Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Tools



  New CSS3 Properties to Handle Text and Word Wrapping

About a year and a half ago, I wrote about CSS3′s word-wrap property. The angle of the article was the fact that it was a feature that was new in CSS3 that didn’t exist in CSS2.1 and it worked in just about every browser, including old IE. Well, now that’s all changed, which I discovered while researching additions to my CSS3 Click Chart. The word-wrap property has been removed from the CSS3 spec and other related properties have been added. Text-Wrap The text-wrap proper...

   CSS3,Word wrap,Overflow-Wrap,Line-Break     2012-01-30 05:58:41

  The craziest Javascript implementations

Since its birth in 1994, Javascript has come a long way. Today it’s one of the most popular programming languages on the web because of high popularity of AJAX based web-applications. Also the rise of micro-frameworks such as jQuery (also Prototype, Moo Tools etc) which have reduced dramatically the complexity of code developers needed to write, it is well tested, has a ton of plug-ins, has a large development community and reduced development time.And lately even Server-S...

   JavaScript,Crazy implementation,JVM,Turing machine     2012-01-03 12:09:42

  How Java Application Developers Can Build Secure Internet Based Apps?

There are few compiled solution tested by experts to guide Java application development and maintenance team how they can start safe journey on Internet. Strong encryption, wise passwords, secure hardware are few of the tech tools that should be used by Java app development team to secure their Internet based apps.   The Internet is most amazing yet most risky platform where nobody knows either they are doing safe transaction on Internet or there is some dog watching out for data packets t...

   JAVA APPLICATION MAINTENANCE,JAVA APPLICATION DEVELOPMENT     2015-09-16 02:13:17

  Silicon Valley engineers have something to say about work from home

Quitting from Google and joined Yahoo which was thought as a declining giant, Marissa Mayer has been trying to prove that she has the ability to lead this Internet giant to reverse the decline. In order to boost the low morale of the employees, Meyer tried to transplant Google's work culture to Yahoo with office decoration, free lunch and issuance of smart phones, these generous measures let her win the applause of the Silicon Valley.But a recent ban issued by Meyer has attracted a lot of contro...

   Work from home,Yahoo, Marissa Mayer     2013-03-07 02:39:23

  Lessons Learned About Documentation

Here at Kendo UI, we have always encouraged you to give us feedback.  Whether it’s through our forums, or the Kendo UI User Voice site, what you think is important to us.  We take your thoughts very seriously.  We receive a lot of feature requests, enhancement requests and other various pieces of product feedback. One of the things that we heard loud and clear from our users was that our documentation could be better.  We took a good look at what we had, and we ag...

   Documentation,Lessons,Programming     2012-02-15 05:53:28

  4 ways to obtain access token in OAuth 2.0

OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...

   OAUTH2,ACCESS TOKEN,REFRESH TOKEN     2019-06-29 07:12:03

  5 Things You Can Do to Protect Your Data

The average cost of a data breach is $148 per record. Records include everything from personal addresses to birthdates to even more sensitive data, like Social Security Numbers and business files. Each year, these hacks cumulatively cost billions of dollars to companies and individual users. Nonetheless, like many other criminals, hackers tend to prey on easy targets. By following these essential steps, you’ll be able to ensure your data is always kept safe. 1) Use a File Encryption Servic...

   DATA SECURITY     2019-08-20 08:35:54

  The Best Laptops for Freelancers

Whether you’re answering emails, beating a deadline, or looking for even more freelance gigs, many professionals simply can’t imagine their career without a laptop. It has become the ultimate work gadget of the 21st century, which many laptops now powerful enough to be used like a PC. However, not all freelancers are the same—and as such, require different tools to get the job done. That being said, here are some of the best laptops for every kind of freelancer imaginable. Best...

   APPLE,COMPUTER,HP,LAPTOP     2020-03-04 07:58:12

  Man Survives Steve Ballmer’s Flying Chair To Build ’21st Century Linux’

Mark Lucovsky, famous for building Windows NT and watching Steve Ballmer throw a chair.Mark Lucovsky was the other man in the room when Steve Ballmer threw his chair and called Eric Schmidt a “fucking pussy.”Yes, the story is true. At least according to Lucovsky. Microsoft calls it a “gross exaggeration,” but Lucovsky says that when he walked into Ballmer’s office and told the Microsoft CEO he was leaving the company for Google, Ballmer picked up his chai...

   VMWare,Founder,Mark Lucovsky,Microsoft,Google,Cloud Foundry     2011-11-25 03:00:39

  The details and analysis of capturing gRPC packets

Introduction If you're only using gRPC at the application layer, I believe studying the examples on the gRPC official website is sufficient. However, when planning to extensively use gRPC within a team, you will face many challenges, such as authentication schemes between services, routing solutions for multi-region services, and compatibility solutions with existing RESTful services. I recently realized that applying a technology stack requires mastering a wealth of information about that stack...

   GRPC,GOOGLE     2024-01-14 05:59:13