SEARCH KEYWORD -- Stop
Is Shared Hosting Secure?
Shared hosting is incredibly popular with users who are looking for the cheapest hosting available – the problem is that along with the low price you get poor performance and even more concerning – questionable security. When running on a shared host dozens if not hundreds of other sites are running on the same servers – this means any single security flaw in any of those applications can compromise the entire server. This dramatically increases the odds of your ...
Shared hosting,Virtual host,Security,Data security 2012-02-14 10:48:59
Webinar Best Practices For A Webinar Experience Your Audience Will Love
The web conferencing technology has been getting a lot of attention lately, and for good reason. With global lockdowns and social distancing norms in effect, video conferencing has emerged as an economical way of staying in touch with office colleagues, friends, and family members. However, if that’s all you are using this technology for, you may not fully understand what is web conferencing and its immense potential. For instance, lately, web conferencing technology is being used to deliv...
WEB CONFERENCE,WEBINAR 2020-11-07 04:19:52
Building a Modern Web Stack for the Real-time Web
The web is evolving. After a few years of iteration the WebSockets spec is finally here (RFC 6455), and as of late 2011 both Chrome and Firefox are SPDY capable. These additions are much more than just "enhancing AJAX", as we now have true real-time communication in the browser: stream multiplexing, flow control, framing, and significant latency and performance improvements. Now, we just need to drag our "back office" - our web frontends, app servers, and everything in between into this cen...
Web design,Real-time web,web stack 2012-02-15 05:54:41
What should video website do besides buying copyright?
Several major video sites in China seem to be designed by the same team, they look the same from the main interface to advertising scheme. The question is whether video sites really do not need to improve their products and user experience in addition to smashing the money to buy the copyright to attract users, is there no other choice? After reading this article, perhaps we can somehow have different views.The Web 2.0 era's video siteIn Web 1.0 era, the main way for users to obtain information...
Video site, Copyright,User experience 2013-03-06 03:15:39
Useful git commands in daily work
In a developer's daily work, it is frequent to see lots of commits made. It would be a headache if one cannot use git commands well especially when in cases where some fixes need to be made on existing branches. There are some frequently used command such as git pull, git merge and git push. Apart from these, there are some other practical commands which may be useful for real use cases. This post will try to list some of them. git grep It will lists all files containing the searched keywo...
GIT,GIT COMMAND,GIT LOG 2022-05-01 03:17:15
Games don’t need to be social
Social games have been a big trend in recent years. Zynga struck it big and now everyone else is trying to emulate them. Unfortunately, the first thing that pops into anyones head when a Zynga game is mentioned is Facebook. Facebook is the platform upon which their success stories like FarmVille were built, but it’s not the reason for their success.Zyngas games work because they are fun. The social connectivity is merely a mechanism to share your enjoyment of the game with other...
Game,Social,No need,Game design 2011-10-29 07:15:34
What's on your Learning List?
How do you track and decide what topics you want to spend time learning? For a while, I didn’t have a real good solution. Something would trigger me to remember “Oh yeah! I really wanted to learn more about thatâ€. I would spend the evening doing busy learning - it seemed like I was learning but I really wasn’t. Instead of trying to do Deliberate Practice, I’d fool myself into thinking I was investing my time wisely by reading blog posts and examples but no...
Learning list,Conscious,Study,Programming 2011-12-05 12:44:39
Access control in Java -- doPrivileged
Previously we have introduced how Java performs permission check to protect resource access. What if sometimes we need to give some class the temporary access to some resource which it initially doesn't have? AccessController provides six doPrivileged methods to fulfill this requirement. These six methods have below signatures : static T doPrivileged(PrivilegedAction action)static T doPrivileged(PrivilegedAction action, AccessControlContext context)static T doPrivileged(PrivilegedExceptionA...
JAVA,SECURITY,DOPRIVILEGED 2016-03-08 05:46:42
The seven rules of Unobtrusive JavaScript
I've found the following rules over the years developing, teaching and implementing JavaScript in an unobtrusive manner. They have specifically been the outline of a workshop on unobtrusive JavaScript for the Paris Web conference 2007 in Paris, France. I hope that they help you understand a bit why it is a good idea to plan and execute your JavaScript in this way. It has helped me deliver products faster, with much higher quality and a lot easier maintenance. 1. Do no...
JavaScript,Feature,Tips 2012-01-18 08:21:39
Debunking the Google Interview Myth
Years ago, rumors used to circulate about Microsoft interviews. They were the hot, new company that everyone wanted to work. With envy came the urban myths. These rumors have since been transfered to Google, and will surely be transfered to some new company in due time. Bloggers – always desperate for links and traffic – have capitalized on this, with scary articles about their “nightmare interview†and “crazy questions“. Let’...
Google,Microsoft,Business insider,Interv 2011-04-26 10:09:53
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>