Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- MEDIUM



   Move.Me Writing Your Own WebSocket Server

The WebSocket protocol has applications beyond plain vanilla web development.  I will explain how the protocol works, how to implement your own server and share some insights I had along the way. Before we get down and dirty, I will explain what I’ve been doing with it. At this point I expect many of you are saying “I’m not working on a web game this doesn’t seem relevant to me.” Well, neither am I. I embed a WebSocket server into my game engine and wit...

   Socket,NetWorking,WebSocket,Server development     2012-01-28 07:06:43

  Mock Solutions for GoLang Unit Test

In Go development, Unit Test is inevitable. And it is essential to use Mock when writing Unit Tests. Mock can help test isolate the business logic it depends on, enabling it to compile, link, and run independently. Mock needs Stub. Stub function replaces the real business logic function, returns the required result, and assists the test. I involved the related test code for Controllers while writing Kubernetes Operator recently, and there would be mocks for GRPC and HT...

   UNIT TEST,TESTIFY,GOSTUB,GOMOCK     2020-10-31 21:59:15

  Steve Jobs's prediction about wireless,iPad and App Store in 1983

1983 was still a year uncultivated. That year, Apple released the first personal computer Apple Lisa with graphical user interface in the world, TCP/IP was released less than two years, the Internet was basically still a wasteland. General people had few knowledge about computer. Steve Jobs still needed to start with "What is the computer" in his speech. Today, we have become accustomed to social networking, smart phones and mobile Internet, it was really unbelievable at that time. That ye...

   Steve Jobs, record,Apple,prediction     2012-10-03 04:37:17

  3 better and efficent ways of cloud to help content marketing

Content marketing has enlarged in quality over the past year, with around 88% of business-to-business (B2B) firms participating during this marketing stategy and around 90% of customers indicating that custom content is beneficial. Some businesses across industries need staff to send email newsletters, pen web log posts , draft advertisements, write grant proposals and publish white papers. flexibility to form quality content are often an important talent every  jobs However, making and mar...

   BUSINESS     2016-03-08 10:39:10

  11 CSS Button Solutions

BonBon ButtonsZardiCSS3 Buttons With Simple MarkupFancy Buttons10 Nice CSS3 ButtonsCSS3 Animated Bubble ButtonsSuper Awesome Buttons with CSS3 and RGBAPretty CSS3 ButtonsGitHub-Style CSS3 ButtonsWe Love ButtonsSexy ButtonsRealistic CSS3 ButtonsSource:http://sd.csdn.net/a/20110513/297781.html...

   CSS,Button,Style,Solution     2011-05-14 01:29:10

  Goodbye Manual Processes, Hello Automation Certificate Lifecycle Management Like It’s Supposed to Be

At the heart of every story lies a villain and a hero. In the never-ending story of certificate lifecycle management, there’s no bigger villain than manual effort. Destructive, irrepressible, and risk-laden, this villain causes nothing but mayhem and loss. Automation, the hero, is the complete opposite of manual effort. Proactive, solution-oriented, and breach-proof, this hero deserves recognition, allegiance, and attention, yet they get none of that from a majority of today’s organi...

   DATA SECURITY,CERTIFICATE     2023-06-20 08:10:02

  Secure Your Go Code With Vulnerability Check Tool

Security vulnerabilities exist in any language and any code, some are written by ourselves, but more are from the upstream dependencies, even the underlying Linux. We have discussed the security protection methods for Go and Kubernetes Image in Path to a Perfect Go Dockerfile and Image Vulnerability Scanning for Optimal Kubernetes Security, in which the security scanning was performed based on generic. As the Go community grows, more and more open-source packages have caused ...

   GOVULNCHECK,GOSEC,GOLANG     2022-10-29 23:43:20

  9 quotes that stayed with me as a developer

I find quotes inspiring, motivating or sometimes just thought provoking, so here's some of my favourites from over the years. Sometimes reading a book can have a real influence on how you write code, or how you approach a problem. Sometimes a simple quote  is enough to make me question the way I look at the code I'm writing. Or often I sit in awe about someone's so well distilled what I've known internally for ages but have never been able to enunciate.   "Design is finding t...

   Quote,programmer,programming     2011-05-27 03:34:49

  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10

  Hackers vs. Coders

Photo Credit: Pranav MistryBeing a good hacker is an invaluable skill. But is being a coder the same as being a hacker? Is it possible that coders are at a creative disadvantage to hackers who don’t know how to code?Here’s a story that helped me see the difference.I was recently invited to mentor at Startup Weekend. On Friday night, we gathered to eat pizza, pitch ideas, create teams and discuss launch plans. At the end of the day, everyone was feeling great about what theyâ...

   Hacker,Coder,Comparison,Innovation     2011-05-11 02:11:09