Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Real-time web



  Only 4G can resolve the conflicts between China Telecom Carriers and WeChat ?

Why WeChat has made the three big Chinese telecom companies uncomfortable? Let's analyze from both technical and commercial levels. From a technical point of view, Mr. Huang, Dean of China Mobile Research Institute, described the impact of "always online service" applications like WeChat. Instead of using technical terms, we will explain in simple vivid phrases. First, mobile QQ, or WeChat, will have their own "request frequency". These requests are sent to the carrier network, to check the re...

   4G,WeChat,Telecom,China     2013-03-25 08:28:59

  Unicode over 60 percent of the web

Computers store every piece of text using a “character encoding,” which gives a number to each character. For example, the byte 61 stands for ‘a’ and 62 stands for ‘b’ in the ASCII encoding, which was launched in 1963. Before the web, computer systems were siloed, and there were hundreds of different encodings. Depending on the encoding, C1 could mean any of ¡, Ё, Ä„, Ħ, ‘, ”, or parts of thousands of characters, from æ to å...

   Unicode,Encoding,Website,Percentage,Statustic     2012-02-07 06:19:34

  SameSite attribute in cookie

Starting from Chrome 51, a new attribute SameSite has been introduced for browser cookie. This attribute is to prevent CSRF attack. Cookie is normally used to store data exchanged between client and server. It frequently stores user login information. If a malicious website can forge a HTTP request with the valid third party website cookie, it may be called a CSRF attack. For example, if a user logins to a bank website your-bank.com, the bank server responds a cookie: Set-Cookie:id=a3fWa; L...

   JAVASCRIPT,COOKIE,SAMESITE,CHROME,CSRF     2019-09-14 04:57:51

  How NOT to teach a computer language

For the past year or so my wife has been taking online classes to get a computer science degree. For most of her classes she’s done great, she’s been flying through HTML and SQL, even up to the point where she can handle multilevel joins and optimizing through indexes. That was until she hit her vb.net class. I had no idea why she was having problems with a language has easy as vb.net so I started helping her out and find out why she was having so many problems. I’ve also ad...

   Programming,Teach,Book,Grade,Method,Computer     2011-11-06 14:52:13

  Chrome time machine : Chrome starts from 0 to 1

Time flies, Chrome has been around us for four years since its birth. The Chrome team launched a Chrome time machine on Google's official blog, you just need a simple click or scroll back and forth with mouse, it will show you what happened to Chrome in last four years. If you find clues hidden between the lines, type a few mysterious characters, you may also be able to find a special birthday gift prepared by Chrome team.Four years, Chrome started from scratch and now it's the No.1 web browser...

   Chrome time machine,4 years     2012-09-05 06:54:05

  Advice on improving your programming skills

Programming is cool. But behind the scenes it's also difficult for many people. Many people are defeated at the early stage of learning programming. When you are not so familiar with programming, you may find you don't know where to start and what to start with first and where to apply the knowledge. Once you go though the tough period of the learning phase, you will find a whole new world. Below are some advice which can help you improve your programming skills quickly. Write more code.  T...

   Programming,Advice     2014-02-21 08:59:04

  How to secure an Ubuntu Apache web server

Securing server software is not a straightforward task. Not all of our operating environments are the same, leading to a variety of potential security vulnerabilities. However, using a few basic configuration and security options, you can stay a little ahead of where you want to be. 1. Fail2ban Fail2ban is a Python-based intrusion prevention software that detects and blocks malicious IP addresses from multiple unsuccessful attempts at software logins. In other words, if someone is attempt...

   Unix server security,Log,.htaccess,Cache     2011-12-27 09:25:32

  9 quotes that stayed with me as a developer

I find quotes inspiring, motivating or sometimes just thought provoking, so here's some of my favourites from over the years. Sometimes reading a book can have a real influence on how you write code, or how you approach a problem. Sometimes a simple quote  is enough to make me question the way I look at the code I'm writing. Or often I sit in awe about someone's so well distilled what I've known internally for ages but have never been able to enunciate.   "Design is finding t...

   Quote,programmer,programming     2011-05-27 03:34:49

  Ensure triggering transitionend event in JavaScript

CSS3 Transition has been widely used in modern web app development to offer users animations. Traditionally animations of element in HTML are controlled by JavaScript. If fancy animation is desired, then third party plugins can be installed in browsers such as Flash, Silverlight, Java Applet etc. With CSS3, animations can be easily achieved like a charm. Transition is one of the many features provided by CSS3. It can be used to transit one element from one state to another state smoothly within ...

   CSS3 TRANSITION, TRANSITIONEND, FORCE FIRE TRANSITIONEND     2015-05-09 08:56:51

  Want Me to Read Your Blog? Do This

It's deceptively easy to maintain traffic once you've scored that initial boost of visitor hits. In fact, one of the greatest determinations of this relies on a single make or break entry.Every blogger knows, if they look at their web analytics at all, that one of the most consistently viewed pages is the biographical entry. If it's linked on the home page or throughout the blog, the audience will invariably stay long enough to read it, at least 25%...

   Web blog,Traffic,About page,Biography     2011-12-05 13:16:37