SEARCH KEYWORD -- SECRET REPOSITORY
Open Source (Almost) Everything
When Chris and I first started working on GitHub in late 2007, we split the work into two parts. Chris worked on the Rails app and I worked on Grit, the first ever Git bindings for Ruby. After six months of development, Grit had become complete enough to power GitHub during our public launch of the site and we were faced with an interesting question:Should we open source Grit or keep it proprietary?Keeping it private would provide a higher hurdle for competing Ruby-based Git hosting sites, givin...
Open source,Benefits,Popularity,Advertisement,Advantage 2011-11-23 07:58:15
The Problem With Client-Side Analytics
Client-side analytics is broken. The numbers produced by it are trivially spoofable by competitors and nefarious characters. Most websites use client-side analytics of one type or another and the only way to get numbers you can trust is to compare numbers from multiple providers and to take an average of the closest two.This post highlights the problem and proposes a partial solution that substantially mitigates the issues with minimal effort. Our proposed solution is simply to include a digital...
Client side,Analysis,Problem,Tricks,ASP.NET,spoof 2011-10-22 12:58:51
Kubernetes Authentication & Authorization 101
If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αá½θεντικÏŒς authentikos, “real, genuine”, from αá½θÎντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...
RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES 2021-06-05 23:19:18
Should All Web Traffic Be Encrypted?
The prevalence of free, open WiFi has made it rather easy for a WiFi eavesdropper to steal your identity cookie for the websites you visit while you're connected to that WiFi access point. This is something I talked about in Breaking the Web's Cookie Jar. It's difficult to fix without making major changes to the web's infrastructure. In the year since I wrote that, a number of major websites have "solved" the WiFi eavesdropping problem by either making encrypted HTTPS web traffic an accou...
Web traffic,Security,HTTPS.Encryption,Wifi 2012-02-24 05:02:58
When a CA becomes untrustable
Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...
APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN 2016-10-01 23:03:44
XMLHttpRequest Level 2 user guide
XMLHttpRequest is a web browser interface, it makes it possible for JavaScript doing HTTP(s) communication. Microsoft's IE5 first introduced XMLHttpRequest, because it's so useful that many other browsers also adopted this. AJAX came to the front since. However, this interface is not standardized, implementation among different browsers is different, with the emerging of HTML5, W3C is considering to standardize this interface. In February 2008, they proposed a XMLHttpRequest Level 2 draft. This ...
XMLHttpRequest, progress, upload, binary data 2012-09-19 11:51:50
10 Points about Java heap memory
When I started java programming I didn't know what is java heap or what is heap space in Java, I was even not aware of where does object in Java gets created, it’s when I started doing professional programming I came across error java.lang.outofmemoryerror then I realized What is Heap in Java or Java Heap Space. Its happens with most of programmer because learning language is easy but learning basics is difficult since there is no formal process which can teach you every basics of pro...
Java,Heap memory,Tips 2012-02-20 05:38:06
What It’s Really Like to Work at Google
Google. It’s one of the most common household words in today’s modern society, and yet for a company that is used by most of us essentially as an algorithm, it tends to trigger a highly emotional response when overheard. It’s a dream job for college students nearing graduation, a highly coveted invitation to lunch by friends and colleagues who work near campus, and the bane of existence for those who produce content for the Internet. For several years, most of the publ...
I hate cut-and-paste
Me, I blame the IDE's.Coding used to be hard. Not because programming itself was overly hard, but mostly because editors absolutely sucked. How much the typical development environment in the 70's and 80's sucked is hard to convey (except for a very lucky few, and those would have likely been using DEC and WANG gear). I got in on the tail end of the punch card era. Punching your own program is lots of fun. Once. And if you drop a deck you get to play with the sorter, which is also lots of fun (o...
IDE,Editor,Cut and paste,Shortcut,Blame 2011-10-24 11:33:46
Pros and cons of 6 most popular test automation frameworks
Not everyone dappling into systems for test automation knows how to leverage the maximum benefit and keep them going in top shape for a long time. That's where test automation frameworks come in – they're basically sets of rules, standards, protocols and guidelines which can be incorporated into practice or simply followed to provide beneficial execution environments for automation test scripts. Why are test automation frameworks important? Test automation frameworks offer m...
RECENT
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- more>>