Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Super power



  Tom Uglow from Google : 5 steps to innovation

Google has been known for its innovation In Google there is a "welfare": each employee can spare 20% of his/her time to do what he/she likes to do so that any idea has a chance to be turned into reality. Perhaps this freedom makes Google capable of introducing new products and new ideas continuously. Google China held a small discussion session in its office in Tsinghua Science Park recently, Google Creative Director Tom Uglow shared some experience and cases of Google in production and innovat...

   Innovation,Technology,Google     2012-10-10 20:00:47

  A Solution to CPU-intensive Tasks in IO Loops

Back in October 2011, Ted Dziuba infamously said that Node.js is Cancer.  A provocative title to a provocative article.  The only thing it didn’t really provoke in the commentary was much thought ;)  Zing. My interpretation of the article is that Ted holds up the classic blocking-IO process-per-request (or  thread per request; same difference) model as superior.  Yet we all remember where the blocking-IO forking model got Apache in the early days.  ...

   CPU,Intensive IO loops,Solution,C++     2012-02-06 07:42:40

  Taking Precautions to Avoid Shady VPN Providers

VPNs or virtual private networks are virtual tunnels that obscure your IP address, routing your internet traffic through a server located in a country of your choice, in an encrypted and anonymous way. Using a VPN allows you to: secure your sensitive data from hackers obscure the IP address so you can see content not available in your country avoid websites you routinely surf (e.g., Facebook) noticing a different IP address when you are traveling, and asking you to verify your identity bypass t...

   VPN,NETWORKING     2019-02-19 07:26:26

  Speed Hashing

A given hash uniquely represents a file, or any arbitrary collection of data. At least in theory. This is a 128-bit MD5 hash you're looking at above, so it can represent at most 2128 unique items, or 340 trillion trillion trillion. In reality the usable space is substantially less; you can start seeing significant collisions once you've filled half the space, but half of an impossibly large number is still impossibly large. Back in 2005, I wondered about the difference between a checksum and...

   Speed hashing,Security,MD5     2012-04-07 10:35:15

  #46 – Why software sucks

No one makes bad software on purpose. No benevolent programmer has ever sat down, planning out weeks of work, with the intention of frustrating people and making them cry. Bad software, or bad anything, happens because making things is hard, making good things doubly so. The three things that make it difficult are: Possessing the diverse skills needed not to suck.Understanding who you’re making the thing for.Orchestrating the interplay of skills, egos and constraints over the course of...

   Software design,Sucks,Software industry     2012-03-19 13:10:37

  What is encryption? Its role in the modern age

“Messages and calls are end-to-end encrypted.” If you are a WhatsApp user, you must have read this statement at the top of chats you open. Now, what does it mean? The statement signifies that all the messages or voice notes shared between users are encrypted, and no one can read or listen in on them. As mostly all of us use messaging apps and emails, information security has become a major concern. Moreover, we don’t know how many digital footprints we leave on the web can be t...

   DATA SECURITY,VPN     2021-01-21 08:04:16

  Valid JavaScript variable names

Did you know var π = Math.PI; is syntactically valid JavaScript? I thought this was pretty cool, so I decided to look into which Unicode glyphs are allowed in JavaScript variable names, or identifiers as the ECMAScript specification calls them. Reserved words The ECMAScript 5.1 spec says: An Identifier is an IdentifierName that is not a ReservedWord. The spec describes four groups of reserved words: keywords, future reserved words, null literals and boolean lite...

   JavaScript,Name convention,Standard     2012-02-22 05:16:53

  10 New Year’s resolutions for designers

Get the new year off to a positive start with these design resolutions Wake up. I hope you enjoyed your holiday because it’s a new year and it’s time to get back to work. We did pretty good last year. We started standing up for ourselves. We stopped working for free. We started getting our financial house in order. (Please don’t make me do the contract thing again this year.) We rediscovered typography ...

   Designer,Chanllenge,2012,New UI     2012-01-18 09:11:02

  How The Web Became Just Another Interface to the Cloud

This post is part of our ReadWriteCloud channel, which is dedicated to covering virtualization and cloud computing. The channel is sponsored by Intel and VMware. Read the case study about how Intel Xeon processors and VMware deliver unprecedented reliability in the face of RAM errors.For years, everyone was talking about the convergence of interfaces. The Web, and as a result, the browser, were "clearly" about to take over as the major platforms and cloud computing emerged. Then, in March 2008, ...

   Cloud,Web,Interface,Reason     2011-11-14 02:43:10

  Peculiarities of cloud infrastructure

MarketsandMarkets claims that the cloud computing market is worth more than $545 bln nowadays. Moreover, by Thales, nearly 60% of worldwide commercial data is stored in the cloud today. Nay, under Exploding Topics, about 90% of large companies across the world use cloud infrastructure. So, the mentioned technology is incredibly popular among business owners worldwide presently. However, not so many company holders, as well as managers, know enough about the specified solutions. That's because mo...

   CLOUD INFRASTRUCTURE,DATA STORAGE     2022-12-30 12:00:44