Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- USER RESEARCH



  Life in Apple design team

While in mentioning about Apple, everyone of us will think of the amazing products shipped out by Apple such as iPhone and iPad. We are all impressed by its smooth design and handy user experience. But as a outsider do you know the story behind the amazing design of Apple? Apple has a team of world class designers and they are leading the fashion of design. What's the life in Apple's design team? Ben Williamson from Apple shared one story of him which can give us some hints on what the life is ...

   Apple,Design,Perfect     2014-01-02 07:00:27

  Why Do So Many Gifted Kids Think They Don't like Math?

Why do so many bright and gifted kids think they don't like math? Experience and the reading of lots of research leads me to believe that boredom, under-instruction and poor instruction throughout elementary and middle school lie behind the problem. My best girlfriend since high school is a math teacher north of Philly. We've talked about this a lot. She and I are both aware that our own math instruction lacked a lot. As I give IQ tests, too, I see something that I thought many people woul...

   Bright kids,Math,Hate,Gifted,Boring     2011-12-06 09:00:49

  Frequently used Git commands

Git configuration git config --global user.name "robbin" git config --global user.email "fankai@gmail.com" git config --global color.ui true git config --global alias.co checkout git config --global alias.ci commit git config --global alias.st status git config --global alias.br branch git config --global core.editor "mate -w" # Configure Editor to use textmate git config -l #List all configurations User's git configuration file : ~/.gitconfig Frequently used Git commands Check、add...

   Git,Command     2013-03-11 19:41:06

  What are your list of must know programming proverbs?

It is in fact a good list of proverbs and here are some of the frequently seen programming proverbs. Keep It Simple Stupid Don’t Repeat Yourself A clever person solves a problem. A wise person avoids it – Einstein Silence is construed as approval  ( Picked from Kevin blog ) There is no smoke without fire Think first, Program later Never assume the computer assumes anything Don't trust anything from the user input Do you have any favorite of the programming proverbs? ...

   PROGRAMMING,TIPS     2011-07-01 07:00:56

  A trap in PDOStatement::bindParam

First, let's check out below codes: <?php $dbh = new PDO('mysql:host=localhost;dbname=test', "test"); $query = <<prepare($query); $bind_params = array(':username' => "laruence", ':password' => "weibo"); foreach( $bind_params as $key => $value ){ $statement->bindParam($key, $value); } $statement->execute(); What is the SQL executed finally? Is there any problem with above codes? Many people may think the query executed is : INSERT INTO `user` (`username`, `password...

   PHP,Trap,bindParam     2013-08-29 10:48:55

  The war with spam comment

Spam comments are annoying and notorious. They are either malicious data from hackers to exploit the loopholes of the site or advertisements posted by robots. These kinds of comments have their own features and patterns, if we are careful enough, we can find ways to block most of them although it's not so easy. To block the comment with malicious executable codes such as JavaScript, we should remember one rule : never trust user input. So wherever there are user inputs, we need to check the vali...

   Spam comment,Block,Filter     2013-11-29 20:29:43

  How to apply Domain Level Group Policy

As a system administrator, you may often need to create a Windows domain of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database (called a directory service). Also one or more domain controllers need to be deployed to enable managing the domain. In this post, we will show you how to apply Domain Level Group Policy. There are lots of posts which have covered how to promote a Windows server to a Domain Controller. ...

   Group Policy,Domain Controller,Account Policy, GPO     2015-03-19 03:46:34

  Building Security onto Your Mobile Application

Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...

   Web Application Development Company, iPhone App Development Company     2015-08-21 07:22:32

  Those famous Emacs users

I don't think using Emacs can improve one's programming skills, I don't think some famous people used Emacs before can provide something, either. But these famous people encouraged me to learn Emacs when I wanted to give it up. Here I created a list of famous Emacs users. Most of people in this list are not famous because they developed or used Emacs, but they are famous and also use Emacs. Joe Armstrong -- Erlang's author In The Setup, Joe mentioned that "I write books using XML markup in emacs...

   Emacs,History     2013-07-28 21:36:09

  Open source code libraries suffer from vulnerabilities

A study of how 31 popular open source code libraries were downloaded over the past 12 months found that more than a third of the 1,261 versions of these libraries had a known vulnerability and about a quarter of the downloads were tainted. The study was undertaken by Aspect Security, which evaluates software for vulnerabilities, with Sonatype, a firm that provides a central repository housing more than 300,000 libraries for downloading open source components and gets 4 billion requests pe...

   Open source,Security,Vulnerability     2012-03-28 06:10:19