Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Login with Amazon



  Why are ugly websites so successful?

“Techmeme has redesigned,” Gabe Rivera founder of the popular technology news site wrote in January 2012. “Drudge Report is now indisputably the web’s ugliest news site.” I use Techmeme all the time. I find it an excellent news website. It’s a collection of well-selected links to important issues in the technology industry. It doesn’t look pretty but it works fine for me. Asides from the quality of its stories it also has black text on white bac...

   Website design,Ugly,Success,Analysis     2012-02-13 05:27:56

  Ten things I want Siri to be able to do for me

Now that I've had my iPhone 4S for a couple of days, I'm amazed with what Siri can do. I've asked a number of questions -- real ones, not questions like "What is the meaning of life?" -- and have been totally impressed with how my interaction with the iPhone has changed. But there are more things I'd love to be able to do with Siri, which is the reason for this post.Everyone should understand that Siri is currently a beta product from Apple. A lot of the things I'm talking about here should happ...

   Siri,iPhone 4S,AI,Tweet,Four square,Intelligent agent     2011-10-17 11:24:37

  HeartBleed: Inside the heart, what happens to a normal WEB user?

To be brief, our email, IM, facebook etc. are at the risk, so try to minimize the access in these few days. Especially we should try to avoid log into our internet-banking, because we may expose our user id and password. Also later when the service providers fix the bug, we would better to change a new password for all the web accounts that are important to us. Here comes the technical explanation. You might notice before that a lot of websites use URL starting with "https". For example, https:/...

   HeartBleed,Analysis     2014-04-09 22:41:43

  How to secure an Ubuntu Apache web server

Securing server software is not a straightforward task. Not all of our operating environments are the same, leading to a variety of potential security vulnerabilities. However, using a few basic configuration and security options, you can stay a little ahead of where you want to be. 1. Fail2ban Fail2ban is a Python-based intrusion prevention software that detects and blocks malicious IP addresses from multiple unsuccessful attempts at software logins. In other words, if someone is attempt...

   Unix server security,Log,.htaccess,Cache     2011-12-27 09:25:32

  Video website in big data era

Big data initially means the large data set which is not able to be analyzed, but later it was derivatized to the method to analyze huge amounts of data in  order to gain great value.This is a form which gradually gets attention, It's difficult to analyze these data and it's also difficult to store these data and it needs some unprecedented way, Now in China many companies use the open source Hadoop distributed data cluster to meet the needs of data statistics. Since we can get segmented d...

   Netflix,Big data,Data mining     2013-04-11 04:20:40

  I am a great programmer, but horrible algorithmist

I am a great programmer, but a horrible algorithmist. It is a thought that has been weighing on me heavily recently, and I'd like to gather other developers feelings on the subject as well. I started what can be called my professional development career back in 1999. I was still in middle school, but my father hired me at his software company. My official duty was to make updates to our websites, but I mostly ended up bugging the other developers to help me learn. From there I picked up ...

   Programmer,Algorithmist,Diffference     2012-02-12 04:55:28

  C++11 multithreading tutorial

The code for this tutorial is on GitHub: https://github.com/sol-prog/threads. In my previous tutorials I’ve presented some of the newest C++11 additions to the language: regular expressions, raw strings and lambdas. Perhaps one of the biggest change to the language is the addition of multithreading support. Before C++11, it was possible to target multicore computers using OS facilities (pthreads on Unix like systems) or libraries like OpenMP and MPI. This tutorial is meant to get you st...

   C++,Multithreading,Standard 11,Demo     2011-12-18 00:50:35

  8 Optimization Rules To Improve Visibility Of your Ecommerce Store

The success of an Ecommerce store depends on its page rank. If your store pops up in first page then there are higher chances of getting noticed. But getting a spot in page 1 is no mean task as web crawlers are very smart in identifying a quality content. These crawlers follow a specific pattern in setting up a yardstick for a quality content. You need to understand what does a quality content mean from a search engine perspective. Here are the rules to be followed.   #1 Unique content is ...

   marketplace apptha, multi vendor marketplace, magento marketplace     2015-03-09 07:16:16

  Some measures for improving Linux server security

The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...

   Linux server,Server security     2012-08-21 05:08:50

  Introduction to OAuth (in Plain English)

Last week we talked about giving away your passwords and how you should never do it.  When a website wants to use the services of another—such as Bitly posting to your Twitter stream—instead of asking you to share your password, they should use OAuth instead. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password. This is a quick guide to illustrate, as simply as possibl...

   Security,OAuth,Permission,Partial access     2012-04-05 11:39:54