Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Notes



  The Anatomy of a Perfect Web Site

Many sites on the web are good. They are well-designed, clear, have great information architecture and are easy to navigate. Often, web designers emphasize the “design” part too much, and neglect the other equally important things. However, there are sites which aren’t that aesthetically pleasing, but still are the best sites in the world. They may look like a big, sad bag of wrestling underwear on the outside, but their underlying user experience is really, really refine...

   Website,web design,Anatomy,Interaction,Feature     2011-11-08 09:00:34

  Why is my IP blocked at a website I visit regularly after I changed ISPs?

I just installed a new Express Card with Verizon Broadband wireless last night. Had tons of fun accessing the web from places I usually cannot, (we are in trucking) until I got to my favorite forum. It's a public place I have been to thousands of times, but instead of happily browsing all the daily news events and checking to see if the world blew up yet, I found myself blocked by a big white screen that said YOUR IP ADDRESS HAS BEEN BANNED. What can I do? I can't go to the forum owners to ...

   ISP,IP Block,StopForumSpam,Solution     2012-02-01 08:53:38

  Do We Really Need Wi-Fi in Schools?

Why do I think Wi-Fi is needed in schools? Times have changed.  We need to adapt to the changes. I believe the internet is probably the most important tool available today. The world- wide web contains information about anything you could possibly want or need to know.  It allows an even playing field for people who don’t have the information and knowledge to be able to get it. Students today are the future.  They need to be able to access as much knowledge as possible to be...

   SCHOOL,WIFI,EDUCATION,COMPUTERS     2018-11-13 18:13:27

  Unix Philosophy

First, let me tell two stories.The first one is one Japan soap factory had a problem that they sometimes shipped empty boxes to the customer without soap inside. So they spend much time and money to invent a X-ray machine to check whether the soap box is empty.The same thing happens in a small factory which doesn't have too much money. The solution of them to solve this problem is they use a desk fan to blow the empty boxes out of the belt and into a bin.The second story is NASA finds that in sp...

   Unix Philosophy,Simple,Rules     2012-05-06 06:49:26

  OpenLDAP Proxy -- Tricks and tips

Just like other software configuration, there would be issues encountered during the OpenLDAP proxy setup process. In this post, we would try to summarize some of the tricks and tips for OpenLDAP proxy setup. OpenLDAP Version We would always recommend that you install the latest version of the OpenLDAP because they contain the latest features, bug fixes and security patches. You should always refer to the latest release notes for new changes. In case you have used an earlier version of Open...

   SSL,AUTHENTICATION,OPENLDAP,OPENLDAP PROXY,ATTRIBUTE MAPPING,OVERLAY     2017-11-04 04:29:38

  What’s the waiter doing with the computer screen?

When Richard Gatarski and a few friends wanted to dine in the Swedish city of Norrköping a few weeks ago, they booked a table at a downtown Italian restaurant that seemed nice. When they arrived, they were greeted by the headwaiter, who asked if they had a reservation. Richard confirmed, and the headwaiter looked at his computer screen. ”Gatarski? Hm, let’s see .. yes, there’s your reservation. Welcome!” The headwaiter then picked up what Richard first thought m...

   Waiter,Computer screen,Touch     2012-03-12 11:07:01

  Bad code plagues business applications, especially Java ones

A new study examining 365 million lines of code in 745 applications identifies bad coding practices that affect security, performance and uptime, with Java Enterprise Edition applications having the greatest number of problems. Cast Software, which makes tools that automate the analysis of business applications, examined programs written in Java-EE, .NET, ABAP, C, C++, Cobol, Oracle Forms, and Visual Basic, used across a wide range of industries from energy and financial services to IT co...

   Program,Security,Defects,Java     2011-12-09 07:42:51

  Good to Great Python reads

A col­lec­tion of python “must reads”:The Python yield key­word explainedPython’s super() con­sid­ered super!Under­stand­ing Python DecoratorsWhat is a meta­class in Python?Meta­classes DemystifiedTry/Catch for val­i­da­tion or speed?Python (and Python C API): __new__ ver­sus __init__Python “self” keywordPython and the Prin­ci­ple of Least AstonishmentA Curi­ous Course on Corou­tines and Concurr...

   Python,Reference,eBook,Reading Material     2011-11-15 11:46:12

  How Google Tests Software - Part Three

Lots of questions in the comments to the last two posts. I am not ignoring them. Hopefully many of them will be answered here and in following posts. I am just getting started on this topic.At Google, quality is not equal to test. Yes I am sure that is true elsewhere too. “Quality cannot be tested in” is so cliché it has to be true. From automobiles to software if it isn’t built right in the first place then it is never going to be right. Ask any car company that has ever h...

   Google,Software,Testing,Quality,Fidelity     2011-03-22 14:31:00

  What is encryption? Its role in the modern age

“Messages and calls are end-to-end encrypted.” If you are a WhatsApp user, you must have read this statement at the top of chats you open. Now, what does it mean? The statement signifies that all the messages or voice notes shared between users are encrypted, and no one can read or listen in on them. As mostly all of us use messaging apps and emails, information security has become a major concern. Moreover, we don’t know how many digital footprints we leave on the web can be t...

   DATA SECURITY,VPN     2021-01-21 08:04:16