Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Full disk encryption



  Communicating Between Widgets in a Rich Internet Application

As a part of our October Free Dojo Support initiative, we received the following question from Manu Subramanian about how to manage communication between distinct components in a rich internet application: We are building an application with dojo. It does have many inter connected interface parts. For example it does have a top bar with drop down buttons. The menu items opens tabs in a tab controller. In general we need to call functions from different widgets or there are many interconne...

   Internet application,Rick internet,Widget,comminucation     2012-03-16 10:49:36

  The Greatest Hacks of All Time

Reader's advisory: Wired News has been unable to confirm some sources for a number of stories written by this author. If you have any information about sources cited in this article, please send an e-mail to sourceinfo[AT]wired.com. In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company. With another noi...

   Hack,Greatest,All time     2012-02-29 05:05:42

  Twenty Years of Linux according to Linus Torvalds

Summary: In an interview, Linus Torvalds talks about Linux’s multiple 20th birthdays and life with Linux.The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux, started the celebration of Linux’s 20th anniversary at the Linux Foundation Collaboration Summit, but when is Linux’s real birthday? Is it August 25th, when Linus announced the project? October 5th 1991, when 0.02, the first public release was made? I decided to go st...

   Linux,Linus Tonalds,Interview,Developmen     2011-09-28 09:39:10

  Asus ZenBook 3 vs MacBook: Has Apple Met Its Match?

With its upcoming ZenBook 3, Asus is the latest company to compete with Apple's superthin 12-inch MacBook. Due out later this year, the 12.5-inch laptop is even slimmer than the MacBook and one-ups Apple's offering with a faster CPU and a range of fashion colors. Though we haven't been able to test the ZenBook 3 in our labs yet, we've studied the specs and spent some hands-on time with the slim system to learn about its capabilities. So based on what we know today, which superslim not...

   ZENBOOK 3,PREMIUM LAPTOP,MODEL WITH 8GB,ASUS     2016-06-07 01:15:56

  CSS Rounded Corners In All Browsers (With No Images)

In the past two years, increased browser support has transformed CSS3 from a fringe activity for Safari geeks to a viable option for enterprise level websites. While cross-browser support is often too weak for CSS3 to hold up a site’s main design, front-end developers commonly look to CSS3 solutions for progressive enhancement in their sites. For instance, a developer might add a drop-shadow in Firefox, Safari and Chrome using -moz-box-shadow and -webkit-box-shadow, and the...

   CSS,Rounded corner,No image,IE,Chrome,Fi     2011-06-30 22:50:34

  If You’re Busy, You’re Doing Something Wrong: The Surprisingly Relaxed Lives of Elite Achievers

The Berlin StudyIn the early 1990s, a trio of psychologists descended on the Universität der Künste, a historic arts academy in the heart of West Berlin. They came to study the violinists.As described in their subsequent publication in Psychological Review, the researchers asked the academy’s music professors to help them identify a set of stand out violin players — the students who the professors believed would go onto careers as professional performers.Weâ...

   Relax,Elite,Achievement,Work life balance     2011-11-11 02:37:03

  10 Web Design Elements that You Shouldn’t Overlook

When it comes to designing and building websites, it never seems to happen fast enough.Given this fast pace, many small details that are eventually required to build the website are often left out of the design process. While these details might be minor, they are what take a website from nice to truly awesome.These details are often easy to miss because they don’t drive the overall look and feel of the website. The problem is that as your development team works through the design, it wil...

   Web design,Verification,jQuery     2011-03-30 00:09:49

  Understanding PHP's internal function definitions

Welcome to the second part of the “PHP’s Source Code For PHP Developers” series. In the previous part ircmaxell explained where you can find the PHP source code and how it is basically structured and also gave a small introduction to C (as that’s the language PHP is written in). If you missed that post, you probably should read it before starting with this one. What we’ll cover in this article is locating the definitions of internal functions in t...

   PHP,internal function,definition,rationale     2012-03-16 10:46:26

  In College, Working Hard to Learn High School Material

In June, Desiree Smith was graduated from Murry Bergtraum High. Her grades were in the 90s, she said, and she had passed the four state Regents exams. Since enrolling last month at LaGuardia Community College in Queens, Ms. Smith, 19, has come to realize that graduating from a New York City public high school is not the same as learning. She failed all three placement tests for LaGuardia and is now taking remediation in reading, writing and math. So are Nikita Thomas, ofBedford Stuyves...

   Education,College,High school,Material,Knowledge transfer     2011-10-24 11:51:39

  Tricks with Direct Memory Access in Java

Java was initially designed as a safe managed environment. Nevertheless, Java HotSpot VM contains a “backdoor” that provides a number of low-level operations to manipulate memory and threads directly. This backdoor – sun.misc.Unsafe â€“ is widely used by JDK itself in packages like java.nio or java.util.concurrent. It is hard to imagine a Java developer that uses this backdoor in any regular development because this API is extremely dangerous...

   Java,Directly memory access,Tricks,JVM     2012-02-13 05:31:19