Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Common knowledge



  Top 8 website operation laws

As a website operator, in addition to have some necessary professional knowledge to master a website, such as prototype planning, interaction design, SEO, as well as basic html code, you should also know more about some of the theories which are good for site operations to ensure that the site can be long-term, stable. 1. Law of 250 Girard thinks every person knows at least 250 people. If you win the goodwill of a customer, it means you win the goodwill of 250 individuals; Conversely, if you off...

   Website management,Rules     2012-09-13 20:55:50

  A New Experimental Feature: scoped stylesheets

Chromium recently implemented a new feature from HTML5: scoped stylesheets, aka. <style scoped>. A web author can limit style rules to only apply to a part of a page by setting the ‘scoped’ attribute on a <style> element that is the direct child of the root element of the subtree you want the styles to be applied to. This limits the styles to affect just the element that is the parent of the <style> element and all of its descendants. Example Here’s a...

   HTML5,Style,Draw,Use case     2012-03-23 12:11:47

  XML Abuse

It’s everywhere. XML Abuse. From Domain Specific Languages to Data Serialization, XML is the most commonly abused data format I’ve ever encountered. XML is perfectly fine for (because it was designed for this): First of all: XML was designed to be written by humans and read by humans. Nearly all generated XML I’ve seen sucks badly. I think this is because XML cannot efficiently represent common data structures found in programming languages.XML is good...

   XML,Abuse,Alternative,Serialization,Data storage     2011-12-14 07:12:10

  bcrypt: Safeguarding Passwords with Strong Hashing and Adaptive Security

Introduction In today's digital world, passwords play a crucial role in protecting personal privacy and information security. Passwords are the most commonly used means of authentication because they are simple yet effective. Password security is the cornerstone of cybersecurity and plays a fundamental role in safeguarding the information security of individuals and organizations. However, with the increasing frequency and complexity of cyberattacks, traditional password hashing algorithms like ...

   BCRYPT,SECURITY     2023-11-15 08:14:35

  GitHub Copilot may generate code containing GPL code

GitHub Copilot is a new AI-powered code completion tool that can generate code snippets from natural language descriptions. It is powered by OpenAI Codex, a deep learning system that has been trained on billions of lines of public code. GitHub Copilot claims to be a “copilot, not a pilot”, meaning that it is not intended to write code for you, but rather to help you write code faster and better. However, some developers have raised concerns about the legal and ethical implications of...

   GITHUB COPILOT,GPL     2023-04-21 14:21:29

  5 good anti SOPA designs

The Stop Online Piracy Act (SOPA) is a United States bill to expand the ability of U.S. law enforcement to combat online copyright infringement and online trafficking in counterfeit goods. Its goal is to protect the intellectual-property market and corresponding industry, jobs and revenue. However since its proposal, many organizations protest against it as they believed it would threaten free speech and innovation, and enable law enforcement to block access to entire internet domains due t...

   SOPA,PIPA,design     2013-12-24 03:26:31

  Oval engagement rings from MoonOcean: Elegance of form and individual approach

Welcome to the enchanting world of MoonOcean, a premier destination for unparalleled elegance in the heart of London's vibrant jewellery scene. Immerse yourself in our exclusive collection, where the spotlight is on the captivating allure of oval engagement rings, embodying both exquisite craftsmanship and a commitment to individuality. Nestled in the heart of London, MoonOcean stands as an emblem of sophistication, redefining the jewellery experience. Our curated array of oval engagement rings ...

   ENGAGEMENT RING,MOONOCEAN     2024-03-18 07:56:20

  Microsoft’s “Picture Password”: A Breath Of Fresh Air On The Lock Screen, Of All Places

Remember that feeling you got back when Steve Jobs was unveiling the iPhone, and he did the “slide to unlock” gesture for the first time? I remember the way he said it – “You like that? Want to see it again?” Since then I haven’t seen a lock screen interface that has made me feel that same “how obvious, how elegant!” feeling – until today at the NVIDIA press conference, and later at the Microsoft keynote here at CES. It sounds a little silly...

   Microsoft,Windows 8,Picture Password,CES     2012-01-10 06:55:28

  Learn these technical skills within one day

It takes days and days reading books, practicing and involving in real project if you want to learn a programming language well. It's just like a marathon, you will get more if you can insist longer. During this long and boring period, there are always something you can learn within a short period of time, like within one day. These skills can bring your big satisfaction. Below are a list of technical skills which you can pick up within one single day, they are advocated by Jacob Jensen, a Googl...

   Technical skill     2014-06-12 09:33:15

  4 Things Every Great Online Teacher Knows

Virtual classrooms have become the new norm for education during the pandemic. Teachers from every school have to adjust to this new reality to ensure students keep learning even in the absence of a physical classroom setup.  Thankfully, there are various digital solutions to help teachers conduct online classes without much hassle. One such tool that has revolutionized the online learning market is a Learning Management System (LMS). For schools, the in-house learning management department...

   EDUCATION,ELEARNING,ILEARNING     2021-02-12 03:23:43