Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Color scheme



  HTTP is not a transport protocol, HTTP is not RPC

Recently there was a question on the forums asking why we encourage usage of HttpRequestMessage<T> / HttpResponseMessage<T> in the signature of a web api implementation. The point made in the post is that if you have an ICalculator contract which your API implements, then it’s violating SOC / inappropriate to have those messages as params and in the contract. The argument is valid when looking at HTTP from the standpoint of an RPC mechanism, which is actually a quite co...

   HTTP,Transport protocol,RPC     2012-01-19 10:14:26

  Do designers need code?

So many problems in software occur because programmers and designers don't communicate well all the time. Why don't more designers learn to code themselves or have engineers build abstractions better suited to them? People's minds work in different ways, they can process thoughts differently, solve problems in completely different but equally valid ways. It's a mistake to assume everyone should possess the same skill set.  Also not everyone should be a full stack engineer although full stac...

   Design,Coding     2014-01-07 06:22:52

  Make Magento 2 Faster: Five Quick tips

In this post, you will learn from Magento development company experts about speeding up the Magento 2. We hope these tips will help you in making Magento 2 faster than before. Magento 2 is a powerful platform. Once installed and with no customization it is a fully functional store. They even give you a well-designed, responsive storefront. However as you add products and your own content things will incrementally begin to slow down. To combat that there are some things you can do to increase spe...

   MAGENTO,MAGENTO TUTORIAL,MAGENTO DEVELOPMENT     2016-07-14 00:17:45

  Tips of Drafting an R Markdown Document

When presenting the data summary and exploratory analysis, we used to copy a lot of tables, charts from Rstudio to PowerPoint, which makes the presentation preparation painful. It becomes essential for data scientists to make use of better reporting tools, such as R markdown, Jupyter notebook to prepare the analysis presentation in a more efficient and organized way. Of course, we want this to be reproducible! In this post, I would like to share some tips of using the right tools to draw tables,...

   R PROGRAMMING     2020-11-01 23:09:45

  Fastjson just fixed a bug which might cause out of memory issue

Fastjson just fixed a bug which might cause service down a few days ago. This bug is caused by some mishandling of special character \x which is an escaped character to indicate hexdecimal number. The impact of this bug would be big if the attacker constructs a malicious data which would cause the service down.  The code which causes the issue is in com.alibaba.fastjson.parser.JSONLexerBase#scanString, when a JSON string is passed in, fastjson would parse the string character by c...

   FASTJSON,ALIBABA,BUG,NEWS     2019-09-07 06:03:49

  What Happened to Software Engineering?

Over the past few years there has been an evolutionary shift in the world of software development.  Not very long ago, the dominant Software Development Life Cycle (SDLC) methodology was the Waterfall Method with very specific phases that separated the construction phase from phases like design and test. The software development industry, still very new, was striving to find a repeatable, predictable process for developing software.  The best model for this seemed to be the physical sc...

   Software engineering,Software,Developmen     2011-09-07 10:42:34

  3 Most Popular Ways Hackers Steal Your Phone Data – Stay Safe

Our mobile devices store personal information, including passwords, usernames, birthdates, financial information, social security numbers, PIN, etc. Hence, this makes hacking a mobile phone an attractive option for hackers and scammers. There are various techniques that hackers use to spy on a mobile phone for personal information. Also, stalkers can make use of spy apps and malicious software to spy on unsuspecting people. Mobile phones are not secure because these devices connect to other net...

   TECH     2019-11-29 00:29:40

  Difference between localhost and 127.0.0.1

Lots of people would think what the address 127.0.0.1 is when first seeing this address. In fact, 127.0.0.1 is a loopback address which refers to the local machine. It is generally used for local testing. When typing ping 127.0.0.1 on local command console, it will send network packets to local IP/TCP layer to test whether IP/TCP works properly or not.  To those who are used to use localhost, it is actually mapped to 127.0.0.1 by default. There are hosts files in the system which store this...

   LINUX,NETWORK,LOCALHOST,127.0.0.1,LOCALHOST VS 127.0.0.1     2018-09-29 22:11:12

  10 Questions with Facebook Research Engineer – Andrei Alexandrescu

Today we caught up with Andrei Alexandrescu for a “10 Question” interview. He is a Romanian born research engineer at Facebook living in the US, you can contact him on his website erdani.com or @incomputable. We will talk about some of the juicy stuff that going on at Facebook, so let’s get started. Hello Andrei, welcome on Server-Side Magazine. 1. Tell us a little bit about yourself. Who are you? Where and what do you work? Who am I? Ah, the coffee breath of one talki...

   C++,Facebook,PHP,Future,Machine learning     2012-02-06 08:08:12

  About tmpfs

tmpfs is another confusing name in Linux kernel, its implementation is in mm/shmem.c, shmem has no relation to tmpfs at first glance although we know tmpfs is based on memory. We can understand why we use this name by seeing where this is used. In a desktop Linux system, tmpfs is loaded usually: % grep tmpfs /proc/mountsdevtmpfs /dev devtmpfs rw,seclabel,nosuid,relatime,size=1958956k,nr_inodes=489739,mode=755 0 0tmpfs /dev/shm tmpfs rw,seclabel,nosuid,nodev,relatime 0 0tmpfs /run tmpfs rw,seclab...

   tmpfs,Linux,file system     2013-06-14 12:10:56