Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Create



  The Greatest Hacks of All Time

Reader's advisory: Wired News has been unable to confirm some sources for a number of stories written by this author. If you have any information about sources cited in this article, please send an e-mail to sourceinfo[AT]wired.com. In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company. With another noi...

   Hack,Greatest,All time     2012-02-29 05:05:42

  How I Program Stuff

I love programming. I can truly say that of all the things I enjoy, I enjoy programming the most. There's nothing quite like the feeling you get when you create something. Writing code is a lot like building your own little universe. When you build stuff, you're in complete control, and, no matter how hard you fight it, your code directly reflects yourself. If you write sloppy code, I can almost guarantee you'll be a sloppy person. If you haphazardly throw code around with any ca...

   Programming,Steps,Isolate,Eliminate     2012-01-17 11:39:51

  Top 7 M-Commerce Trends to Pay Attention in 2018

Ever since eCommerce came to mobile, new technologies have been providing an advanced shopping experience to the users. Every year new concepts are introducing in the industry to improve the ways users are shopping through smartphones, tablets, and other mobile devices. Pieces of evidence advocate that more than 80% of buyers prefer using smartphones than computers to search products, compare prices and, locate stores. According to Statista, m-commerce revenue is forecasted to reach $669 b...

   MOBILE APP, APP DEVELOPMENT,MCOMMERCE,BUSINESS OWNERS     2018-03-23 07:44:11

  Some measures for improving Linux server security

The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...

   Linux server,Server security     2012-08-21 05:08:50

  6 Tips to Help You Build a Great Web Application

Web applications are a little more challenging to design than websites. Designers need to anticipate user behavior, make users’ lives easier and make the experience as visually appealing as possible. Many designers tend to do what is easier for them than think about what’s easier for the user. The following is a small list of tips that designers often overlook in the process of designing a web application.1. The Power of a Good TooltipWhen you present your web application to a...

   Web design,Mobile device,Library,Style     2011-11-25 03:02:11

  Don’t Call Yourself A Programmer, And Other Career Advice

If there was one course I could add to every engineering education, it wouldn’t involve compilers or gates or time complexity.  It would be Realities Of Your Industry 101, because we don’t teach them and this results in lots of unnecessary pain and suffering.  This post aspires to be README.txt for your career as a young engineer.  The goal is to make you happy, by filling in the gaps in your education regarding how the “real world” actually works.  ...

   Career,Programmer,Advice,Low level,Development     2011-10-29 07:09:23

  File System vs Core Data: the image cache test

Code for this project is on GitHub While doing a full re-write of Droplr's iOS app for the 2.0 launch, I couldn't find any good file/image caches out there had a particular feature I really wanted: extending item expiration whenever it's touched. I set out to write my own — which wasn't that much of a challenge — but somewhere along the process I had this crazy idea that perhaps (SQLite-backed) Core Data would be a much better tool for the job: No mismatch between cache index ...

   File system.Image cache,Multimedia     2012-02-01 08:52:02

  In College, Working Hard to Learn High School Material

In June, Desiree Smith was graduated from Murry Bergtraum High. Her grades were in the 90s, she said, and she had passed the four state Regents exams. Since enrolling last month at LaGuardia Community College in Queens, Ms. Smith, 19, has come to realize that graduating from a New York City public high school is not the same as learning. She failed all three placement tests for LaGuardia and is now taking remediation in reading, writing and math. So are Nikita Thomas, ofBedford Stuyves...

   Education,College,High school,Material,Knowledge transfer     2011-10-24 11:51:39

  I hate cut-and-paste

Me, I blame the IDE's.Coding used to be hard. Not because programming itself was overly hard, but mostly because editors absolutely sucked. How much the typical development environment in the 70's and 80's sucked is hard to convey (except for a very lucky few, and those would have likely been using DEC and WANG gear). I got in on the tail end of the punch card era. Punching your own program is lots of fun. Once. And if you drop a deck you get to play with the sorter, which is also lots of fun (o...

   IDE,Editor,Cut and paste,Shortcut,Blame     2011-10-24 11:33:46

  PHP Query String

Query string plays important role in building web applications, especially if you want to make nice urls without question mark and many key, value pairs, actually it is not so easy to design application with nice urls however it is always worth doing so, because it not only looks very proffessional, such URLs are search engine friendly, which means that they will get indexed faster but also it happens that search engines have problems with indexing pages with more then 3 key=value pairs in query...

   PHP,Query string,Request,Security     2011-10-01 02:23:15