Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- HTML Email



  40+ Techniques to enhance your php code

1. Do not use relative paths , instead define a ROOT path Its quite common to see such lines : 1require_once('../../lib/some_class.php'); This approach has many drawbacks : It first searches for directories specified in the include paths of php , then looks from the current directory. So many directories are checked. When a script is included by another script in a different directory , its base directory changes to that of the including script. Another issue , is that when a script is being ru...

   PHP,Quirk,Trick,Efficiency,Techniques     2012-04-10 13:06:55

  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10

  Say good bye to netbook

Asus and Acer are the last two manufacturers of netbooks, but these two companies announced that they would not manufacture netbooks starting from January 1, 2013. Prior to them, Samsung, Hewlett-Packard and Dell stopped production of the netbooks. This means that the life cycle of netbook officially ended.Back to 2009, the U.S. market research firm ABI Research was very optimistic about netbook's future, they said netbook would open a new era for PC market and predicted netbook shipments would ...

   Netbook,Tablet PC, Comparison     2013-01-02 11:53:33

  Facebook open sources its C++ library named Folly

Recently, Facebook open sourced its low level C++ function library for its internal use named Folly. Folly is an open sourced C++11 component library, it provides functions similar to what boost and std libraries provide, including string, vector and memory allocation, bit operation etc, to fulfill large scale high performance requirements.Currently Folly is tested with gcc4.6 on some 64 bit systems such as Fedora 17, Ubuntu 12.04 and Debian wheezy, it may also be OK on other 64 bit platforms wi...

   Facebook,Folly,C++,open source     2012-06-05 08:31:12

  Useful functions to provide secure PHP application

Security is a very important aspect of programming. There are many functions or modules in any kind of real programming language providing security functionalities  In modern websites, we may often get inputs form users all around the world.There is a famous saying which says that never trust user input. So in web programming languages, we will often see functions which will guarantee the security of the data input from users. Today we will cover some of these functions in the most famous o...

   PHP,security,SQL Injection,XSS,AJAX     2014-10-30 04:21:59

  Pandora's killer--iTunes Radio

As expected, this year's WWDC may make many people happy, but also doomed to make many start-up companies sleepless. iTunes Radio is such a product creates insomnia. In WWDC, iTunes Radio was released on schedule and it becomes Apple's new music service. iTunes Radio is a music stream service which can learn your taste, it can recommend your music based on what you heard and you're listening to. From the conference we can see this new service can access the entire iTunes catalog, i.e, there wil...

   iTunes Radio,iRadio,Apple     2013-06-10 23:19:23

  List of Web Safe Fonts

Here is the list of websafe fonts that I use in my own personal web development. Websafe (or "web safe", "safe for the web") fonts are supposedly fonts that are common among all versions of Windows, Mac, Linux, etc. Fonts that you expect everyone viewing your webpage to have. Please contact me if you know of any other web-safe fonts that should be added to this list. These font names are in typical font-family CSS format, in other words (first choice font), (second choice fon...

   Web,Font,Safe font,Font list,CSS,Font fa     2011-10-01 04:48:03

  Microsoft is attacking iPad again

Microsoft recently released a new advertisement on YouTube which attacked iPad. It aimed to show that iPad had a poorer performance in the classroom than Windows Tablet.Steve Jobs once said that iPad could liberate student's shoulder, students no longer need to carry their heavy school bags to the class. But from Microsoft's perspective, although iPad is lighter than student's school bag, the problem is that its performance in the classroom is not so satisfying. In Microsoft's advertisement, af...

   Windows 8,iPad,Advertisement     2013-08-20 05:14:29

  How to commit code to OpenStack

If you want to make contributions to OpenStack, the best way to start is to help the community with blueprint or submit bug fix. To commit codes, you need to conform to some rules in the community. Work flow Register an OpenID Apply for a CLA certificate Apply for company CLA certificate Update contributor list Join OpenStack Contributors group and OpenStack group Set up SSH Keys Get a blueprint/bug git clone codes to local disk. Configure user name and user email and openid Modify codes in a l...

   OpenStack,Contribution     2013-08-04 23:04:45

  Java SynchronizedList and Iterator

While reading some material about concurrency, I come up with some writing about using SynchronizedList wrap about normal List to enable synchronization.   But one interesting thing is http://docs.oracle.com/javase/7/docs/api/java/util/Collections.html#synchronizedList%28java.util.List%29   It says     It is imperative that the user manually synchronize on the returned list when iterating over it:     1   List list = Collections.synchronizedList(new A...

       2015-12-03 03:04:08