Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Web Application Development Company



  Why email is crucial to Google, Microsoft and Yahoo

Google, Microsoft and Yahoo. These three companies rule webmail withGmail, Hotmail and Yahoo Mail, the three largest email services on the Internet.What might escape a lot of people, though, is just how important email services are for the online presence of those companies (yes, even for Google). To give you an idea, let’s look at some rather interesting website traffic numbers.Webmail share of site trafficAlexa can give you an estimate of how many peop...

   Gmail,Yahoo,Hotmail,Important,Email,Stat     2011-05-27 12:44:05

  Automatically Updating Charts for Additional Data in Excel

Excel shines at turning your data into charts—graphical representations of your data. You can easily create a chart based on a range of data in a worksheet. Normally, if you add additional data to your range, you will need to once again create the chart or at best change the range of cells on which the chart is based. If you get tired of modifying charts to refer to new data ranges, there are a couple of shortcuts you can try out. The first shortcut works fine if you simply need to...

   Excel,Graph,Auto update,New data,Automat     2011-08-13 04:36:53

  A walk through of different ways accessing Kubernetes application

When a web application is deployed on KUbernetes, to access the application, there must be some set up needs to be done so that external users can access the resource within the Kubernetes clusters. IN this post, we will walk through different ways to access application from outside. Before exploring different ways, let's set up a simple nginx eb application which will just serve the nginx welcome message when loading. # deployment.yaml apiVersion: apps/v1 kind: Deployment metadata: name: ngin...

   KUBERNETES,PORT FORWARD,SERVICE,CLUSTERIP,NODEPORT,LOADBALANCER,INGRESS     2021-05-31 00:20:27

  FONT SIZING WITH REM

Determining a unit of measurement to size our text can be a topic of heated debate, even in this day and age. Unfortunately, there are still various pros and cons that make the various techniques less desirable. It's just a matter of which less-desirable is most desirable.There are two main techniques that are extolled:Size with pxSize with emLet's review these two approaches before I reveal the magical third.Sizing with pxIn the early days of the web, we used pixels to size our text. It's relia...

   CSS3,Font size,Rem,Font,Html5     2011-09-20 12:42:42

  What can CSS :has pseudo class be used for?

CSS's :has is a pseudo-class representing an element if any of the selectors passed as parameters matching at least one element. From the name, it's also easy to understand how it matches elements. The syntax is pretty easy as well: :has([some-selector]) With this pseudo class, it can do lots of things which previously would be challenging or need tweaking the DOM elements with JavaScript. This post will demonstrate what :has can be used for. Introduction Below are a few simple ex...

   CSS,:HAS,:NOT,PSEUDO CLASS     2022-09-18 01:40:54

  Parallel Javascript

Lately the ideas for a parallel, shared memory JavaScript have begun to take shape. I’ve been discussing with various JavaScript luminaries and it seems like a design is starting to emerge. This post serves as a documentation of the basic ideas; I’m sure the details will change as we go along. User Model The model is that a JavaScript worker (the “parent”) may spawn a number of child tasks (the “children”). The parent is suspended while the children exe...

   Parallel JavaScript,API,Spawn,Parent,Task     2012-01-11 12:02:00

  The Greatest Hacks of All Time

Reader's advisory: Wired News has been unable to confirm some sources for a number of stories written by this author. If you have any information about sources cited in this article, please send an e-mail to sourceinfo[AT]wired.com. In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company. With another noi...

   Hack,Greatest,All time     2012-02-29 05:05:42

  Programming Language Readability

Lets compare some Python to Haskell for solving the same problem.  The problem we’ll pick is Trie data-structure for auto-completions.  We are interested not so much in the nitty gritty of the algorithm, but in the language style itself.  Auto-complete has been in the programming news a lot recently; both a Python and a Haskell solver have turned up. (I suspect this post got flagged on Hacker News :(  It never got on the front-page despite the rapid upvoting on a n...

   Programming,Readability,Python,Haskell     2012-02-27 04:52:02

  The 10 Greatest Hacks of My Life

My co-founder and I briefly considered applying to YCombinator for the Winter 2012 session. We eventually decided to bootstrap Curvio initially, and raise a seed round on our own after we launch (so far so good!). But looking over the YC application, one question intrigued me:Please tell us about the time you, tansey, most successfully hacked some (non-computer) system to your advantage.Now, there are a lot of ways to interpret this. A mechanical interpretation would be about...

   Hack,Most important,Example,Curvio     2011-10-22 12:47:42

  What I learned from a month of blogging and 250k visits

Roughly a month ago, I decided to give blogging another try, in earnest. I put out an article most days and up to 3 per day when I was experimenting with new channels.It has been fascinating.That being said, this is not a post about blogging tactics. It’s about what the experience has taught me about startups.Find the customers first, then build for themIt took me a long time to understand YC’s motto that you should:Make something people want.The first time I heard that, ...

   SEO,Promote,Website,Advice,Traffic     2011-11-10 10:58:40