Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- MICROSOFT AZURE



  Do NOT use boolean variable as function parameters

We follow lots of coding styles and coding standards when we do programming, but we may frequently forget one. The forgotten one is that do not use boolean parameter as the function parameters. The reason is it would greatly reduce the readability of the code. Don't believe it? When you read the following code, what does this code mean? widget->repaint(false); Do not repaint? Or what does this mean? After looking at the document, we know that this parameter is whether ...

   CODING STYLE,BOOLEAN,FUNCTION PARAMETER,CODING STANDARD,METHOD PARAMETER     2012-04-22 02:38:45

  HTML5 and Accessibility

Accessibility for people with disabilities is a legal responsibility in many countries. It's also the right thing to do, and one of the characteristics distinguishing professional developers from the WWWs: WYSIWYG-wielding wannabes. But for many, accessibility has been a somewhat black art, requiring adding extra stuff to your code like alt text, table summaries, ARIA information that can be difficult to test by developers who are not assistive technology users themselves.The arrival of HTML5 ha...

   HTML5,Accessibility,Video,Music,Canvas     2011-08-19 08:13:44

  Why Only Designers Can Create New Programming Languages

Attempts to verify the utility of languages stifle innovation. Christopher Mims 03/06/2012 30 Comments Compared to the versions that are hacked together late at night under insane deadline pressure, the programming languages to come out of academia are failures. Well, not all of them. History can speak for itself. Via UC Irvine computer scientist Cristina Videira Lopes, who deserves credit for any insight you might get from this post, which is a ...

   Designer,Programming language,Create,Great     2012-03-19 13:22:15

  Preparing for the real costs of cloud computing

Computerworld - At a cloud computing conference in New York in June, a number of speakers pointed out that the cloud is moving past the hype stage and is beginning to deliver tangible benefits to organizations. These improvements include increased flexibility and agility. But moving to the cloud can also mean added costs, some of which might be unexpected, according to IT executives whose organizations have implemented cloud services or are considering them. While these types of costs ...

   Cloud computing,Cost,Chanllenges,Platfor     2011-08-23 07:48:24

  How does JGSS read Windows native TGT credential?

MS LSA is a protected subsystem that authenticates and logs users onto the local system. The user credential is stored at the native credential cache of LSA on Windows. This kind of credential is often used to authenticate the user to the server, one of the authentication methods is Kerberos. JGSS has provided a native interface which can read the native TGT credential and use it to get the TGS of a service. But how does JGSS read the native TGT credential? Here is a sample code for reading nati...

   KERBEROS,JGSS,MS LSA,NATIVE CREDENTIAL,TGT,SESSION KEY TYPE     2015-03-25 03:42:32

  Why Windows?

Since the latest episodes of both Bent and Throw it Against the Wall have seen me mention Windows Phone 7, I think it’s about time I talk about why I like it. I know there’s a lot of scepticism surrounding it. And why not? Most people I know who were considering jumping the Microsoft ship did so in the dark days of Vista, so that’s their last experience with Windows. Anyone who saw their parents working on a Treo back in the nascent days of the Blackberry know the slop...

   Windows,Features,Advantage     2012-02-10 06:22:13

  Web Security: In-Depth Explanation of X-XSS-Protection

What is X-XSS-Protection X-XSS-Protection is an HTTP response header designed to enable or configure built-in cross-site scripting (XSS) filters in certain versions of Internet Explorer, Chrome, and Safari. The purpose of these filters is to detect reflected XSS attacks in the response and prevent the loading of pages, thereby protecting users from such attacks. The X-XSS-Protection response header was initially introduced by Microsoft in Internet Explorer 8 to control the browser's XSS filter. ...

   X-XSS-PROTECTION,WEB SECURITY,CONTENT SECURITY POLICY,XSS,CSP     2023-11-29 01:48:40

  IBM Launches Maqetta HTML5 Tool as Open-Source

IBM announced Maqetta, an HTML5 authoring tool for building desktop and mobile user interfaces, and also announced the contribution of the open-source technology to the Dojo Foundation. LAS VEGAS – At the IBM Impact 2011 conference here, IBM announced both Maqetta as well as the open-source contribution of its Maqetta HTML5 visual authoring tool to the Dojo Foundation. Maqetta is an open-source project that provides WYSIWYG visual authoring of HTML5 user interfaces using drag-and-drop ass...

   IBM,Open Source,Dojo foundation,HTML 5,W     2011-04-12 01:59:29

  Data Scientists and Their Harder Skills than Big Data

The field of data science is often confused with that of big data. Data science is an aid to decision makers in a company with a logical approach.  Who is a Data Scientist?  A Data Scientist reviews a huge collection of data(that may extend to a couple of terabytes of disk space or thousands of excel sheets). This humongous chunk of data is not feasible for being handled, sorted and analyzed by a single person. Here we require the help of data science, and most recently, the field of A...

   BIG DATA     2017-12-13 04:22:55

  Writing great JavaScript

I probably could have named this post something like “Writing clean, validating and portable JavaScript”, but that would be no where near as catchy. The problem with “great” is it means different things to different people. I am going to show you my idea of great which may differ from many developers views, but I hope it helps someone improve their code. So what’s the point in this, why can’t you just carry on writing JavaScript as you have been for a...

   JavaScript,Great,Clean,Tips     2012-03-24 05:18:12