SEARCH KEYWORD -- Public contributions
Check out Google Reader substitutes
It's only a few hours left that Google Reader will be shut down Since Google decides to decommission such a good product, many people are disappointed about Google. The gene of Google is completely different from Facebook, The strategy of promoting Google+ everywhere is becoming a bit offensive. As a heavy user of Google Reader, people have to start looking for an alternative, Below we give a comparison of different Google Reader substitutes. And we compare them with following parameters: Lload...
RSS reader,Google Reader,Feedly 2013-06-30 08:46:42
Php Class to Retrieve Alexa Rank
Alexa is a service acquired by Amazon which offers a web traffic report for websites. They retrieve the data from toolbar that can be installed in different browsers, centralize the data and display reports to anyone. The most important indicator is the Alexa Rank. It represents the rank of a webpage in a list of all the websites. It’s not the 100% accurate but it gives a good indication.Alexa does not offer any free API to obtain Alexa Rank. However there is a simple method to obtain it ...
PHP,Alexa,Alexa rank,API,Retrieve Alexa rank 2011-10-25 11:28:55
Transparency in Cloud Services
37signals recently launched public “Uptime Reports†for their applications (announcement). The reaction on Hacker News was rather tepid, but I think it’s a positive development, and I applaud 37signals for stepping forward. Reliability of cloud applications is a real concern, and there’s not nearly enough hard data out there. Not all products are equally reliable; even within 37signals, the new reports show a 3:1 variation in downtime across apps. That said, ...
Cloud,Transapency,37signals,Announcement 2012-01-10 07:24:02
STOP WRITING GOOD CODE; START WRITING GOOD SOFTWARE
Good software trumps elaborate code. And unfortunately, you can’t usually have both. The real world has deadlines and ship dates. It’s a game of pick two:Ship on timeShip with elaborate codeShip with a fantastic productAlmost always, you should pick the first and the last when you’re building software applications for users (if you’re building API’s or open source libraries for other developers, then it’s a different story). Too often I have seen de...
Good software,Standard,Good code,Deadline,Tradeoff 2011-11-20 06:56:06
When a CA becomes untrustable
Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...
APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN 2016-10-01 23:03:44
Those interaction methods we can play with
Smartphones have become one important part of our lives, the phone apps also play more and more important roles. They can help us live through the boring time or help us connect to our close friends fat away from us or help us get information,etc. There are also some interesting interaction methods since the birth of smartphones. We can play with them while we interact with the smartphones. Here we summarize some of them. 1. Shake Since WeChat introduces the Shake method to find people which yo...
Interaction,Mobile device,Google glass 2013-05-07 05:21:15
Three Simple Ways to Improve the Security of Your Web App
It seems like web app security has entered the public conscious recently, probably as a result of the press covering the activities of groups like Anonymous and incidents like security breaches at several CAs. Here are a couple of quick security tips to improve the security of your web apps. Think of these as low-hanging fruit, not as a substitute for thorough analysis of your app’s security. If there’s interest in this topic we can do more posts, too - let us know in the com...
Web app,Security,X-FRAME-OPTIONS,SSL 2011-12-08 10:10:20
Why exception would be thrown when deleting element while looping through HashMap in Java
HashMap and other Collection types are frequently used in Java application programming. This post will explain why exception would be thrown when deleting element with Map.remove() while looping through a Map using Iterator. This issue would also occur to other Collection types such as Set, List. Below is a sample code snippet demonstrating the exception thrown. Map<String,String> map = Collections.synchronizedMap(new TreeMap<String,String>()); map.put("key1","value1"); map.put("ke...
JAVA,HASHMAP,CONCURRENTMODIFICATIONEXCEPTION 2018-06-30 12:49:09
The difference between System.load and System.loadLibrary in Java
When writing code using native library in Java, normally the first step is loading some native library. static{   System.load("D:" + File.separator + "Hello.dll"); } JDK provides two ways to load libraries: System.load(String filename) System.loadLibrary(String libname) This post will try to explain the differences of these two ways. According to Java Doc on System.load(), it has below description. Loads the native library specified by the filename argument. The filename a...
NATIVE,JNI,JAVA,SYSTEM.LOAD,SYSTEM.LOADLIBRARY 2019-02-05 05:49:28
Why is my IP blocked at a website I visit regularly after I changed ISPs?
I just installed a new Express Card with Verizon Broadband wireless last night. Had tons of fun accessing the web from places I usually cannot, (we are in trucking) until I got to my favorite forum. It's a public place I have been to thousands of times, but instead of happily browsing all the daily news events and checking to see if the world blew up yet, I found myself blocked by a big white screen that said YOUR IP ADDRESS HAS BEEN BANNED. What can I do? I can't go to the forum owners to ...
ISP,IP Block,StopForumSpam,Solution 2012-02-01 08:53:38
RECENT
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- more>>