Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- TARGET BLANK



  5 tips for developing HTML5 mobile games

Previously at Creat Studios, Vivendi Games Mobile and JAMDAT, amongst others, Scott brings eighteen years of industry experience to MocoSpace. He heads the company's internal game studio.We've all witnessed the growth of mobile and social gaming over the past two years: the two genres have continued to evolve independently, while also coming together and embracing the power of HTML5.Mobile browser-based social games have found an audience and are thriving.This new gaming category draws from the ...

   HTML5,Mobile,Game design,Tips,Mobile dev     2011-09-05 08:15:09

  Different types of keystore in Java -- PKCS12

PKCS12 is an active file format for storing cryptography objects as a single file. It can be used to store secret key, private key and certificate.It is a standardized format published by RSA Laboratories which means it can be used not only in Java but also in other libraries in C, C++ or C# etc. This file format is frequently used to import and export entries from or to other keystore types. Next we will explain the operations which can be performed on PKCS12 keystore. Create PKCS12 keystore Be...

   Java, PKCS12, keystore, tutorial     2015-01-04 21:08:49

  Processing Unicode Data in Python - A Primer to Understand Non-English Data Processing

Introduction: Currently we live in a world where people of diverse cultures/backgrounds use electronic devices to express their ideas, do their daily work that earns them their daily bread, and entertain themselves using content that is created using their own language and so on. Naturally, in order to make all these things happen, any computational instrument, be it a laptop or a desktop computer, or a smartphone, or something else, should be capable enough to serve all of these things in a man...

   PYTHON,UNICODE,UTF-8,NON-ENGLISH DATA,ASCII CODE     2019-04-10 00:55:19

  Hackers vs. Coders

Photo Credit: Pranav MistryBeing a good hacker is an invaluable skill. But is being a coder the same as being a hacker? Is it possible that coders are at a creative disadvantage to hackers who don’t know how to code?Here’s a story that helped me see the difference.I was recently invited to mentor at Startup Weekend. On Friday night, we gathered to eat pizza, pitch ideas, create teams and discuss launch plans. At the end of the day, everyone was feeling great about what theyâ...

   Hacker,Coder,Comparison,Innovation     2011-05-11 02:11:09

  SSH Security and You - /bin/false is *not* security

Backstory While at RIT around 2004 or 2005, I discovered that a few important machines at the datacenter allowed all students, faculty, and staff to authenticate against them via ssh. Everyone's shells appear to be set to /bin/false (or some derivative) on said machines, so the only thing you'll see after you authenticate is the login banner and your connection will close. I thought to myself, "Fine, no shell for me. I wonder if port forwarding works?" ...

   Linux,Security,/bin/false,SSH     2012-02-06 07:46:29

  Becoming a Better Developer Part 3: Enjoy the Panorama

If you're trying to grow your startup you've come to the right place. Get my 170-page ebook on how to grow a startup and join thousands of self-funded entrepreneurs by subscribing to my newsletter at right. I’m writing this while sitting on a beach chair overlooking the Gulf of Guinea near Cape Coast in Ghana, West Africa. Although it’s slightly overcast the view is amazing, with whitewater stretching out in both directions as far as my laser-corrected eyes can see. Bein...

   Developer,Tips     2011-06-29 08:41:33

  What can CSS :has pseudo class be used for?

CSS's :has is a pseudo-class representing an element if any of the selectors passed as parameters matching at least one element. From the name, it's also easy to understand how it matches elements. The syntax is pretty easy as well: :has([some-selector]) With this pseudo class, it can do lots of things which previously would be challenging or need tweaking the DOM elements with JavaScript. This post will demonstrate what :has can be used for. Introduction Below are a few simple ex...

   CSS,:HAS,:NOT,PSEUDO CLASS     2022-09-18 01:40:54

  The future of IT will be reduced to three kinds of jobs

Takeaway: The IT profession and the IT job market are in the midst of seismic changes that are going to shift the focus to three types of jobs. There’s a general anxiety that has settled over much of the IT profession in recent years. It’s a stark contrast to the situation just over a decade ago. At the end of the 1990s, IT pros were the belles of the ball. The IT labor shortage regularly made headlines and IT pros were able to command excellent salar...

   IT,Potential,Consultant,Developer,Projec     2011-07-27 08:46:59

  Why programmers work at night

A popular saying goes that Programmers are machines that turn caffeine into code. And sure enough, ask a random programmer when they do their best work and there’s a high chance they will admit to a lot of late nights. Some earlier, some later. A popular trend is to get up at 4am and get some work done before the day’s craziness begins. Others like going to bed at 4am. At the gist of all this is avoiding distractions. But you could just lock the door, what’s so special a...

   Programmer,Sleep,Later,Efficiency,Habit     2011-12-16 10:13:27

  The Story of W&L: China’s Great Internet Divide

Here’s an introductory quote from The Story of W&L, a tale of China’s great internet divide: China does not have one so-called “national internet,” instead there’s a great divide. It encompasses the elite with ThinkPad laptops and also the grassroots with MTK Shanzhai mobile phones. Our elites are on par with America, while our grassroots are on par with Vietnam. This is the story of W&L, two representatives of China’s great internet divide. T...

   China,Internet divide,Elite,Grassroot,Laptop,Mobile phone     2011-12-05 12:23:56