Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- WHITEBOARD TEST



  Canonicalize XML in Java

XML canonicalization is often used when there is need to create digital signature to be sent to peers for verification. Since digital signature is created based on XML data, the XML data has to be canonicalized before its signature value can be calculated. Even an extra space may affect the signature value calculated, hence it must follow some rules to canonicalize the XML data so that it has a standard format. This is why W3C created specification Canonical XML Version 1.1. This specificat...

   JAVA,XML,JAVA SECURITY     2016-01-20 01:39:45

  7 big mistakes that make your layout a disaster

Even though the web design field has become a real industry, building a website is part art, part science. The design of a website may attract people but it may also make them run away, it depends on the work of the web designer. The experience, the talent and the capacity of endeavor are the greatest tools of a web designer, a good layout is based on all of these and, besides that, it is a very time consuming activity.Making a good layout is difficult and judging its value is subjective, a desi...

   Web design,Mistakes,Content,White space     2011-11-24 03:36:23

  JShell -- The command line tool to run Java code in Java 9

Java 9 is currently a work-in-progress and is planned to be GAed in March 2017. Quite a few new features will be introduced in the new release. The coolest feature is project Jigsaw which is to modularize the Java packages so that a customized JDK can be built and shipped with only the necessary modules to fulfill their project requirement. Apart from this feature, another big new feature is project Kulla -- JShell. In simple, JShell is a command line tool which can be used to run...

   JAVA 9,JSHELL,KULLA     2016-04-01 21:46:48

  CASSANDRA data model

Cassandra is an open source distributed database, it combines dynamic key/value and column oriented feature of Bigtable. Features of Cassandra are: Flexible schema, no need to design schema first, it's very convenient to add or delete strings Support range search on keys High usability, extensible. The single node error will not affect the cluster. We can think Cassandra's data model as a 4 or 5 dimensional Hash. COLUMN Columns is the smallest data unit in Cassandra, it is a 3 dimensional data...

   Cassandra,database,sort     2013-06-08 22:07:40

  A brief guide to tech internships

Planning to be an Intern in the Bay Area during Summer 2012? Make sure to read an Intern's Guide to the Bay Area, and join the 2012 Facebook group.  (via this guy, via this guy) Joel Spolsky, from the Joel On Software blog and StackOverflow, wrote an article with Advice for Computer Science College Students back in '05. According to Joel,  No matter what you do, get a good summer internship. As such: here’s everything you ever wanted to know about tech inter...

   Internship,Advice,CS student     2012-02-01 04:48:31

  How to Develop a Successful SEO Strategy for Your Startup

SEO is usually viewed as under-the-table formula manipulations and trickery, once actually it’s simply a series of core steps and actions you wish to require, to create your web site rank higher. An economical SEO strategy may be countermined to the subsequent three parts, that create the entire issue look less daunting in spite of everything.   Step 1: On-site Optimization On-site optimization strategy consists of these subsequent elements: Your Content Website Structure Layout of ...

   SEO,MARKETING     2016-03-18 15:33:37

  SQL Injection through HTTP Headers

During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to SQL injection flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever. What about other HTTP header parameters? Aren’t they potential input vectors for SQL injection attacks? How can one test all these HTTP parameters and whic...

   Code security,SQL injection,HTTP header     2012-04-05 11:42:04

  Designing Great API Docs

Writing documentation is one of those things that is dreaded by many developers. It takes a lot of effort and time to get right. And too often, people take shortcuts. This is sad, because well designed documentation is the key to getting people excited about your project, whether it's open source or a developer focused product. In fact, I argue that the most important piece of UX for a developer product isn't the homepage or the sign up process or the SDK download. It's the API documentati...

   API docs,Design API docs,Advice     2012-03-09 23:15:00

  Your Code is My Hell

It occurred to me recently that my experience as a Rails developer may be somewhat unique.I often get brought in to help preexisting Ruby/Rails projects evolve and mature in a sustainable way. As a result, the vast majority of Ruby projects I’ve worked on have been well-established by the time I arrived. In fact, offhand I can only think of one commercial greenfield Ruby project I’ve participated in. All the rest have been “legacy” from my perspective, in the ...

   Code style,Clean code,Code paradigm     2011-09-15 08:39:16

  Python for the Web

Python is the best language in the world for interacting with the web, and I'm going to show you why.This article will give an extremely high level overview of how to use python for the web. There are many ways you can interact with the web using python, and this post will cover all of them. This includes python web scraping, interacting with APIs (Application Programming Interfaces) and running your own python web site using python server software. There are many ways to do all these thing...

   Python,Web,Interaction,Communication,Network     2011-10-19 14:19:11