Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- USER EXPERIENCE



  Investment Banking in China — What I’ve Learned & Unlearned

Anyone seeking to succeed in investment banking in China should live by one rule alone: it’s not who you know, but how well you know them. In China, more than any other country where I’ve worked, the professional is also the personal. Comradeship, if not friendship, is always a necessary precondition to doing business together. If you haven’t shared a meal – and more importantly, shared a few hundred laughs – you will never share a business deal. Competence, ex...

   Business,China,Relationship,Cooperation,Advice     2011-11-18 09:13:49

  Multitasking vs multiprogramming

As all these processing are the part of computer functions. You should not be confused between these processes.In computing, multitasking is a method by which multiple tasks are performed by the user also known as processes, share common processing resources such as a CPU. CPU is actively executing more than one task at a time. Multitasking solves the problem by scheduling the tasks instructions. Which task may be the one running at any...

   multitasking,multiprogramming,os,differe     2011-09-22 13:46:30

  Best “must know” open sources to build the new Web

Here the dump of my ultimate collection of online Web development resources and directory, oriented for the Front-End user Interface (UI). HTML5 and all related open standards are moving fast, but for now, building a whole Website/WebApp on top of that can be very inconsistent, especially across various browsers experiences.   So… how to embrace new awesome web technologies ? Now, as Web Developers and Designers, we have to build on top of more stable framework. It’s her...

   Open source,Wbesite,Web application,HTML     2011-06-09 03:10:24

  8 Things To Love & Hate About Outsourcing Employees

What is the dirtiest word in business? Chances are that the word ‘outsourcing’ comes to mind. Many Americans despise it, many business owners shy away from it and many entrepreneurs depend on it. Regardless of what side of the issue you are on, it is important to know that it exists and will continue to exist. Why? Because there are a lot of things to love about outsourcing.As a business owner and tech entrepreneur who exists in a hyper-competitive market, I have used outsourcing to...

   Employee,Outsourcing,Merits,Disadvantage     2011-11-12 10:16:13

  HP To Apple: You Win.

As I write this, I’m sitting in a cafe. Around me, there are five people on laptops — four of them are MacBooks. Four other people are using tablets — all four are iPads. Welcome to the Post-PC world. That phrase was one of the first things that jumped to my mind today when I heard the news that HP was not only killing off their TouchPad and Pre webOS-based products, but also trying to spin-off their PC business. The largest PC busine...

   HP,Apple,Palm,Competition,webOs     2011-08-19 07:38:41

  php://input in PHP

When using xml-rpc, server side will get the data from client with php://input method instead of $_POST. Hence today we will discuss php://input. PHP official manual has below explanation to php://input: “php://input allows you to read raw POST data. It is a less memory intensive alternative to $HTTP_RAW_POST_DATA and does not need any special php.ini directives. php://input is not available with enctype=”multipart/form-data”. Here we und...

   php://input, IO, input     2013-02-25 20:43:00

  Should All Web Traffic Be Encrypted?

The prevalence of free, open WiFi has made it rather easy for a WiFi eavesdropper to steal your identity cookie for the websites you visit while you're connected to that WiFi access point. This is something I talked about in Breaking the Web's Cookie Jar. It's difficult to fix without making major changes to the web's infrastructure. In the year since I wrote that, a number of major websites have "solved" the WiFi eavesdropping problem by either making encrypted HTTPS web traffic an accou...

   Web traffic,Security,HTTPS.Encryption,Wifi     2012-02-24 05:02:58

  Android Tutorial: Creating and Using an SD Card in the Emulator

In a previous post, I mentioned how user-friendly Android is for developers. There’s extensive documentation and information on the architecture, the different components and best practices. However, the documentation has a few blind spots. Many of the tools have little documentation and no usage examples. The information is there, it’s just hidden behind a few layers of Android theory.So I’m going to try and document a few of the basic things that you’ll probabl...

   Android,Emulator,SDCard,Load,Create     2011-04-13 12:08:41

  Overlap Detection

How does one detect when two strings overlap? In the case below, the four-letter suffix of string 1 matches the four-letter prefix of string 2. 1: "Fire at Will" 2: "William Riker is number one" Sometimes there are several matches; finding the longest is not always straight forward. 1: "Have some CoCo and CoCo" 2: "CoCo and CoCo is here." 2: "CoCo and CoCo is here." 2: "CoCo and CoCo is here." The naïve solution is to take...

   String overlap,detection,python,implementation     2012-03-05 05:05:36

  Why Javascript is a Joy

I’m probably a bit biased – being a front-end web developer for a few years will do that – but I really enjoy writing Javascript. I’ve recently retreated from pure coding the last few months, but I got an opportunity this past week to jump back into some tasks, and it has reminded me how fun it is to dive into our[1] front-end codebase. Yes, Javascript can be surprisingly elegant yet completely infuriating, and all on the same line of code; for a long time, ...

   JavaScript,Speed,Simplicity,Malleable     2012-03-26 15:00:31