SEARCH KEYWORD -- DD Image
Java’s toLowerCase() has got a surprise for you!
Have you ever encountered a surprise while using toLowerCase()? This is a widely used method when it comes to strings and case conversion. There is a nice little thing you should be aware of. toLowerCase() respects internationalization (i18n). It performs the case conversion with respect to your Locale. When you call toLowerCase(), internally toLowerCase(Locale.getDefault()) is getting called. It is locale sensitive and you should not write a logic around it interpreting loca...
Java,toLowerCaser(),Locale specific,Stra 2011-09-29 11:21:07
Using an Image Submit Button within an HTML Web Page Form
If you're using an HTML form on your web site and would like to use an image submit button instead of the boring standard submit button, this HTML code is for you.In order for your form's input box and your image submit button to line up properly, you will need to place it within an HTML table. In addition, unless your image has a transparent background, you will need to set the table background color to the same color as the image background so that it will seamlessly b...
Submit button,Image,Html 2011-10-02 12:17:01
Can we believe our eyes?
Several days ago, one of our customers submitted a sample (SHA1: fbe71968d4c5399c2906b56d9feadf19a35beb97, detected as TrojanDropper:Win32/Vundo.L). This trojan hijacks the hosts “vk.com†and “vkontakte.ru†(both social networking sites in Russia)and redirects them to 92.38.209.252, but achieves this in an unusual way. A common method used to hijack a website and redirect it to a site of the attacker’s choice is to add an entry in the Windows hosts f...
The Failure of Passive Recruiting: Recruiters
This is an actual conversation I had with a recruiter:Phone rings and I pick it upHim: Hi, is Paul there?Aaron: May I ask who is calling?Him: I have a technical question. Aaron: Ok, what is it?Him: Are you technical?Aaron: Yes. Who is this?Him: Who are you?Aaron: Are you a recruiter?Him: Yes and…Aaron: Great, send us your resumes, if we like what you send over, we’ll let you know if we want to meet with the candidates, other tha...
Recruiter,HR,Recruitment,Failure,Hire 2011-10-26 06:59:33
How to Convert Images on Mac Finder
If you have a lot of images in different formats and you want to convert them to a common format, you can use the Mac Finder to do it easily and quickly. Here are the steps to follow: 1. Open the Finder and navigate to the folder where your images are stored. 2. Select the images that you want to convert. You can use the Shift key or the Command key to select multiple images at once. 3. Right-click on the selected images and choose Services > Preview from the context menu. This will open the ...
MACOS,FINDER,IMAGE CONVERSION 2023-04-16 02:09:54
People, processes and tools
Some years ago, one of my managers used to repeat this "Accenture truism" (or so he designated it): to fix or improve something, first you need the right people, then you need the right processes to help those people work together, then finally you need the right tools to support those processes. People, processes, and tools - in that order.This is even more true for tech startups than for corporations. As geeks, whenever we face a problem, we often start by looking for a tool to fix it. "Our te...
Work,People,Process,Tool,Importance,Priority 2011-10-24 11:36:14
Here Are The 10 Highest-Paying Jobs At Google
South African job listing site JobVine compiled the following chart of the top ten salaries at Google, compiled from Glassdoor.The top pay is for contract positions leading software development. It's not uncommon to see contractors earn more salary than full-time employees at big tech companies, because they're often not able to get stock options and perks.For jobs within the company, it looks like directors of product management are the highest paid, which is fitting with Google's new...
Google,Salary,Statistics,Job,Salary level 2011-10-14 11:24:42
Why isn't all internet traffic encrypted?
The biggest problem is that you must be able to verify that you're encrypting to the correct key. Without it, encryption would be practically useless, as anyone could perform a man-in-the-middle attack on the connection and remain undetected.In typical SSL/TLS, as well as other protocols using X.509, this verification is performed by "certification authorities", which are explicitly marked as "trusted" by web browsers and operating systems. Unfortunately, these CAs usual...
Internet,Traffic,Encryption,Decryption,Security 2011-10-15 15:03:37
Functional Programming For Object Oriented Programmers
After recently remarking about how I finally "got" functional programming I was asked by one of my millions of twitter followers... ¬_¬ to write up an explanation of a small F# program spoken in terms that fellow O-O programmers would understand. Before I become too entrenched into the functional programming way of thinking, that is, and can't explain it anymore. As a former tutor this is one of the major problems with being able to teach something once you understand it. You've ...
Functional programming,OOP,F#,Pattern 2011-11-25 13:49:16
Why Flash didn’t work out on mobile devices
The debate over whether supporting the Adobe Flash plug-in on mobile devices is a feature or not is over. Last night, ZDNet got hold of a leaked Adobe announcement: It’s abandoning its work on Flash for mobile. It’s not a huge surprise that it came to this, since Adobe had been struggling to optimize the performance, and the tide has been turning toward HTML5.From the Adobe announcement ZDNet published:Our future work with Flash on mobile devices will be focused on enabling Fl...
Flash,HTML5,Advantage,Merit,Mobile device,Support 2011-11-15 03:15:12
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>