SEARCH KEYWORD -- User base
Native Client Brings Sandboxed Native Code to Chrome Web Store Apps
Wouldn’t it be great if you could create web apps using your existing C and C++ code? Native Client lets you do just that, and it is now enabled for Chrome Web Store apps in Google Chrome’s beta channel. Native Client apps live on the web platform, so you don’t need to create separate versions of your app for each operating system. Rather than relying on OS-specific APIs, Native Client apps use Pepper, a set of interfaces that provide C and C++ bindings to the capabilities o...
C++,Web application,Native Client,Useful 2011-08-24 02:23:03
Want to make your Eclipse run faster? Try this
Lots of us may find that our Eclipse takes a long time to launch, remember how many times you want to close this heavy machine and shout "F**K". Do you know why Eclipse launches slowly? Is it because we have too many plugins installed or we have created too many projects? No, it's not. Sometimes, it's because we don't have the correct configuration. So where to start? Go to eclipse.ini. First, you may want to add below line in your eclipse.ini configuration file: -Xloggc:gc.log This is to show w...
Eclipse,optimization,speed 2014-06-10 05:31:11
Have you used these JavaScript libraries before?
Are you a vanilla JavaScript developer or a JavaScript library lover? If you are a vanilla JavaScript developer, please feel free to step away silently because you may not get what you want, but if you are a library or framework lover, please bookmark this page as what we list below are what you may use in the future. There are tons of JavaScript libraries created to ease the headache of developers who have to deal with different browsers on different devices. You may use some of them befo...
JavaScript,Framework,Library 2014-09-27 22:06:55
How key-based cache expiration works
There are only two hard things in Computer Science: cache invalidation and naming things — Phil Karlton Doing cache invalidation by hand is an incredibly frustrating and error-prone process. You’re very likely to forget a spot and let stale data get served. That’s enough to turn most people off russian-doll caching structures, like the one we’re using for Basecamp Next. Thankfully there’s a better way. A much better way. It’s called key-based cac...
Cache,Expiration,Key-base cache,Work 2012-02-20 05:32:40
How to write your own DSL in Ruby
DSL(Domain Specific Language) is a language defined to fulfill some domain specific requirements to ease people's work. It can be used to define attributes and actions of a domain easily and cleanly. And it is often created based on some common observations or micro patterns of some domain. In Ruby world, there are quite a few places people can find DSL. For example, Ruby itself, Chef recipes. To create a class in Ruby, the traditional OOP way would look like. class User @name = nil @email =...
Is 99.8% Secure Secure?
A group of researchers (Arjen Lenstra and collaborators from EPFL Lausanne and James Hughes from Palo Alto) published a study, Ron was wrong Whit is right, of new vulnerabilities of cryptosystems. The New York Times picked up the story. Although Lenstra et al discuss several cryptosystems, their results are particularly relevant to those based on RSA. The title mirrors their conviction that cryptosystems based on a single random element have fewe...
Security,Percentage,Security index 2012-02-27 04:48:06
IBM Launches Maqetta HTML5 Tool as Open-Source
IBM announced Maqetta, an HTML5 authoring tool for building desktop and mobile user interfaces, and also announced the contribution of the open-source technology to the Dojo Foundation. LAS VEGAS – At the IBM Impact 2011 conference here, IBM announced both Maqetta as well as the open-source contribution of its Maqetta HTML5 visual authoring tool to the Dojo Foundation. Maqetta is an open-source project that provides WYSIWYG visual authoring of HTML5 user interfaces using drag-and-drop ass...
IBM,Open Source,Dojo foundation,HTML 5,W 2011-04-12 01:59:29
4 ways to obtain access token in OAuth 2.0
OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...
OAUTH2,ACCESS TOKEN,REFRESH TOKEN 2019-06-29 07:12:03
What should video website do besides buying copyright?
Several major video sites in China seem to be designed by the same team, they look the same from the main interface to advertising scheme. The question is whether video sites really do not need to improve their products and user experience in addition to smashing the money to buy the copyright to attract users, is there no other choice? After reading this article, perhaps we can somehow have different views.The Web 2.0 era's video siteIn Web 1.0 era, the main way for users to obtain information...
Video site, Copyright,User experience 2013-03-06 03:15:39
Password-less login
Most websites need user login in order to provide personalized content to visitors. The usual way is to request user to register an user account. Actually, this is not so appealing since if we need to remember one password for each website, it's troublesome, while for developers, it's their responsibility to protect password, once password is leaked, then it's a big headache to a website's business and reputation. So long time ago people started thinking about password-less login, this is a big ...
Password-lesslogin,Authentication 2012-11-05 12:29:55
RECENT
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- more>>