SEARCH KEYWORD -- Download
A list of English abbreviations
When we read emails or short message on our phone, we will often see some words such as FYI or LOL etc. Do you know their meanings, right? But some of the abbreviations we may not know or cannot remember clearly. Here is a list of English abbreviations which may be useful to you in the future when you want to check them. Numbers: &n"sp; 2 = to/too   2B or not 2B = To be or not to be   4 = for   ...
Abbreviation,English,Summary 2012-07-05 23:41:06
6 Most Effective Methods to Code HTML and CSS
IntroductionJust few weeks ago, I have resigned as a "full on" web developer (frontend, backend, server admin and misc) and moved on to become a pure frontend developer (yay)! It is a really exciting change, as you might know frontend developer role didn't exist few years ago. Thanks to the introduction of HTML5, CSS3 and Javascript framework, frontend development has to be separated from backend due to its complexity, and I think I'm trained to fit in that gap nicely.For many years, I've equipp...
Preparing for the real costs of cloud computing
Computerworld - At a cloud computing conference in New York in June, a number of speakers pointed out that the cloud is moving past the hype stage and is beginning to deliver tangible benefits to organizations. These improvements include increased flexibility and agility. But moving to the cloud can also mean added costs, some of which might be unexpected, according to IT executives whose organizations have implemented cloud services or are considering them. While these types of costs ...
Cloud computing,Cost,Chanllenges,Platfor 2011-08-23 07:48:24
Feature: The History Of Mobile Gaming
Mobile phones have come a long way since the unsightly bricks of the 1980s. The sleek handsets of today are a fraction the size of their ancestors, yet exponentially more powerful. While the implications for communication have been profound, there have been many other applications for this technology. Modern devices are capable of supporting increasingly complex software, innovative interfaces and networking capabilities, and the gaming sector has been one of the biggest benefactors of this.Much...
Game,Mobile,History,Feature, Game on mobile device 2011-10-12 11:44:30
Cracking Siri
On October 14, 2011, Apple introduced the new iPhone 4S. One of its major new features was Siri, a personal assistant application. Siri uses a natural language processing technology to interact with the user.Interestingly, Apple explained that Siri works by sending data to a remote server (that’s probably why Siri only works over 3G or WiFi). As soon as we could put our hands on the new iPhone 4S, we decided to have a sneak peek at how it really works.Today, we managed to crack ...
Siri,Cracking,Defect,Speech to text,Record,AI 2011-11-15 08:38:23
Your Code is My Hell
It occurred to me recently that my experience as a Rails developer may be somewhat unique.I often get brought in to help preexisting Ruby/Rails projects evolve and mature in a sustainable way. As a result, the vast majority of Ruby projects I’ve worked on have been well-established by the time I arrived. In fact, offhand I can only think of one commercial greenfield Ruby project I’ve participated in. All the rest have been “legacy†from my perspective, in the ...
Code style,Clean code,Code paradigm 2011-09-15 08:39:16
Good to Great Python reads
A colÂlecÂtion of python “must readsâ€:The Python yield keyÂword explainedPython’s super() conÂsidÂered super!UnderÂstandÂing Python DecoratorsWhat is a metaÂclass in Python?MetaÂclasses DemystifiedTry/Catch for valÂiÂdaÂtion or speed?Python (and Python C API): __new__ verÂsus __init__Python “self†keywordPython and the PrinÂciÂple of Least AstonishmentA CuriÂous Course on CorouÂtines and Concurr...
Python,Reference,eBook,Reading Material 2011-11-15 11:46:12
Secure Your Go Code With Vulnerability Check Tool
Security vulnerabilities exist in any language and any code, some are written by ourselves, but more are from the upstream dependencies, even the underlying Linux. We have discussed the security protection methods for Go and Kubernetes Image in Path to a Perfect Go Dockerfile and Image Vulnerability Scanning for Optimal Kubernetes Security, in which the security scanning was performed based on generic. As the Go community grows, more and more open-source packages have caused ...
GOVULNCHECK,GOSEC,GOLANG 2022-10-29 23:43:20
Android Security
Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an alternative to Apple’s iOS, is now slowly eating into the market share of Apple and is of primary concern to the company. Let’s have a brief introduction about android and then look into the security concerns and vulnerabilities that need to be focused on. Android Introduction: Android was deve...
Android security,Input validation 2013-04-16 12:19:37
10 tools to make your shell script more powerful
Many people mistakenly think that shell scripts can only be run in command line. In fact shell can also call some GUI components such as menus,alert dialogs, progress bar etc. You can control the final output, cursor position and various output effects. Here we introduce some tools which can help you create powerful, interactive and user friendly Unix/Linux shell scripts. 1. notify-send This command can let you inform the process to send a desktop notification to users. This can be used to send ...
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>