Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Web blog



  How to make contribution to GitHub correctly?

If you have a GitHub account, then you will be able to see a section called Public contributions on your profile page. Your contribution status for the past year will be showed on this section, it's called contribution calendar. This calendar has 7 rows and 53 columns. Each cell on the grid represents your contribution status for one day, if the contribution is different, the cell color will be different. There are 5 colors in total : white, yellow, light green,green and deep green. With this, s...

   GitHub,Contribution calendar,Public contributions     2013-09-27 10:47:11

  Some hidden XSS injection vulnerabilities

XSS injection refers to a Web page generates some unexpected executable js codes based on user input  and these executable codes are executed by web browser,i.e, the source code sent to web browser by the server contains some illegal js codes, and these illegal js codes are related to user's input. Common XSS injection vulnerabilities can be fixed with some functions such as htmlspecialchars(escaping HTML special characters) and strip_tags() or similar, but there are some hidden XSS injecti...

   XSS,PHP,Security,Code,JavaScript     2012-08-27 20:32:08

  Programmer's Mother's Day

Mother's Day is a celebration honoring mothers and motherhood, maternal bonds, and the influence of mothers in society. It is celebrated on various days in many parts of the world, most commonly in March or May. Mothers usually receive gifts on this day.Carnation is dedicated to be mother's flower. As a special group of people - programmers, our way of expression will naturally have our own characteristics. We can write programs to express our love to our mothers. Here is a Chines...

   Mother's day. Program     2013-05-12 01:10:15

  A turing machine in 133 bytes of javascript

Multiply turing machine The fact it took me 20 lines of javascript to implement a nondeterministic turing machine simulatorlast week kept me up at night. All weekend. Too much code for something so simple and I kept having this gut feeling implementing a basic version shouldn’t take more than 140 bytes. Sunday afternoon I sat down for about an ...

   Turing machine,JavaScript,Simple code     2011-11-28 09:27:28

  Web Vs. Native: Which Is the Better Type of Mobile App?

An average US adult spends 3 hours and 15 minutes on their smartphone every day. This means that launching an app of your own is a great business opportunity. However, you need to decide whether you want to develop a native or a web app. The difference boils down to the fact that web apps run through a mobile browser and native apps are full-fledged programs. Each option has its pros and cons and can be successful under some circumstances. To make the right decision, you need to understand ...

   MOBILE,WEB APP,NATIVE APP     2018-03-26 06:35:27

  Creativity requires isolation

How many times have you tried to get something done that needed some touch of originality and creativity and yet got that annoying mind block which is manifested by blank stares, scratching and biting on anything in reach? “all the damn time” I hear? As preconditions to be creative, one should know something well while having the utmost focus on it. Someone who knows little about aerodynamics can’t come up with the idea for next concord. And focus has two aspects: kno...

   Creativity,Isolation,Quiet,Paper,Pen     2011-11-28 09:33:57

  What's on your Learning List?

How do you track and decide what topics you want to spend time learning? For a while, I didn’t have a real good solution. Something would trigger me to remember “Oh yeah! I really wanted to learn more about that”. I would spend the evening doing busy learning - it seemed like I was learning but I really wasn’t. Instead of trying to do Deliberate Practice, I’d fool myself into thinking I was investing my time wisely by reading blog posts and examples but no...

   Learning list,Conscious,Study,Programming     2011-12-05 12:44:39

  Case sensitivity in PHP

Case sensitivity in PHP is a bit messy. We recommend that you stick to the case sensitive rule in any language. Here we share some case sensitivity cases in PHP.1. Case sensitive1.1 Variable name is case sensitiveAll variables names are case sensitive, these include normal variables and superglobals such as $_GET,$_POST,$_REQUEST,$_COOKIE,$_SESSION,$_GLOBALS etc.<?php$abc = 'abcd';echo $abc; //Output 'abcd'echo $aBc; //No outputecho $ABC; //No output1.2 Constant name by default is case sensit...

   PHP,Case sensitivity,Summary     2012-06-25 05:48:17

  App defeats web

As an admired rock musician and co-founder of the venture capital firm Elevation Partners, Roger McNamee has a statement about Apple : The reason why Apple is so successful today is because App defeats Web.Apple divides contents of web into small apps, and then ask users to pay. This actually means that Apple creates a new business model which is fundamentally different from Web.Commodity Content and Differential ContentCommodity Content is the information model in desktop and web era which is h...

   App,Web,Apple,HTML5     2012-05-16 05:16:00

  4 ways to obtain access token in OAuth 2.0

OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...

   OAUTH2,ACCESS TOKEN,REFRESH TOKEN     2019-06-29 07:12:03