Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Webkit



  Games don’t need to be social

Social games have been a big trend in recent years. Zynga struck it big and now everyone else is trying to emulate them. Unfortunately, the first thing that pops into anyones head when a Zynga game is mentioned is Facebook. Facebook is the platform upon which their success stories like FarmVille were built, but it’s not the reason for their success.Zyngas games work because they are fun. The social connectivity is merely a mechanism to share your enjoyment of the game with other...

   Game,Social,No need,Game design     2011-10-29 07:15:34

  CSS Box Shadow Illustration

Used in casting shadows off block-level elements (like divs)..shadow { -moz-box-shadow: 5px 5px 5px #ccc; -webkit-box-shadow: 5px 5px 5px #ccc; box-shadow: 5px 5px 5px #ccc; }The horizontal offset of the shadow, positive means the shadow will be on the right of the box, a negative offset will put the shadow on the left of the box.The vertical offset of the shadow, a negative one means the box-shadow will be above the box, a positive one means the shadow will be below the box.The blur r...

   CSS,Box Shadow,Apple,Chrome,Safari,IE,Il     2011-06-30 04:03:38

  Convert ext3 to ext4 file system on CentOS

ext3 is a journaled file system that is commonly used by the Linux kernel. It is the default file system for many popular Linux distributions, including Debian. Stephen Tweedie. On June 28, 2006, Theodore Ts'o, the principal developer of ext3, announced an enhanced version, called ext4. Today, we will show how to convert ext3 to ext4 format on CentOS. System environment: Release version : CentOS release 5.4(Final) Kernel:  Linux localhost.lo...

   CentOS, ext3 to ext4     2012-11-21 11:40:45

  MySQL index optimization

Problem description: We need to access a very big table which has 40 million records. In the table, id is the primary key and program_id is indexed. When executing a select query: select * from program_access_log where program_id between 1 and 4000 The above query executes very slowly, we thought it was because there were too many records in the table. So we added id in the where condition to limit the search so that each time only half a million records would be read. select * fr...

   MySQL,Index search, Partition     2012-12-26 13:14:20

  Lasagna Code

Anyone who claims to be even remotely versed in computer science knows what “spaghetti code” is. That type of code still sadly exists. But today we also have, for lack of a better term — and sticking to the pasta metaphor — “lasagna code”.Lasagna Code is layer upon layer of abstractions, objects and other meaningless misdirections that result in bloated, hard to maintain code all in the name of “clarity”. It drives me nuts to see how badly some c...

   Lasagna Code,Analysis,spaghetti code     2011-11-16 03:12:03

  ASP.NET 4 Breaking Changes #1: requestValidationMode cause ValidateRequest=False to fail

The request validation feature in ASP.NET provides a certain level of default protection against cross-site scripting (XSS) attacks. In previous versions of ASP.NET, request validation was enabled by default. However, it applied only to ASP.NET pages (.aspx files and their class files) and only when those pages were executing.In ASP.NET 4, by default, request validation is enabled for all requests, because it is enabled before the BeginRequest phase of an HTTP request. As a result, request valid...

   ASP.NET,Html content,Error,ValidateRequest,requestValidationMode     2011-11-07 13:50:29

  Some measures for improving Linux server security

The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...

   Linux server,Server security     2012-08-21 05:08:50

  Walking through doorways causes forgetting, new research shows

We’ve all experienced it: The frustration of entering a room and forgetting what we were going to do. Or get. Or find.New research from University of Notre Dame Psychology ProfessorGabriel Radvansky suggests that passing through doorways is the cause of these memory lapses.“Entering or exiting through a doorway serves as an ‘event boundary’ in the mind, which separates episodes of activity and files them away,” Radvansky explains.“Recalling the decision...

   Memory loss,Doorway,Forget,Advice     2011-11-21 10:11:19

  Beauty of front end--List of front end tools used by GitHub

I did this summarization when I added Lirate_CoffeeScript support for GitHub-Linguist, i.e how does GitHub do Marjdown render and code highlight in its front end. Lots of font end tools used by GitHub are open sourced. They are: 1. HTML/CSS/JavaScript 1.1 HTML template GitHub markup and template styleguide : https://github.com/styleguide/templates 1.2 Style and CSS GitHub uses replacement of CSS: SCSS:https://github.com/nex3/sass KSS:https://github.com/kneath/kss GitHub CSS styleguide ...

   GitHub, front end,Tool     2013-03-07 03:46:42

  People, processes and tools

Some years ago, one of my managers used to repeat this "Accenture truism" (or so he designated it): to fix or improve something, first you need the right people, then you need the right processes to help those people work together, then finally you need the right tools to support those processes. People, processes, and tools - in that order.This is even more true for tech startups than for corporations. As geeks, whenever we face a problem, we often start by looking for a tool to fix it. "Our te...

   Work,People,Process,Tool,Importance,Priority     2011-10-24 11:36:14