Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- long



  Device Experiences & Responsive Design

Most recently LukeW was the Chief Product Officer (CPO) and co-founder of Bagcheck which was acquired by Twitter Inc. in 2011. Luke is also the author of the book Mobile First and was Chief Design Architect (VP) at Yahoo! Inc. While the task of designing Web applications and sites for multiple devices can be daunting, two techniques can make the process more manageable: classifying device experiences and designing/building responsively. Here’s how these two approaches can work toge...

   User experience,Device,Responsive design     2012-03-31 00:10:31

  Net Neutrality is Dead - and Web Development Will Never Be The Same Again

Against the wishes of web users and tech businesses alike, the FCC has pushed through regulations to kill net neutrality. Here’s what that means for web developers. On December 14, 2017, the FCC voted in a 3-2 decision to roll back the Obama administration’s 2015 net neutrality rules. These policies, which demanded stronger oversight for broadband companies and internet service providers, ensured that all data on the web was treated equally. Most importantly, they prevented web traf...

       2019-05-02 21:55:53

  How To Make The Most of Your Least Productive Time

Everybody talks about mastering the art of staying productive. Not many people willingly accept that such efforts are futile. It’s impossible to stay productive 100% of the time, and this will never change. Something that I believe to be just as important, if not more so, is what we make of our least productive time. We all have the capacity to be extremely productive for some part of the day. Even the world’s grandest underachievers. But I believe that to be successful runni...

   Productive time,Limit time,Effort     2012-02-06 07:49:47

  Use of log in programming

Usually, The purposes of log are for troubleshooting and displaying program running status. Good log will help us locate the error easier. Many programmers think log in programs is very simple, but it's not an easy task to write log codes to efficiently locate the error. Here we discuss about program log in three aspects: Where to log What to log Log styles to be avoided Where to log 1. When calling external functions When your program is calling some external functions which are not written b...

   Log, Programming,Debug     2012-11-28 11:42:23

  In-memory key-value store in C, Go and Python

Subtitle: Wow Go’s net library is fast On paternity leave for my second child, I found myself writing an in-memory hashmap (a poor-man’s memcached), in Go, Python and C. I was wondering how hard it would be to replace memcached, if we wanted to do something unusual with our key-value store. I also wanted to compare the languages, and, well, I get bored easily! The code is on github as Key-Value-Polyglot. Each version implements enough of the get and set commands from the mem...

   key-value,Memory,C,Python,Go     2012-03-21 09:21:51

  Three Simple Ways to Improve the Security of Your Web App

It seems like web app security has entered the public conscious recently, probably as a result of the press covering the activities of groups like Anonymous and incidents like security breaches at several CAs. Here are a couple of quick security tips to improve the security of your web apps. Think of these as low-hanging fruit, not as a substitute for thorough analysis of your app’s security. If there’s interest in this topic we can do more posts, too - let us know in the com...

   Web app,Security,X-FRAME-OPTIONS,SSL     2011-12-08 10:10:20

  bcrypt: Safeguarding Passwords with Strong Hashing and Adaptive Security

Introduction In today's digital world, passwords play a crucial role in protecting personal privacy and information security. Passwords are the most commonly used means of authentication because they are simple yet effective. Password security is the cornerstone of cybersecurity and plays a fundamental role in safeguarding the information security of individuals and organizations. However, with the increasing frequency and complexity of cyberattacks, traditional password hashing algorithms like ...

   BCRYPT,SECURITY     2023-11-15 08:14:35

  From College To Silicon Valley: Tips From A Veteran

Editor’s note: Pedram Keyani has been an engineer at Facebook since 2007. He is a manager on the Site Integrity team, the inventor of Keg Presence and a Hackathon enthusiast. Looking for internships and jobs after college can be exhilarating, especially for people with engineering and other technical expertise. In an otherwise tough job market, demand for software engineers is higher than ever right now. You may find that companies are actually competing to pay you for the knowledge y...

   Career,College,Silicon valley,Transition,Experience     2012-02-20 05:34:24

  Small team? Fix your life with a non-virtual assistant

Like many others, I tried “outsourcing my life” using a digital assistant. A year and a thousand bucks later, I’ve received one department store recommendation and an admittedly adequate spreadsheet of competitive research.I have since cancelled. Why didn’t it work for me?I think I just didn’t trust it/them/him/her (that I even have this ambiguity is indicative of the issues).Most of my mindless time-sinks involve at least a credit card number and are often a con...

   Work,Assistant,Team,Small,Individual,Get an assistant     2011-10-28 10:26:36

  The Wasteful Legacy of Programming as Language

A few years ago I visited a friend who is a graduate student in linguistics. After some time he asked me if I was aware of the work by Chomsky on formal languages. I told him that yes, Chomsky work was a basis for much of the developments in theoretical computer science. More than that, I was glad to learn that there was something technical that I could share and discuss with other people in linguistics. At the time I found this was just a great coincidence. It was only recently, though, t...

   Programming language,Human language,Chomsky     2011-11-28 10:36:34