Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Message



  7 big mistakes that make your layout a disaster

Even though the web design field has become a real industry, building a website is part art, part science. The design of a website may attract people but it may also make them run away, it depends on the work of the web designer. The experience, the talent and the capacity of endeavor are the greatest tools of a web designer, a good layout is based on all of these and, besides that, it is a very time consuming activity.Making a good layout is difficult and judging its value is subjective, a desi...

   Web design,Mistakes,Content,White space     2011-11-24 03:36:23

  Web Security: In-Depth Explanation of X-XSS-Protection

What is X-XSS-Protection X-XSS-Protection is an HTTP response header designed to enable or configure built-in cross-site scripting (XSS) filters in certain versions of Internet Explorer, Chrome, and Safari. The purpose of these filters is to detect reflected XSS attacks in the response and prevent the loading of pages, thereby protecting users from such attacks. The X-XSS-Protection response header was initially introduced by Microsoft in Internet Explorer 8 to control the browser's XSS filter. ...

   X-XSS-PROTECTION,WEB SECURITY,CONTENT SECURITY POLICY,XSS,CSP     2023-11-29 01:48:40

  Why Apple Mac switches its CPU? The war between Intel and ARM

About three months ago, the new iPad Pro was released and it supports touch pad and mouse. It conveys a clear message to users that they want people to treat iPad Pro as a laptop.  As we know, iPad and iPhone are both using iOS, if iOS can run on laptop,  it means MacOS and iOS can merge and become a unified OS. And if Mac and iPhone can share the same OS, it means the same app can run in all places. It is becoming clearer and clearer that Apple is planning to do this exact thing. Late...

   APPLE,INTEL,ARM,WWDC,A14     2020-06-20 00:19:02

  Recent Online Scams You Need to Know About

It’s easy to forget that the internet is a dangerous place and that it’s easy to become a victim. Everyone wants to think that they’re too smart to fall for online scams or obvious fraud. Yet actions speak louder than words, and 97% of people still struggle to identify a phishing scam. Awareness is critical in beating the cybercriminals. So here are examples of the latest online scams and tips on how to avoid becoming a victim of similar attacks. What are Online Scams? Online s...

   DATA SECURITY,VPN     2019-12-12 07:18:36

  A mini post on GoLang context

In a GoLang web server, every request coming in will be handled by a goroutine. In the request handler, the logic may also need to create new goroutine to handle other tasks like RPC call. When the request is processed and response is returned, these goroutines created need to be exited so that no goroutine leak should happen. package main import ( "fmt" "log" "net/http" ) func main() { http.HandleFunc("/echo", func(w http.ResponseWriter, r *http.Request) { fmt.Println(&r) w.Write(...

   CONTEXT,GOLANG     2019-12-14 06:21:02

  10 Web Design Elements that You Shouldn’t Overlook

When it comes to designing and building websites, it never seems to happen fast enough.Given this fast pace, many small details that are eventually required to build the website are often left out of the design process. While these details might be minor, they are what take a website from nice to truly awesome.These details are often easy to miss because they don’t drive the overall look and feel of the website. The problem is that as your development team works through the design, it wil...

   Web design,Verification,jQuery     2011-03-30 00:09:49

  The Giant Mafia

There is an old Chinese saying "Things of a kind come together. People of a mind fall into the same group.". In the wave of Web 2.0, there are many emerging IT giants coming out the world. And many of them are founded by a group of people who previously worked together at the same company such as PayPal and Facebook. This is called giant mafia. Let's see what people from the big IT giant have done after leaving the original company. The PayPal mafia Peter Thiel, co-founder and CEO of PayPal bef...

   Facebook mafia,PayPal mafia,Twitter mafia     2015-04-04 10:32:00

  Siri in Practice

Some quick comments on using Siri in practice—for things other than asking it to open the pod bay doors. Siri’s voice recognition is very impressive, and the scope of what it understands is very good given the difficulty of what it’s doing. But it has a lot of trouble with certain sorts of names—Irish names, for example, which often are not written as pronounced. For example there are a lot of people in Ireland named “Aoife”—it’s a very popul...

   Siri,Apple,Practice,Artificial Intelligence,AI     2011-10-15 15:01:13

  Command Line Arguments

Our Hello program still isn’t very general. We can’t change the name we say hello to without editing and recompiling the source code. This may be fine for the programmers, but what if the secretaries want their computers to say Hello to them? (I know. This is a little far-fetched but bear with me. I’m making a point.)What we need is a way to change the name at runtime rather than at compile time. (Runtime is when we type java HelloRusty. Compile time is when w...

   Java,Command line arguments,First elemen     2011-09-30 11:31:54

  The Web Is Wrong

The Analogies Are Wrong Originally, web pages were static documents, and web browsers were static document viewers; there was text, some formatting, and images—if you could pay for the bandwidth to serve them. Hyperlinks were the really big thing, because they were the main point of user interaction—but what a powerful thing they were, and still are. Then along came CGI and Java, and the web was transformed: all of a sudden, a web browser became a way to serve interactive co...

   Web,Feature,Static document,CSS,Text     2011-12-31 15:43:53