Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Native Client



  Benefits and Drawback of a Layered Architecture

Most enterprises today are application centric. But the problem with the application is that their database schemas, user interfaces, programming interfaces and object models are tightly coupled and difficult to change. If you want to add a new field to a database table and you’re lucky, the change will reflect through the entire system. But often the change needs to be replicated manually across the entire system. And as applications are difficult to change, adding business rules or proce...

   JAVA, PROGRAMMING,WEB DEVELOPMENT,ENTERPRISE APPLICATION     2017-05-04 08:19:34

  HTML5 and Accessibility

Accessibility for people with disabilities is a legal responsibility in many countries. It's also the right thing to do, and one of the characteristics distinguishing professional developers from the WWWs: WYSIWYG-wielding wannabes. But for many, accessibility has been a somewhat black art, requiring adding extra stuff to your code like alt text, table summaries, ARIA information that can be difficult to test by developers who are not assistive technology users themselves.The arrival of HTML5 ha...

   HTML5,Accessibility,Video,Music,Canvas     2011-08-19 08:13:44

  How key-based cache expiration works

There are only two hard things in Computer Science: cache invalidation and naming things — Phil Karlton Doing cache invalidation by hand is an incredibly frustrating and error-prone process. You’re very likely to forget a spot and let stale data get served. That’s enough to turn most people off russian-doll caching structures, like the one we’re using for Basecamp Next. Thankfully there’s a better way. A much better way. It’s called key-based cac...

   Cache,Expiration,Key-base cache,Work     2012-02-20 05:32:40

  What you may not know about PHP session

When we access one website, the site usually should have a mechanism to keep track of the status of the user on the site. There are a few mechanisms supported by many server side languages to help track user status such as session and cookie. Today we will talk about session, when creating a session, we need to keep track of many data, besides user data, we also need to tell the server what is the timeout of the session so that we can garbage collect the session data which should not be stored a...

   PHP session,session timeout,example     2013-07-06 08:44:18

  Kubernetes Authentication & Authorization 101

If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αὐθεντικÏŒς authentikos, “real, genuine”, from αὐθέντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...

   RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES     2021-06-05 23:19:18

  The Tale Of Perfect Checkout Page & Magento Online Store

I bet you've already googled every bit of advice on how to win customers. You've installed and integrated bazillions of extensions and marketing tools, rewritten every piece of text on your site, redesigned and rebranded your Magento store. In case you're still wondering why clients keep coming and going away without purchasing your goods, this article is for you. I solemnly declare that every single piece of advice on leading a customer to buy from your online store, you've read so far is imper...

   magento, magento user experience, ecommerce, online business     2015-04-16 21:15:09

  Secure Your Go Code With Vulnerability Check Tool

Security vulnerabilities exist in any language and any code, some are written by ourselves, but more are from the upstream dependencies, even the underlying Linux. We have discussed the security protection methods for Go and Kubernetes Image in Path to a Perfect Go Dockerfile and Image Vulnerability Scanning for Optimal Kubernetes Security, in which the security scanning was performed based on generic. As the Go community grows, more and more open-source packages have caused ...

   GOVULNCHECK,GOSEC,GOLANG     2022-10-29 23:43:20

  Roundup on Parallel Connections

A lot of blogging and follow-up discussion ensued with the announcement that IE8 supports six connections per host. The blogs I saw: IE8: The Performance Implications IE8 speeds things up IE8: 6 Connections Per Host IE 8 and Performance Testing IE8.s Connection Parallelism IE 8 Connection Parallelism Issues It’s likely that Firefox 3 will support 6 connections per server in an upcoming beta release, which means more discussion is expected. I wanted to pull all the facts into one place an...

   Browser,Concurrent connection,Persistent     2011-09-05 01:51:44

  Waking up early, 10 tips that work

In this blog post I am going to cover a topic that I have been occupied with for several weeks now: Becoming an early riser. Getting up early can be a great way to help you establish a daily routine which is the first step to becoming more productive. Here I present you 10 tips that helped me in becoming an early riser. 1. Get up The most important step is to get up. Actually not just get up, literally try to jump out of bed. After your alarm rings get up instantly, go to another room and t...

   Body,Rest,Health     2012-04-11 13:44:34

  5 tips for developing HTML5 mobile games

Previously at Creat Studios, Vivendi Games Mobile and JAMDAT, amongst others, Scott brings eighteen years of industry experience to MocoSpace. He heads the company's internal game studio.We've all witnessed the growth of mobile and social gaming over the past two years: the two genres have continued to evolve independently, while also coming together and embracing the power of HTML5.Mobile browser-based social games have found an audience and are thriving.This new gaming category draws from the ...

   HTML5,Mobile,Game design,Tips,Mobile dev     2011-09-05 08:15:09