Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- multiple hosts



  STOP WRITING GOOD CODE; START WRITING GOOD SOFTWARE

Good software trumps elaborate code. And unfortunately, you can’t usually have both. The real world has deadlines and ship dates. It’s a game of pick two:Ship on timeShip with elaborate codeShip with a fantastic productAlmost always, you should pick the first and the last when you’re building software applications for users (if you’re building API’s or open source libraries for other developers, then it’s a different story). Too often I have seen de...

   Good software,Standard,Good code,Deadline,Tradeoff     2011-11-20 06:56:06

  When a CA becomes untrustable

Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...

   APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN     2016-10-01 23:03:44

  In-memory key-value store in C, Go and Python

Subtitle: Wow Go’s net library is fast On paternity leave for my second child, I found myself writing an in-memory hashmap (a poor-man’s memcached), in Go, Python and C. I was wondering how hard it would be to replace memcached, if we wanted to do something unusual with our key-value store. I also wanted to compare the languages, and, well, I get bored easily! The code is on github as Key-Value-Polyglot. Each version implements enough of the get and set commands from the mem...

   key-value,Memory,C,Python,Go     2012-03-21 09:21:51

  Kualitee: For better Test Management in the year 2020

New IT trends will dominate in 2020. Big data management, customer satisfaction, security concerns, mobile apps, artificial intelligence (AI), test automation, DevOps and agile methodologies are a few of these rising technologies and trends.  With their rise, Quality assurance (QA) has to take the testing game a notch up, especially with using smart test management tools for their testing.  Test Automation Stays A report by Research and Markets estimates the global automation testing ...

   TESTING,KUALITEE     2019-09-04 07:33:25

  Week 1 : Research - Elements of Successful iPhone Games.

This weekend I started work on my first full blown game for the iPhone. I’m not ready to share the details of what the game will be specifically as I’m sure these will change dramatically over the coming weeks. All I’m sure on is it will be a platform game built with Corona SDK. To get me started I’ve been downloading a bunch of games from the app store, jotting down some of the areas contributing to their addictiveness and success. Short levels I do most of my ...

   iPhone,Game design,Mobile,Facors     2012-01-16 09:47:53

  How to Ace a Google Interview

Imagine a man named Jim. He's applying for a job at Google. Jim knows that the odds are stacked against him. Google receives a million job applications a year. It's estimated that only about 1 in 130 applications results in a job. By comparison, about 1 in 14 high-school students applying to Harvard gets accepted. Jim's first interviewer is late and sweaty: He's biked to work. He starts with some polite questions about Jim's work history. Jim eagerly explains his short career. The intervi...

   Google,Interview,Questions and answers,Job     2011-12-26 09:17:36

  Top 10 PHP Best Security Practices for Sys Admins

PHP is widely used for various of web development. However, misconfigured server-side scripting would create all sorts of problem. And here are php security best practices that you should aware when configuring PHP securely. Nowadays most of the web servers are operated under Linux environment (like: Ubuntu, Debian...etc). Hence, in the following article, I am going to use list top 10 ways to enhance PHP Security Best Practices under Linux environment. My sample setup for PHP Security Tips: D...

   PHP,code security,System admin,Advice,Best practice     2012-02-01 00:04:37

  Moving from Java to C++: An Interview with Rogers Cadenhead

In this interview, co-author of Sams Teach Yourself C++ in 24 Hours, 5th Edition Rogers Cadenhead discusses moving from Java to C++, what brought him to C++, and the best tactics for learning C++.Danny Kalev: For how long were you a Java programmer? Can you tell us a bit about the nature of the projects in which you took part at that time?Rogers Cadenhead: I've been a Java programmer since the language was launched by Sun Microsystems in 1995. I was doing website develop...

   Java,C++,Transfer,Transform,New challeng     2011-09-03 11:01:26

  How big is sizeof structure?

First let's see the codes of a structure: struct node{ int a; int b; }; Question : What's sizeof(node)? The answer is very simple, on a 32 bit machine, an int will take 4 bytes and two ints will take 8 bytes. So sizeof(node) is 8. The answer for the above codes is 8, then how about the following structure: struct node{ char a; int b; }; Question : Then what's sizeof(node) now? int takes 4 bytes, char takes 1 bytes, is the answer 5? Now the answer may not be 5, on some mac...

   Data structure alignment, pack     2012-10-29 12:13:37

  From College To Silicon Valley: Tips From A Veteran

Editor’s note: Pedram Keyani has been an engineer at Facebook since 2007. He is a manager on the Site Integrity team, the inventor of Keg Presence and a Hackathon enthusiast. Looking for internships and jobs after college can be exhilarating, especially for people with engineering and other technical expertise. In an otherwise tough job market, demand for software engineers is higher than ever right now. You may find that companies are actually competing to pay you for the knowledge y...

   Career,College,Silicon valley,Transition,Experience     2012-02-20 05:34:24