Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Management



  Is Utah a good place for startups?

If you’re thinking of starting a business soon, then know that it’s a really good time to do so despite current circumstances. Rieva Lesonsky, a writer for the US Chamber of Commerce, highlights that today’s “new normal” has brought new customer demands and improved business technologies that you can take advantage of. In fact, many of the most successful businesses in the world, like Microsoft and Netflix, were created during an economic downturn. But this begs th...

   STARTUP,BUSINESS,UTAH     2020-11-19 06:12:05

  Meet the new Gmail inbox

On 29 May, Google announced the new Gmail inbox. The biggest change is users can categorize their mails. Today the new Gmail inbox is finally available. Now we can put a lot of different types of email: messages from friends, social notifications, deals and offers, confirmations and receipts, and more into different categories. By default, Gmail provides three different tabs : Primary, Social and Promotions at the inbox page. You can know what to read and what are the priority mails as a glance....

   Gmail,New inbox     2013-07-17 20:06:10

  In defence of Objective-C

An unashamed apologist’s perspective on the loveliest language i’ve worked with.I’ve worked with a lot of programming languages in my time. Not a huge number, mind you, but enough that i can say that i’m open minded and seasoned about it. And, as they say: ‘Don’t feed the trolls’ – well, i’m about to do exactly that: feed the trolls at work who love to rag on about how awful obj-c is! So here i go, foolishly treading where no sensible...

   Apple,Objective-C,Syntax,Defense,Memory management     2011-10-17 11:28:39

  Two things I don’t like about Hacker News

Hacker News is a very famous IT information hub. We can find many useful links about the latest IT news and fantastic technology demos. But there are two things I don’t like about Hacker News. Maybe some of you also have the same feelings.1.  About the more link. Every time we click the more link to go to next page, there will be a unique key generated to produce the new page. It is a good security mechanism. Also it may increase pages views as we need to read page by page bu...

   Hacker news,More link,Submission,Security     2012-02-28 11:55:37

  Management Myth #1: The Myth of 100% Utilization

A manager took me aside at a recent engagement. “You know, Johanna, there’s something I just don’t understand about this agile thing. It sure doesn’t look like everyone is being used at 100 percent.”“And what if they aren’t being used at 100 percent? Is that a problem for you?”“Heck, yes. I’m paying their salaries! I want to know I’m getting their full value for what I’m paying them!”“What if I told you...

   Management,Utilization,Efficiency,Innovation     2012-01-05 08:13:41

  How Can Your Data Be Stolen Online?

In 2019, according to Statista, nearly 165 million sensitive records were exposed in the US due to data breaches. Unfortunately, data theft is not going anywhere. Hackers are using increasingly sophisticated methods to steal information, but thankfully there are measures you can take to ensure your data stays safe. Here are some of the most common ways people get their data stolen online and how you can take precautions against the methods cybercriminals use. Human Error Hacking is one of the m...

   DATA SECURITY,PROTECTION KID     2021-01-27 19:46:05

  What I learned interviewing with Google

Over the last few weeks I’ve been interviewing with Google for a job doing primarily JavaScript development. I didn’t end up getting the job but I thought I would share the process of interviewing for Google as it was both very exciting and a humbling experience. I can’t reveal everything as I’m under a few NDAs. I’m not going to mention the products or teams that I was interviewing for but you may be able to guess. For those that don’t know me, I...

   Google,Experience,Interview,Algorithm     2012-02-10 06:19:17

  Lenovo gets into the chip design field

According to EETimes, Lenovo will enter the field of chip design, the main focus is the smartphone and tablet chip design.There is a small team of 10 people who are working on integrated circuit design in Lenovo in the past 10 years, Till the middle of this year, Lenovo intends to expand the team to 100 engineers. Lenovo may recruit 40 engineers in Shenzhen and 60 engineers in Beijing.Despite Lenovo has much freedom in the choice of application processors, but because it involves a competitive ...

   Lenovo,Chip,Samsung,Smartphone     2013-04-01 06:15:54

  Google+ is sick

Google says that Google+ now has over 170million registered users, but according a new research report of Fast Company about Google+,  Google+ is just a virtual ghost town.This research selected a sample of 40,000 random Google+ users. The result is :The average post on Google+ has less than one +1, less than one reply, and less than one re-shareRoughly 30% of users who make a public post never make a second oneEven after making five public posts, there is a 15% chance that a user will not ...

   Google+,Sick,Research     2012-05-16 05:41:35

  Set file permission in Java

Prior to Java 6,  there is no good solution at the Java level to provide file permission management. You need to implement your own native methods or call the Runtime.exec() to invoke the system routine such as chmod in LInux. Since Java 6, Java introduces a set of methods which can be used to set the file permission at Java level. These methods include: File.setReadable(boolean); File.setWritable(boolean); FIle.setExecutable(boolean); File.setReadable(boolean, boolean); File.setWritable(bo...

   JAVA, FILE PERMISSION, POSIX,learnjava     2015-08-29 03:37:37