Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- HADOOP ARCHITECTURE AND DESIGN



  Native Audio with HTML5

Once upon a time, audio on the web lived primarily in the world of third-party browser plug-ins like Flash, QuickTime and Silverlight. This was not a bad world, but it had its issues.For one, most plug-ins require the user to install them, but not all users are willing (or able) to install them. Also, many players built with these plug-ins are inaccessible, making it difficult for folks who use assistive technologies to access the audio or alternative content.Then there are the front-end design ...

   Audio,HTML5,Built in,Audio tag,Video     2011-10-13 13:04:07

  JavaScript Attack/Defend

As developers and designers we work hard to build visually attractive, fast and easy to maintain applications. Our goals are to make sure the applications we build stick to users and keep them coming back for more. Security is not always at the forefront of our minds. No one intentionally builds insecure software but often a lack of security knowledge leads developers to build vulnerabilities into their applications. In this article we are going to examine two web security attacks, how they are ...

   JavaScript,Attack,Defend,Security,Cross site     2011-10-13 13:09:11

  The Great Tech War Of 2012

From left: The late Apple cofounder Steve Jobs, Facebook CEO Mark Zuckerberg, Google CEO Larry Page, and Amazon CEO Jeff Bezos. | Photos courtesy of David Paul Morris/Getty Images (Jobs); Justin Sullivan/Getty Images (Zuckerberg); Chip East/Reuters (Page); Mario Tama/Getty Images (Bezos).Gilbert Wong, the mayor of Cupertino, California, calls his city council to order. "As you know, Cupertino is very famous for Apple Computer, and we're very honored to have Mr. Steve Jobs come here tonight ...

   2012,Tech war,Facebook,Apple,Google,Amazon,Tablet,Cloud,Analysis     2011-10-17 11:06:25

  FTP Must Die

The File Transfer Protocol (FTP) is specified in RFC 959, published in October 1985. The attempt in this specification is to satisfy the diverse needs of users of maxi-hosts, mini-hosts, personal workstations, and TACs, with a simple, and easily implemented protocol design.That's from the introduction. Does anyone here know what a TAC is? I don't. I had to look it up, since the acronym wasn't even expanded in the RFC. It took three tries in Google, and I finally found it in some obscur...

   FTP,Future,Death,Trend,Protocol     2012-02-06 08:13:36

  HTML5 and Accessibility

Accessibility for people with disabilities is a legal responsibility in many countries. It's also the right thing to do, and one of the characteristics distinguishing professional developers from the WWWs: WYSIWYG-wielding wannabes. But for many, accessibility has been a somewhat black art, requiring adding extra stuff to your code like alt text, table summaries, ARIA information that can be difficult to test by developers who are not assistive technology users themselves.The arrival of HTML5 ha...

   HTML5,Accessibility,Video,Music,Canvas     2011-08-19 08:13:44

  Erlang Style Concurrency

Introduction On an evolutionary scale of innovation from one to ten (one being Bloomberg and Citi Group, eight being Google and Cirque Du Soleil, and ten being the company you couldn't imagine in your wildest dreams), the company I work for is about a three1. Being employed by this bastion of ingenuity affords me certain opportunities I can't get elsewhere. For example, every developer gets to interview potential...

   Erlang,Concurrency,Lock,Message,Innovation     2012-01-03 10:44:44

  The 10 Greatest Hacks of My Life

My co-founder and I briefly considered applying to YCombinator for the Winter 2012 session. We eventually decided to bootstrap Curvio initially, and raise a seed round on our own after we launch (so far so good!). But looking over the YC application, one question intrigued me:Please tell us about the time you, tansey, most successfully hacked some (non-computer) system to your advantage.Now, there are a lot of ways to interpret this. A mechanical interpretation would be about...

   Hack,Most important,Example,Curvio     2011-10-22 12:47:42

  Top 25 Must Have Wordpress Plugins for 2016

There are nearby 30 thousand WordPress plug-ins available in the market. But you must know the plug-ins, that are worthy for you according to your business & requirements. Here is the list of top 25 WordPress plug-ins according to me & my team that may helpful for you.   1. WordPress SEO by Yoast - Best SEO plugin:   Yoast SEO, previously known as a WordPress SEO by Yoast, specially used to boost search engine traffic on your WordPress website. Just install this plug-in and be...

   WORDPRESS PLUGIN DEVELOPMENT,MUST HAVE WORDPRESS PLUGINS,BEST WORDPRESS PLUGINS FOR WEBSITE,WORDPRES     2016-03-10 05:04:26

  Learning Server-Side JavaScript with Node.js

Node.js is all the buzz at the moment, and makes creating high performance, real-time web applications easy. It allows JavaScript to be used end to end, both on the server and on the client. This tutorial will walk you through the installation of Node and your first “Hello World” program, to building a scalable streaming Twitter server.What is Node.js?JavaScript has traditionally only run in the web browser, but recently there has been considerable interest in bringing it to the...

   JavaScript,Server side,Node.js.Implement     2011-09-20 13:33:15

  Why Emacs?

PreludeIf you are a professional writer – i.e., if someone else is getting paid to worry about how your words are formatted and printed – Emacs outshines all other editing software in approximately the same way that the noonday sun does the stars. It is not just bigger and brighter; it simply makes everything else vanish.Neal StephensonIn the Beginning … Was the Command LineI’m an Emacs user and I’m proud of the fact. I know my reasons for using it (and loving i...

   Emacs,Linux,IDE,Editor,Usage     2011-11-21 10:22:05