Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Wikipedia



  Why isn't all internet traffic encrypted?

The biggest problem is that you must be able to verify that you're encrypting to the correct key. Without it, encryption would be practically useless, as anyone could perform a man-in-the-middle attack on the connection and remain undetected.In typical SSL/TLS, as well as other protocols using X.509, this verification is performed by "certification authorities", which are explicitly marked as "trusted" by web browsers and operating systems. Unfortunately, these CAs usual...

   Internet,Traffic,Encryption,Decryption,Security     2011-10-15 15:03:37

  When and Where to Use Pointers in Go

When declaring variables in Go, we usually have two syntax options: In some scenarios, pointers; in others, reference; sometimes, either. It’s great to have choices, but it is also confusing sometimes as to which one in which scenario. To be more reasonable in choice-making, I started from pointers, walked through their natures, and summarized some rules in using them in Go. from unsplash, Jordan Ladikos Pointers Go has pointers. A pointer holds the memory address of a ...

   POINTER,GOLANG     2022-05-01 02:24:43

  Seven Java projects that changed the world

O\'Reilly is celebrating the release of Java 7, and our inaugural OSCON Java conference: July 25-27 in Portland, Ore. Java\'s open source ecosystem is strong and healthy, one of the primary reasons for our creation of OSCON Java. Over the last decade, several projects have traveled beyond mere adoption and had effects dominating the Java world, into software development in general, and some even further into the daily lives of users. JUnit Ported to Java by Kent Beck and Erich Gamma from Be...

   Java,Projects,Prominent,Eclipse,Sue     2011-07-26 02:50:42

  Xiaomi band with screen is around the corner

On May 10, the Chinese electronics company Xiaomi will hold a new product release conference to reveal its Xiaomi MAX, a new model of Xiaomi phone. Along with this phone, there will be other product releases as well, one of them will probably be the next generation of Xiaomi Band. In April, Lei Jun, Xiaomi CEO, seemed leak the look and design of a new wrist band while he was attending a company's year end party. This new wrist band should be the next generation of Xiaomi Band. The new band ...

   NEWS,XIAOMI,XIAOMI BAND,FIBIT,FITBIT ALTA,SMART DEVICE     2016-04-30 23:29:09

  SkipList in Go

Algorithmic thinking is the must-have in the coding world, so I have been keeping the routine of algorithm practice every week, consolidating my knowledge of data structures on one hand, and improving my coding skills as well. A difficult one happened to be stuck in my mind- Implement SkipList with Go, which took me quite a weekend. Below is the front-line report of how I finally got the hang of it. First, from its concept. Wiki has explained it well. a skip list is a probab...

   GOLANG,SKIPLIST     2022-04-05 02:21:59

  12 Things A Programmer Really Needs To Know

How do you answer the question, “what do I need to learn to be a good programmer?” I have written posts trying to answer that question, typically focusing on the languages that you should learn or the algorithms and other techniques you need to know. What about the rest of a programmer’s life? This is a less serious look at the life of a programmer. So, what does a programmer really need to know?Caffeine â€“ You need to find your preferred caffeine delivery system. M...

   Tips,Programmer,How,What,Logic     2011-08-31 08:46:32

  Some laws of interactive design

The well known quote from Alan Cooper is   Conforming to the standard unless there is a better choice. There are some best practices in interaction design. How many do you know? 1. Fitts' Law The time from one start point to target point is determined by two parameters: The distance to the target and the size of the target. )D and W in above picture), the formula is : T=a+blog2(D/W+1). It was first proposed by Paul Fitts, it is mathematical model used to predict the time from any poin...

   interaction design, laws, Fitts' law     2012-11-16 11:25:24

  Google+ is sick

Google says that Google+ now has over 170million registered users, but according a new research report of Fast Company about Google+,  Google+ is just a virtual ghost town.This research selected a sample of 40,000 random Google+ users. The result is :The average post on Google+ has less than one +1, less than one reply, and less than one re-shareRoughly 30% of users who make a public post never make a second oneEven after making five public posts, there is a 15% chance that a user will not ...

   Google+,Sick,Research     2012-05-16 05:41:35

  Understand diff in Unix

diff is an important tool program in Unix. It is used to compare differences of two files, it is the foundation for code version control. If you type : $ diff <file_before_change> <file_after_change> diff will tell you what's the difference between these two files. The result may not be so easy to understand, so now I will show you how to understand diff. 1. 3 formats of diff diff has 3 formats due to historic reasons. normal diff context diff unified diff 2. Demo files For easy d...

   diff,Unix,version control,git     2012-09-03 10:49:36

  Many Chinese applicants to US universities may be affected by Gmail cut out

Just after Christmas, many Chinese found that they could not connect to Gmail anymore in mainland China. Since Google announced leaving from China in 2010, the web version of Gmail was not accessible anymore. But people from China could still access Gmail through some Gmap apps. This time, Gmail is not accessible even with these apps. It is said that all the mail service protocols of Gmail including IMAP/POP/SMTP have been cut out by Chinese government. This means no mails can be sent to or rece...

   Gmail, China, Gmail cut out     2014-12-30 00:35:28