Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Must read



  4 Reasons Why We are NOT in a Post-PC Age

Sales of desktop PCs and laptops are falling. It’s impossible to read any technical media without hearing about the “death of the PC.” And both Apple and Microsoft are soon to release operating systems that seek to merge the features of the computer operating system with those available on tablet devices. All this evidence mounts up to suggest that the Steve Jobs-coined “post PC era” is upon us. Well, I’m going to stick my neck out on this: I donâ€...

   Post PC,Reason,PC     2012-03-26 15:24:46

  Nielsen : Google ranks No.1 web brand

Nielsen released the 2012 digital industry rankings report, The report said Google continued to rank No.1. for web brand From January 2012 to October 2012, the average monthly unique visitors reached 172 million. Followed by Facebook which has 153 million average monthly unique visitors. In 2012, the online video service continues to grow, YouTube is still the largest online video site, an average annual 132 million unique visitors. Top 10 U.S. Web Brands of 2012 For the details of other ranks ...

   Nielsen, Web brand,2012     2012-12-22 10:02:05

  Access control in Java -- doPrivileged

Previously we have introduced how Java performs permission check to protect resource access. What if sometimes we need to give some class the temporary access to some resource which it initially doesn't have? AccessController provides six doPrivileged methods to fulfill this requirement. These six methods have below signatures : static T doPrivileged(PrivilegedAction action)static T doPrivileged(PrivilegedAction action, AccessControlContext context)static T doPrivileged(PrivilegedExceptionA...

   JAVA,SECURITY,DOPRIVILEGED     2016-03-08 05:46:42

  Bash Shell Scripting - 10 Seconds Guide

This Bash shell scripting guide is not a detailed study but a quick reference to the BASH syntax. So lets begin... Common environment variables PATH - Sets the search path for any executable command. Similar to the PATH variable in MSDOS. HOME - Home directory of the user. MAIL - Contains the path to the location where mail addressed to the user is stored. IFS - Contains a string of characters which are used as word seperators in the command line. The string normally consists of the spac...

   Bash,Shell,Linux,Tutorial,10 seconds,Shortcut key     2012-02-28 08:05:41

  Friday is my new Saturday

This term I've happened to have Friday off, but I'm suppose to teach on Saturday. I might sound slightly frustrating for 9to6 folks, but It's not uncommon for University teachers, when you have a lot of holes in your teaching schedule. However, i do a lot of research without weekends, but this is only because i do love it.Nevertheless, This simple shift of working days has made me way happier and relaxed. I don't know the reasons, but here are my observations about it: You can sleep more an...

   Life,Balance,Explore,Rest,Advice     2011-10-28 10:41:22

  How key-based cache expiration works

There are only two hard things in Computer Science: cache invalidation and naming things — Phil Karlton Doing cache invalidation by hand is an incredibly frustrating and error-prone process. You’re very likely to forget a spot and let stale data get served. That’s enough to turn most people off russian-doll caching structures, like the one we’re using for Basecamp Next. Thankfully there’s a better way. A much better way. It’s called key-based cac...

   Cache,Expiration,Key-base cache,Work     2012-02-20 05:32:40

  The Best Hackers In The World All Come From One Country

Facebook, Zynga, and other hot companies use Interview Street to recruit programmers. Interview Street posts programming challenges and invites contenders to solve as many as they can. According to their message board, nine of Interview Street's top ten hackers are all from China. One is from an unknown country. A hacker called ralekseenkov, who is ranked number 11, is from the United States. What does that say about the talent crunch here? Read more: http://www.businessinsider.com/hackers-...

   Hacker,Country,China,Microsoft     2012-04-11 13:17:55

  Google releases Analytics real time API

According to Tech Crunch, Google finally released its Analytics real time API. Although this feature was launched two years ago, there was no convenient way for webmasters to adjust the data so that they can be viewed properly. Now developers can use the API to get what they want and utilize these data to do what they want to. Developers need to apply for using the API now. Once you get access to this API, then you can search your own real time data and utilize these data as you want to. For ex...

   Google Analytics,API,Real time     2013-08-02 00:05:56

  php://input in PHP

When using xml-rpc, server side will get the data from client with php://input method instead of $_POST. Hence today we will discuss php://input. PHP official manual has below explanation to php://input: “php://input allows you to read raw POST data. It is a less memory intensive alternative to $HTTP_RAW_POST_DATA and does not need any special php.ini directives. php://input is not available with enctype=”multipart/form-data”. Here we und...

   php://input, IO, input     2013-02-25 20:43:00

  Disable foreign language translation in Chrome

When browsing a non-English language(Chinese for example) website when using Chrome, it will offer to translate the page to English every time the page is loaded. To disable the translation for all non-English websites all at once, there is a setting in Chrome you can set. Below are the steps for doing this: 1. Go to Settings and scroll down to bottom 2. Click the Show advanced settings... link and the advanced settings will be expanded 3. Find the section Languages and uncheck the option "Offer...

   Chrome,translation,disable     2015-01-06 06:37:45