Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Software industry



  Sequencing the Startup DNA on LinkedIn

What makes entrepreneurs different, and where do they come from? Are they born or taught? Are they unusually mobile in their careers? Does geography play a role? Do mentors and relationships matter?Numerous studies explore these questions by surveying hundreds of entrepreneurs. At LinkedIn, we take a different approach, on a different scale. By sifting through more than 120 million public profiles, we can analyze tens of thousands of startup founders’ [1]profiles – and find co...

   Startup,Linkedin,Experience,Tips,DNA,Seq     2011-09-07 10:38:58

  Data Scientists and Their Harder Skills than Big Data

The field of data science is often confused with that of big data. Data science is an aid to decision makers in a company with a logical approach.  Who is a Data Scientist?  A Data Scientist reviews a huge collection of data(that may extend to a couple of terabytes of disk space or thousands of excel sheets). This humongous chunk of data is not feasible for being handled, sorted and analyzed by a single person. Here we require the help of data science, and most recently, the field of A...

   BIG DATA     2017-12-13 04:22:55

  Bionic Office

Well. That took rather longer than expected. We have, finally, moved, into the new Fog Creek office at 535 8th Avenue, officially ten months after I started pounding the pavement looking for a replacement for my grandmother's old brownstone where we spent our first few years, working from bedrooms and the garden. Most software managers know what good office space would be like, and they know they don't have it, and can't have it. Office space seems to be the one thing that nobody can get rig...

   Work place,Life,Office,Confortable     2012-01-18 09:00:55

  The Death of File Sharing

Last week’s violent government attack on the hugely popular site Megaupload — the U.S. government arresting Belgian citizens in New Zealand, of all places, and stealing at gunpoint servers bank accounts and property — has sent shock waves through the entire digital world. The first shock was the realization that the gigantic protest against legislative moves (SOPA and PIPA) that would smash the Internet turned out to be superfluous. The thing everyone wanted to prevent is al...

   File sharing,Death,Trend,Cloud     2012-02-01 04:44:06

  App's user value doesn't necessarily bring business value

There is an old saying in Internet world, you can get business value as long as you can achieve user value. Is this statement outdated in mobile Internet era? This statement originated from PC Internet era, but now the time users spend on PC drops and user behavior tends to be stable and conservative. In contrast, people are more willing to stay on mobile devices. The difference between PC and mobile is that users are freely to move around on PC end. People can navigate from one link to another ...

   App,Business value,User value     2013-06-25 10:52:12

  How to prevent next HeartBleed bug?

How to ensure the security of open source projects is a concern for many open source users including individual users and companies. But it's not an easy task to ensure the security of open source projects. Because everyone can see the source code, there is much higher possibility that a bug may be found by someone. Once a bug is disclosed, people may exploit it and do evil things, this may cause loss of money either for individuals or companies, some of the bugs may even have big impact to the...

   Open source,HeartBleed,Security     2014-04-24 09:07:05

  Apple says goodbye to Google

Apple released many new products and new software in this year's WWDC.They include the new MacBook Air, the new MacBook Pro, iOS6 and more. Among them, the Apple's new map app may get the attention of people who love or hate Google. In iOS6, Apple ruled out Google map, they are saying goodbye to Google. This new Map app integrated with Siri will have voice navigation feature. This means people can receive real time traffic update and the map can offer alternate routes. Also, it will be a 3D map ...

   Apple, Google,Map, Adobe     2012-06-12 05:38:56

  3 Most Popular Ways Hackers Steal Your Phone Data – Stay Safe

Our mobile devices store personal information, including passwords, usernames, birthdates, financial information, social security numbers, PIN, etc. Hence, this makes hacking a mobile phone an attractive option for hackers and scammers. There are various techniques that hackers use to spy on a mobile phone for personal information. Also, stalkers can make use of spy apps and malicious software to spy on unsuspecting people. Mobile phones are not secure because these devices connect to other net...

   TECH     2019-11-29 00:29:40

  Remote execute command in Java example

Frequently there is a need to logon to a remote system and run some commands or programs to get the output, many software can serve this purpose such as putty and gitshell.These software usually provide secure access to the remote system. But have you ever wondered what to do if you need to run commands on many different systems at the same time and get all these results back at a single place? Especially in big data era, many tasks may run on different distributed systems and you want o have a ...

   JSch, Example, Distributed system, SSH2     2014-12-12 03:20:19

  What is the Best Laptop for an Engineering Student?

There are a wide range of engineering degrees out there, reflecting the variety of specialties that an engineer can pursue in their professional lives. Engineering is definitely a solid career choice, and there is a specialty to appeal to anybody. You will, of course, need to learn to love math, as that will be at the heart of any engineering degree. But, no matter what type of engineering degree you are studying for, you will need a laptop to do your work on. In fact, depending on the engineeri...

   PROMOTION,LAPTOP     2019-06-19 08:50:22