Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- long



  What is Asian UI design like from a Western point of view?

From a western point view, Asian UI designs are usually quite dense and compact. People in Asia are think more in detail when they start design something. They think these designs have following characteristics Dense tightly packed text Tiny low-quality images More columns than you can count Bright clashing colours and flashing banners Overuse of outdated technologies like Flash While the Western design is much simpler. They are treating the design as a whole, so usually we will see some quite...

   UI design,Western,Asian     2014-04-28 06:52:22

  Should All Web Traffic Be Encrypted?

The prevalence of free, open WiFi has made it rather easy for a WiFi eavesdropper to steal your identity cookie for the websites you visit while you're connected to that WiFi access point. This is something I talked about in Breaking the Web's Cookie Jar. It's difficult to fix without making major changes to the web's infrastructure. In the year since I wrote that, a number of major websites have "solved" the WiFi eavesdropping problem by either making encrypted HTTPS web traffic an accou...

   Web traffic,Security,HTTPS.Encryption,Wifi     2012-02-24 05:02:58

  Python Patterns - An Optimization Anecdote

The other day, a friend asked me a seemingly simple question: what's the best way to convert a list of integers into a string, presuming that the integers are ASCII values. For instance, the list [97, 98, 99] should be converted to the string 'abc'. Let's assume we want to write a function to do this. The first version I came up with was totally straightforward: def f1(list): string = "" for item in list: string = string + chr(item) return string ...

   Python,Optimization,Anecdote,Loopup,ASCII     2011-12-18 10:52:49

  World leaders who know how to code

World leaders are those people who have extraordinary speaking skills and are a group of very busy people in most people's impression. But among them, there are a few who know how to program as well. Today we are going to summarize some of them. Lee Hsien Loong -- Singapore Prime Minister Lee Hsien Loong, Singapore Prime Minister posted a C++ program about Sudoku which he wrote several years ago. He shared the source code on Google Drive as well.  In 1971, Mr. Lee studied Mathema...

   World leader, Coding, Programming     2015-08-02 05:56:20

  Difference between Beijing and Silicon Valley on innovation

The fundamental difference between Beijing and Silicon Valley is not the sky color, but the fact that on one side the young people are talking about buying a new house, a new car and getting married, while on the other side young people are talking about how to change the world. Now and then we can read from the newspaper or the Internet that a Silicon Valley company is valued over 1 billion US dollars. Also we can see many famous US IT brands on the Internet such as Google, Facebook,Twitter, Am...

   China,Silicon Valley,Innovation, Comparison     2013-06-24 03:09:54

  Emacs adventures

I have been using Emacs for over a year now. I actually didn’t learn a lot when I started using it (just the basics to get going and then some relatively common keyboard shortcuts), but lately I have been reading and learning much more about it. I’m so grateful by everything I’ve learned from different people on the net that I wanted to share a couple of things I’ve learned, and a simple major mode for editing AsciiDoc documents. As a long-time VIM user, I f...

   Editor,Linux,Emacx,VIM,Shortcuts     2011-11-30 11:56:49

  Twitter prosecuted five companies

Recently Twitter sought help from law enforcement agencies because they can not stand spam emails. On Thursday, Twitter prosecuted five separate companies which provide tools so that spam on Twitter can be spread easier.Twitter said in a statement, Twitter now has 140 million active users, and the number of users are still increasing quickly, as Twitter continues to grow, spam also began looking to come to. Although the content of the spam on Twitter is not the proportion, it still gave rise to ...

   Twitter,Spam,Prosecution     2012-04-06 01:58:37

  Path gets another $40miliion investment

Social network website Path may officially announce today that it has completed its funding round B. According to sources, Red Point led this round of  funding of $ 40 million. In addition,  Path's market value is estimated about $ 250 million.Path was established in November 2010, there are currently over 2 million registered users. The company's slogan "Path to help you easily share with friends Life". Path call themselves "private social network" because Path is based on e-mail addr...

   Path,Social network,Funding round     2012-04-17 06:50:10

  Different types of keystore in Java -- JKS

JKS is Java Keystore, a proprietary keystore type designed for Java. It can be used to store private keys and certificates used for SSL communication, it cannot store secret keys however. The keytool shipped with JDKs cannot extract private keys stored on JKS. This type of keystore usually has an extension of jks. Next we will show how to operate the JKS keystore with pure Java code. Create JKS keystore The simplest method to create a JKS keystore to create an empty keystore. We can first get an...

   DEMO,EXAMPLE,KEYSTORE,JKS     2014-09-05 20:21:51

  Global web browser market share statistic in June

The war among the leading web browsers is still on after Google Chrome took over IE as the No.1 web browser last month. Let's take a look at the market share for different web browsers in June 2012.According to statCounter.  Chrome still remains at the No. 1 position and its market share is continuously increasing. Its market share increases by 0.28% from 32.43% in May to 32.71% in June. While for IE, eve. though it lost its No. 1 position to Chrome last month, its market share still...

   Web browser, Market share,June,2012     2012-07-02 06:08:17