Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- High level



  Small team? Fix your life with a non-virtual assistant

Like many others, I tried “outsourcing my life” using a digital assistant. A year and a thousand bucks later, I’ve received one department store recommendation and an admittedly adequate spreadsheet of competitive research.I have since cancelled. Why didn’t it work for me?I think I just didn’t trust it/them/him/her (that I even have this ambiguity is indicative of the issues).Most of my mindless time-sinks involve at least a credit card number and are often a con...

   Work,Assistant,Team,Small,Individual,Get an assistant     2011-10-28 10:26:36

  What Happened to Software Engineering?

Over the past few years there has been an evolutionary shift in the world of software development.  Not very long ago, the dominant Software Development Life Cycle (SDLC) methodology was the Waterfall Method with very specific phases that separated the construction phase from phases like design and test. The software development industry, still very new, was striving to find a repeatable, predictable process for developing software.  The best model for this seemed to be the physical sc...

   Software engineering,Software,Developmen     2011-09-07 10:42:34

  Obviously Correct

What do automatic memory management, static types and purity have in common? They are methods which take advantage of the fact that we can make programs obviously correct (for some partial definition of correctness) upon visual inspection. Code using automatic memory management is obviously correct for a class of memory bugs. Code using static types is obviously correct for a class of type bugs. Code using purity (no mutable references or side effects) isobviously c...

   Memory management,Code,Static,Purity     2011-11-07 08:13:05

  Recent Online Scams You Need to Know About

It’s easy to forget that the internet is a dangerous place and that it’s easy to become a victim. Everyone wants to think that they’re too smart to fall for online scams or obvious fraud. Yet actions speak louder than words, and 97% of people still struggle to identify a phishing scam. Awareness is critical in beating the cybercriminals. So here are examples of the latest online scams and tips on how to avoid becoming a victim of similar attacks. What are Online Scams? Online s...

   DATA SECURITY,VPN     2019-12-12 07:18:36

  How To Find Link Prospects Without Using Google

I’m obsessed with Google. (I mean, you kind of have to be if you’re in this industry.) But sometimes, you need a break from the hand that feeds. There’s no denying the power of advanced search queries, but you’d be surprised how many other and different prospects you can find without using the search engine at all. Curated Lists OK, I lied. You do have to use Google for this, but not nearly in the capacity you would with normal searches. With lists, you have less ...

   Search engine,Web site prospect,SEO     2012-02-25 12:02:50

  A Solution to CPU-intensive Tasks in IO Loops

Back in October 2011, Ted Dziuba infamously said that Node.js is Cancer.  A provocative title to a provocative article.  The only thing it didn’t really provoke in the commentary was much thought ;)  Zing. My interpretation of the article is that Ted holds up the classic blocking-IO process-per-request (or  thread per request; same difference) model as superior.  Yet we all remember where the blocking-IO forking model got Apache in the early days.  ...

   CPU,Intensive IO loops,Solution,C++     2012-02-06 07:42:40

  How to Seem (and Be) Deep

I recently attended a discussion group whose topic, at that session, was Death.  It brought out deep emotions.  I think that of all the Silicon Valley lunches I've ever attended, this one was the most honest; people talked about the death of family, the death of friends, what they thought about their own deaths.  People really listened to each other.  I wish I knew how to reproduce those conditions reliably.I was the only transhumanist present, and I was extremely careful not...

   Deep,Work,Smart,Work style,Study     2011-10-23 11:46:11

  PHP: a fractal of bad design

Preface I’m cranky. I complain about a lot of things. There’s a lot in the world of technology I don’t like, and that’s really to be expected—programming is a hilariously young discipline, and none of us have the slightest clue what we’re doing. Combine with Sturgeon’s Law, and I have a lifetime’s worth of stuff to gripe about. This is not the same. PHP is not merely awkward to use, or ill-suited for what I want, or suboptimal, or...

   PHP,Design,Analysis     2012-04-11 13:46:57

  Update & Delete Kubernetes resources in one-line command

It recently troubles me that my GKE cluster is managing more and more resources and causing difficulties in maintenance, one of which involves how to delete resources properly. Next, I will explain step by step the difficulties I encountered in my work and how I finally used the combination of bash commands and kubectl to implement the edition of Kubernetes objects through one-line command. In general The following are the basic operations that almost every Kubernetes user takes. Check ðŸ‘...

   KUBERNETES     2020-11-01 04:16:47

  Top 15+ Best Practices for Writing Super Readable Code

Twice a month, we revisit some of our readers’ favorite posts from throughout the history of Nettuts+.Code readability is a universal subject in the world of computer programming. It’s one of the first things we learn as developers. This article will detail the fifteen most important best practices when writing readable code.1 - Commenting & DocumentationIDE’s (Integrated Development Environment) have come a long way in the past few years. This made commenting your ...

   Readable,Source Code,Refactor,Comment.OO     2011-04-11 02:20:08