said the application store is quickly becoming the main delivery mechanism of infected applications. Consumers purchase applications for their equipments through an online application store.As the consumers are free to download applicatio...

   Mobile device,Data security,Malicious software     2012-04-05 13:00:57

  String intern in Java

In Java, == is used to compare whether two objects have the same memory location, equals() is usually used to compare whether two objects have the same time and the same state.  When comparing two strings, normally we just want to know whether they have same content, so we can choose equals(). But since String comparison is so frequently needed, Java has worked on the String class to make == workable when comparing two String literals. The String class maintains a pool of emp...

   JAVA,STRING     2016-04-10 03:35:25

  What is Deep Web- all you need to know about it?

Deep web is the most nefarious out of sight underground area that exists and not accessible to the public domain. The deep web sites cannot be accessed through standard search engines. Many experts believe to have compared this part of the internet hidden from paywalls and forms. The truth is that deep web is a hidden iceberg while the usual internet available to the public domain is just the tip of the iceberg. That part of what is available from search engines such as Bing or Google ...

   DEEP WEB,DARK WEB     2018-07-05 08:26:58

  Essential skills any web developer should have

As a web developer, besides writing HTML code, there is much more to do before the site can go live. You may consider about user experience, device compatibility, security etc. To be a good web developer, you should acquire some essential skills for web development. Below we list some of them. Some of them you may be familiar with a long time ago, but definitely some of them you may not be so familiar with or even never hear about before. Interface and User Experience Be aware that browsers imp...

   Web development,User experience     2014-03-21 06:44:49

  Beauty of code : How to write graceful PHP code

Writing good code is an art. In order to achieve this, it is necessary to develop good programming habits at the beginning. Good programming habits not only contributes to the early project design (modular),but also allows you to the code easier to understand, so that the maintenance of the code is easier. Bad programming habits will result in more code bugs, and will make future maintenance work difficult. We introduce some good programming habits taking PHP as example. Hope this will help you....

   PHP,Good code     2012-08-26 12:23:03

  Are You a Good Programmer?

If someone asks you to recommend a good programmer, who comes to mind? Do you consider yourself a good programmer? What criteria do you use to judge? In thinking about this, I realized that there are different ways that a programmer can be good. So I present to you The Four Kinds of Good Programmers. And in celebration of Whyday, I include quirky Why-styled illustrations* for your viewing pleasure! The Philosopher The PhilosopherThe philosopher loves to write well-defined, well-structured...

   Programmer,Inventor,Philosopher,Conquero     2011-08-23 07:56:26

  Are NSA engineers better than engieers at Microsoft?

NSA is the US government department which takes care of the information and data security of US. It's said to be one of the largest of U.S. intelligence organizations in terms of personnel and budget. There are many excellent engineers working on information and data security and developing algorithms and software help US government to collect intelligence information from all around the world. Many people may be curious about whether NSA has better engineers than IT companies like Microsoft and...

   NSA,Microsoft     2014-01-09 07:24:43

  FUCK PASSWORDS

I'm so tired of passwords. So, so, so tired. Most people don't understand this. Most people use the same password everywhere. Most people can just mechanically type out password3 in every password box, smirking to themselves at how clever they are, because who would ever guess 3 instead of 1? I don't do that. Let me tell you what i do. I generate a different password for every service, based on a convoluted master password and the name of the thing. I do this because it's what you're...

   Security,Password,Random generation,Hard to remember     2011-12-05 11:32:45

  20 Database Design Best Practices

Use well defined and consistent names for tables and columns (e.g. School, StudentCourse, CourseID ...).Use singular for table names (i.e. use StudentCourse instead of StudentCourses). Table represents a collection of entities, there is no need for plural names.Don’t use spaces for table names. Otherwise you will have to use ‘{‘, ‘[‘, ‘“’ etc. characters to define tables (i.e. for accesing table Student Course you'll write “Student Cour...

   Database design,20 tips,Well defined name,Design pattern     2012-02-07 12:10:48