Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- SHORTCUT KEY



  Why Python is important for you

I believe that Python is important for software development. While there are more powerful languages (e.g. Lisp), faster languages (e.g. C), more used languages (e.g. Java), and weirder languages (e.g. Haskell), Python gets a lot of different things right, and right in a combination that no other language I know of has done so far. It recognises that you’ll spend a lot more time reading code than writing it, and focuses on guiding developers to write readable code. It’s possible to...

   Python,Importance,Paradigm     2012-02-12 04:49:09

  Should a startup focus on good user experience or ship something out quickly?

For a startup, there are always arguments about whether to build a good experience or instead ship something workable out quickly. These two seem contradict with each other and it is usually hard to decide for many startup founders. But in order to win over competitors and gain large portion of market shares as soon as possible, founders must think fast and make their life change decisions. So how should we decide whether we should focus on good user experience or we should ship out the product...

   User experience,Startup     2014-01-20 06:48:28

  Does My Online Business Need Log Aggregation?

Logs crop up all over the place. They are generated by everything from web servers and databases to the firewalls which protect them from breaches. Because logs accumulate in large volumes from all of these different sources, log aggregation is an important process which works to organize and impose order over otherwise disparate log files. That sounds good, but should your online business be eager to jump on the log aggregation bandwagon? Here is a look at the main benefits and considerations t...

   SOFTWARE DESIGN,LOG AGGREGATION     2021-10-12 21:44:39

  Java Concurrency Basics: CountDownLatch and CyclicBarrier

CountDownLatch CountDownLatch can be used in synchronizing behavior among threads, it makes one or more threads wait for some actions in other threads to be completed. It has a property count which defines how many countDown() need to be called before other threads which called await() to be waked up.  When a thread calls CountDownLatch.await(), the thread will be blocked until the value of count becomes 0. The initial value of count can be specified when creating the CountDownLatch instanc...

   JAVA,JAVA CONCURRENCY,COUNTDOWNLATCH,CYCLICBARRIER     2018-03-25 07:02:40

  Remove browse button from input type=file

In Web 2.0 era, many websites will ask the user to upload their avatar when creating their profile. In HTML, the input control we should use is input="file". This is a file control provided by the browser vendor and it should be ran in a sandbox for security consideration. Browsers don't provide ways to choose file from local and upload to the remote server without the input="file" control.  There is one annoying part about the input="file", which is a default button named "Choose File" or...

   file,html,browse,remove browse button     2015-07-12 05:17:51

  20 Database Design Best Practices

Use well defined and consistent names for tables and columns (e.g. School, StudentCourse, CourseID ...).Use singular for table names (i.e. use StudentCourse instead of StudentCourses). Table represents a collection of entities, there is no need for plural names.Don’t use spaces for table names. Otherwise you will have to use ‘{‘, ‘[‘, ‘“’ etc. characters to define tables (i.e. for accesing table Student Course you'll write “Student Cour...

   Database design,20 tips,Well defined name,Design pattern     2012-02-07 12:10:48

  Kubernetes Authentication & Authorization 101

If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αὐθεντικÏŒς authentikos, “real, genuine”, from αὐθέντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...

   RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES     2021-06-05 23:19:18

  Building Security onto Your Mobile Application

Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...

   Web Application Development Company, iPhone App Development Company     2015-08-21 07:22:32

  Stop Designing Pages And Start Designing Flows

For designers, it’s easy to jump right into the design phase of a website before giving the user experience the consideration it deserves. Too often, we prematurely turn our focus to page design and information architecture, when we should focus on the user flows that need to be supported by our designs. It’s time to make the user flows a bigger priority in our design process. Design flows that are tied to clear objectives allow us to create a ...

   Web design,Paradigm,Advice,User experience,Flow     2012-01-05 08:16:18

  What should Microsoft do after Steve Ballmer steps down?

Steve Ballmer decided to retire from Microsoft within 12 months last week. Where should Microsoft head to and what should they do on their products to maintain their influence.Whether you like or hate Ballmer, and regardless of who will replace him as Microsoft new CEO, his voice became a very important part of different Microsoft conferences, Ballmer said : "We need a CEO who will be here longer term for this new direction."Steve Ballmer is criticized for many things. Under his control, Micros...

   Microsoft,CEO,Trend     2013-08-26 07:33:41