SEARCH KEYWORD -- OPEN LINK
App's user value doesn't necessarily bring business value
There is an old saying in Internet world, you can get business value as long as you can achieve user value. Is this statement outdated in mobile Internet era? This statement originated from PC Internet era, but now the time users spend on PC drops and user behavior tends to be stable and conservative. In contrast, people are more willing to stay on mobile devices. The difference between PC and mobile is that users are freely to move around on PC end. People can navigate from one link to another ...
App,Business value,User value 2013-06-25 10:52:12
Facebook open sources its C++ library named Folly
Recently, Facebook open sourced its low level C++ function library for its internal use named Folly. Folly is an open sourced C++11 component library, it provides functions similar to what boost and std libraries provide, including string, vector and memory allocation, bit operation etc, to fulfill large scale high performance requirements.Currently Folly is tested with gcc4.6 on some 64 bit systems such as Fedora 17, Ubuntu 12.04 and Debian wheezy, it may also be OK on other 64 bit platforms wi...
Facebook,Folly,C++,open source 2012-06-05 08:31:12
Hide a file in a picture
Sometimes if you want to hide some important files on your computer which you don't want others to see, how would you do that? Find a professional tool? Set password for some folders? Change the file properties to hidden? They are possible, but they may not be so convenient or so secure. Here we share with you how to hide a file in a picture. Prerequisites 1 picture for example : test.jpg 1 test file, for example : test.txt WinRAR Steps Prepare the picture test.jpg and test file test.txt Use ...
Trick,Picture,Fil hiding,WinRAR 2012-09-13 19:36:36
How Chinese tech websites survive
As a tech site which aims to share knowledge and experience, content is its core value. To attract readers, it needs to produce valuable content and keep the originality of the content. When an article is published on a site, it should be a copyrighted property of that site or the original author while others should be very careful when considering to copy that article to their own site. They should generally avoid to copying the whole content of the article. However, in reality, this is no...
Microsoft Edge extension manifest v2 migration to v3
In June 2023, Microsoft Edge would not allow Edge extensions with manifest version before v3 to be listed on Microsoft web stores as v3 extensions add more security privacy related restrictions on some of the functions. Hence all extensions with manifest v2 must migrate to v3. In this post, we would show how we did the migration for one of our extensions and the changes made. There is a checklist provided by Microsoft Edge team on what needs to be updated so that the extension can stil...
MICROSOFT EDGE,EXTENSION,MANIFEST V3 2022-10-01 02:54:47
Thoughts on Running an Open Source Project
I spoke in the unconference at PHPUK last week, on running an open source project. I thought I would collect together my thoughts into one place before I lose the scratty piece of paper I wrote them down on. I'm not sure I'm the right person to be giving advice exactly, but these are the things that, having been project lead on joind.in for a while, I think are important. Community I love it when people share their code, just make something and publish it, but to my mind it isn't an open...
Open source,Management,Readme,Community 2012-03-06 05:25:27
How to prevent next HeartBleed bug?
How to ensure the security of open source projects is a concern for many open source users including individual users and companies. But it's not an easy task to ensure the security of open source projects. Because everyone can see the source code, there is much higher possibility that a bug may be found by someone. Once a bug is disclosed, people may exploit it and do evil things, this may cause loss of money either for individuals or companies, some of the bugs may even have big impact to the...
Open source,HeartBleed,Security 2014-04-24 09:07:05
Using OpenID connect in asp.net for login via Facebook
This post is shared by asp.net development India experts to explain OpenID support and OAuth providers support in asp.net. Through this article, you will learn the best way to use OpenId in asp.net development for login through different accounts including Facebook. Read this article and discover how experts of asp.net do it. Web pages of Asp.Net have support for OpenID and OAuth providers. These providers allow users to log in to the web application with their credentials from Microsoft, Google...
ASP.NET ,DEVELOPMENT,INDIA 2016-11-07 05:09:58
A Programming Idiom You've Never Heard Of
Here are some sequences of events: Take the rake out of the shed, use it to pile up the leaves in the backyard, then put the rake back in the shed. Fly to Seattle, see the sights, then fly home. Put the key in the door, open it, then take the key out of the door. Wake-up your phone, check the time, then put it back to sleep. See the pattern? You do something, then do something else, then you undo the first thing. Or more accurately, the last step is the inverse of the first. Once you're aware ...
Programming,Idiom,Strange 2012-01-04 08:12:25
IDC lists top 6 myths, realities about open source
Summary: What are the top 6 myths? That open source software will enter every market, is inherently innovative, it improves faster than commercial software, that it has less lock-in, that it’s free and that it has little benefit if one is not involved in the community. IDC calls these ideas “myths†but acknowledges there’s more than a grain of truth to all of them At its Directions 2012 conference in Boston today, IDC rev...
IDC,Open source,Reality,Free,Contribution 2012-03-16 08:47:53
RECENT
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- more>>