Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Client side



  There are no free lunches on the internet

Hot data: An IT technician checks the network servers at a data farm. Alamy Photograph: Juice Images/AlamyPhysics has Newton's first law ("Every body persists in its state of being at rest or of moving uniformly straight forward, except insofar as it is compelled to change its state by force impressed"). The equivalent forinternet services is simpler, though just as general in its applicability: it says that there is no such thing as a free lunch.The strange thing is that most use...

   Free lunch,Facebook,Google,Privacy information     2011-11-21 03:03:31

  Ten things I want Siri to be able to do for me

Now that I've had my iPhone 4S for a couple of days, I'm amazed with what Siri can do. I've asked a number of questions -- real ones, not questions like "What is the meaning of life?" -- and have been totally impressed with how my interaction with the iPhone has changed. But there are more things I'd love to be able to do with Siri, which is the reason for this post.Everyone should understand that Siri is currently a beta product from Apple. A lot of the things I'm talking about here should happ...

   Siri,iPhone 4S,AI,Tweet,Four square,Intelligent agent     2011-10-17 11:24:37

  How much money do you *really* need to start your company?

I keep hearing startup entrepreneurs tell me “We need funding. If we just had $XXXk of investment, we’d be killing it right now.” I press them with one question: what would you do with the money if you had it? Inevitably the question is met with a blank stare. Most of the time people haven’t thought about it. The answers that do come feel a little half-baked:“Buy a bunch of ad words to get people to our site – that’s all we need”“Build th...

   Business,Startup,Investment,Money,Ad     2011-09-26 11:16:35

  Device Experiences & Responsive Design

Most recently LukeW was the Chief Product Officer (CPO) and co-founder of Bagcheck which was acquired by Twitter Inc. in 2011. Luke is also the author of the book Mobile First and was Chief Design Architect (VP) at Yahoo! Inc. While the task of designing Web applications and sites for multiple devices can be daunting, two techniques can make the process more manageable: classifying device experiences and designing/building responsively. Here’s how these two approaches can work toge...

   User experience,Device,Responsive design     2012-03-31 00:10:31

  The Number One Trait of a Great Developer

Maybe the best programmers aren’t those who spectacularly solve crazy problems, but those who don’t create them, which is much more silent. – Lena HerrmannWhen I look around at other companies hiring Ruby on Rails developers, I see them focusing on three major traits: Super-smart; Large community following; Deep Ruby knowledge. They’re all wrong. While these are great aspects in moderation, they all miss the number one quality of a fantastic developer: Judge...

   Developer,Trait,Judgement,No. 1     2011-11-05 06:49:19

  Five Reasons Why Microsoft's Windows Phone Will Make A Big Splash In The Smartphone Market

The rave reviews for the latest iteration of Microsoft’s Windows Phone aren’t the only reason Microsoft will do better in the smart phone industry than it did in the MP3 player market. Whereas the Zune never really offered anything substantially different from the iPod and never pushed any real boundaries, Microsoft’s latest push into the mobile operating system business is much more bold. Microsoft isn’t rushing it this time – and it shows. So far, tech ...

   WP7,Windows Phone,Zune,2012,Nokia Lumia 900     2012-01-09 08:52:52

  PHP Security

1. IntroductionWriting PHP applications is pretty easy. Most people grasp the syntax rather quickly and will within short time be able to produce a script that works using tutorials, references, books, and help forum forums like the one we have here at PHP Freaks. The problem is that most people forget one of the most important aspects that one must consider when writing PHP applications. Many beginners forget the security aspect of PHP. Generally, your users are nice people, they will...

   PHP,Security,SQL Injection,XSS Cross sit     2011-10-01 02:25:31

  When a CA becomes untrustable

Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...

   APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN     2016-10-01 23:03:44

  In-memory key-value store in C, Go and Python

Subtitle: Wow Go’s net library is fast On paternity leave for my second child, I found myself writing an in-memory hashmap (a poor-man’s memcached), in Go, Python and C. I was wondering how hard it would be to replace memcached, if we wanted to do something unusual with our key-value store. I also wanted to compare the languages, and, well, I get bored easily! The code is on github as Key-Value-Polyglot. Each version implements enough of the get and set commands from the mem...

   key-value,Memory,C,Python,Go     2012-03-21 09:21:51

  Top 10 PHP Best Security Practices for Sys Admins

PHP is widely used for various of web development. However, misconfigured server-side scripting would create all sorts of problem. And here are php security best practices that you should aware when configuring PHP securely. Nowadays most of the web servers are operated under Linux environment (like: Ubuntu, Debian...etc). Hence, in the following article, I am going to use list top 10 ways to enhance PHP Security Best Practices under Linux environment. My sample setup for PHP Security Tips: D...

   PHP,code security,System admin,Advice,Best practice     2012-02-01 00:04:37