Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Figure



  Returning To Work After COVID-19: How To Ensure Your Employees Are Ready

Every aspect of our day-to-day lives has been impacted by the Internet, whether it be work or personal time. Since nations enforced strict lockdowns, employees have mostly been working remotely. Now that the world is slowly getting back on its feet after the lockdown, employers are evaluating their options and planning strategies to ensure employee safety after returning to the physical office.  With some restrictions remaining, companies must consider not just the workplace, but employees'...

   TRAINING,COVID-19,REMOTE WORK     2022-03-29 08:35:08

  From College To Silicon Valley: Tips From A Veteran

Editor’s note: Pedram Keyani has been an engineer at Facebook since 2007. He is a manager on the Site Integrity team, the inventor of Keg Presence and a Hackathon enthusiast. Looking for internships and jobs after college can be exhilarating, especially for people with engineering and other technical expertise. In an otherwise tough job market, demand for software engineers is higher than ever right now. You may find that companies are actually competing to pay you for the knowledge y...

   Career,College,Silicon valley,Transition,Experience     2012-02-20 05:34:24

  How to Become a Successful Web Designer

All web designers walk a thin line between art and business. Their job is to make a business site flourish, generate leads and revenue, yet – it has to represent the company in the best possible light. In order to achieve greatness in the world of web design, you need a lot of patience, hard work, and persistence. Most of the average designers make quite similar sites, limited in certain ways, and they choose to keep to the already tried out technique, but this can come at a cost for any ...

   WEB DESIGN,WEB DEV     2017-06-30 07:17:42

  Update & Delete Kubernetes resources in one-line command

It recently troubles me that my GKE cluster is managing more and more resources and causing difficulties in maintenance, one of which involves how to delete resources properly. Next, I will explain step by step the difficulties I encountered in my work and how I finally used the combination of bash commands and kubectl to implement the edition of Kubernetes objects through one-line command. In general The following are the basic operations that almost every Kubernetes user takes. Check ðŸ‘...

   KUBERNETES     2020-11-01 04:16:47

  How to Find User Participants To Test Your Project

Image Source: Unsplash Recruiting the right participants is important to test your projects properly, but it's essential that your research participants are able to represent your target group, or the results won't translate into something you can use. Since recruiting for specific criteria can be time-consuming, follow these considerations that should make getting these types of user participants easier.  Sharply Define Recruitment Topic Criteria There needs to be a required criteria befo...

   USER RESEARCH,USER REQUIREMENT,TESTING     2020-08-26 07:53:28

  Why do I need a debugger?

  When I begin to learn a new programming language, I will try and master the debugger for it as early as possible. For example, in 2013, while I touched the Go, there seems only gdb for use. Although gdb itself is not a good choice (From Debugging Go Code with GDB): As a consequence, although GDB can be useful in some situations, it is not a reliable debugger for Go programs, particularly heavily concurrent ones. But at that time there was no other choice. So after delve&nb...

       2017-07-21 22:53:16

  Kubernetes Authentication & Authorization 101

If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αὐθεντικÏŒς authentikos, “real, genuine”, from αὐθέντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...

   RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES     2021-06-05 23:19:18

  Hidden messages in logos

A logo is the simplest thing a user can remember about a product or a company. A good logo design will leave deep impression to customers. Each logo tries to convey either their product information or company vision to customers, this information may be easily understood with a glance or it contains some hidden messages which need us to figure out. Today we share some logos which contain some hidden messages. 1. Fedex The arrow between E and X means Fedex will deliver the product to the right p...

   Logo,Meaning     2013-10-01 07:52:05

  Don't Overload #nil?

There’s a popular post on Hacker News about writing confident code by, among other things, overloading Object#nil? and returning “null objects” instead of nil itself.DO NOT DO THIS.In Ruby, all objects (except nil itself) coerce to the boolean value true. Your object will be nil and true at the same time. Bad things will happen. Your coworkers will cry. Sad people from around the world will ask bewildering questions on your mailing list.Here’s what happen...

   Ruby,#nil,Overload,Object     2011-11-10 10:50:22

  Popular Golang JSON libraries evaluation

JSON (Javascript Object Notation), a prevailing data exchange format, is widely used in various platforms and languages. Golang, of course, will never miss the support for JSON. And with its own standard library, such as those interfaces like the REST API from the API Service in Kubernetes, it can easily process JSON. Although Go’s library works great, we can still seek those open-source JSON libs in Github to maximize our efficiency. Then the features, performance, applicability of these ...

   FASTJSON,JSON LIB,JSON LIB COMPARISON,GO-JSON     2021-12-11 23:13:23