Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Sans-serif



  socket_create() from command prompt with WAMP

Problem:I’m working on a wamp system, and have started playing around with sockets. I enabled sockets via the wamp interface:wamp : PHP settings : PHP extensions : php_socketsand could run my php file via my browser.When trying to run the same file via the command prompt (start : run : cmd), I got the following error:Fatal error: Call to undefined function socket_create() in … on line …Solution:The command prompt uses a different php.ini file to the apache server.The Apac...

   PHP,WAMP,Windows,Command line,Socket     2011-05-30 10:59:14

  How To Build A Site That Looks Great On Every Screen

The responsive design revolution is upon us. With tablet and smartphone use soaring and changing our media habits, Web publishers no longer have a choice but to build designs that work properly on any device or screen size.The hard-working Silicon Valley design firm ZURB has recently released version 2.0 of its responsive design boilerplate kit called Foundation, which is a fundamental framework for a one-size-fits all Web project.Foundation is a CSS and Javascript framework that comes with...

   Website,Design,Device,Screen,Adaptable,Mobile     2011-10-31 10:46:32

  Can private method be overridden?

The private methods are not inherited by subclasses and you cannot be overridden by subclasses. According to Java Language Specification (8.4.8.3 Requirements in Overriding and Hiding), "Note that a private method cannot be hidden or overridden in the technical sense of those terms. This means that a subclass can declare a method with the same signature as a private method in one of its superclasses, and there is no requirement that the return type or throws&nb...

   Java,Private method,overridding,impossib     2011-10-06 03:57:14

  Great code is written twice (or more)

The last couple of years more and more people have been moving towards Agile development. These techniques aren’t new, most we’re devised in the 80s or 90s. But finally these days programmers and (more importantly) business consultants, architects and clients have learned to love and embrace Agile development.Evolving requirementsIt has now become common knowledge that you can’t write down all the requirements before you start the project. These requirements h...

   Twice,Good code,Recoding,Agile,Evolvement     2011-11-01 00:36:35

  Why I left Google

Ok, I relent. Everyone wants to know why I left and answering individually isn’t scaling so here it is, laid out in its long form. Read a little (I get to the punch line in the 3rd paragraph) or read it all. But a warning in advance: there is no drama here, no tell-all, no former colleagues bashed and nothing more than you couldn’t already surmise from what’s happening in the press these days surrounding Google and its attitudes toward user privacy and software develo...

   James Whittaker,Google,Leave,Microsoft,Ad     2012-03-14 13:43:44

  Wow: Intel unveils 1 teraflop chip with 50-plus cores

I thought the prospect of quad-core tablet computers was exciting.Then I saw Intel's latest -- a 1 teraflop chip, with more than 50 cores, that Intel unveiled today, running it on a test machine at the SC11 supercomputing conference in Seattle.That means my kids may take a teraflop laptop to college -- if their grades don't suffer too much having access to 50-core video game consoles.It wasn't that long ago that Intel was boasting about the first supercomputer with sustained 1 teraflop performan...

   Intel,Chip,Multi-core,teraflop     2011-11-16 08:15:39

  Some useful Linux commands for teamwork

A small development team in the intranet will frequently transfer codes, share files. Here are some command we use frequently to release some of our work. They are not applicable to Windows users. 1. Output program execution output through GTalk. Sometimes we may need to send the program execution result and log to teammates for debugging using IM. These outputs are very troublesome to copy and send while in command line mode. So we could have a program called gpipe.py which can put GTalk as a p...

   Linux,NFS,GTalk,HTTP     2013-01-16 04:36:33

  Some measures for improving Linux server security

The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...

   Linux server,Server security     2012-08-21 05:08:50

  Dividing any number By 9, 90, 900 and so on

The technique for Dividing any number by 9 mentally is simply to reduce a complex division to a very simple addition. The technique can be applied from both ends i.e. from right-most digit or from left-most digit. Dividing by 9 into a mixed number from right-most digit uses the Divisibility Rules for 9: 1.     First, add all the digits together and divide by 9, keeping in mind the whole number and the remainder. 2.     Write the remainder o...

   9,90,division,algorithm     2012-03-07 05:15:06

  Difference between keystore and truststore

Security has become a vital concern in most of the online transactions nowadays. Lots of the world's most popular websites have adopted security protocols to transfer data, especially sensitive data. These security protocols including SSL/TLS which are using the private/public key exchange mechanism to establish secure connections.  The private/public key cryptography is a really important invention and it allows data to be transferred securely and solves the big problem of transferrin...

   KEYSTORE,TRUSTSTORE,SECURITY,SSL     2017-03-04 07:52:47