Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- network



  bakercom1 5 Ways to Make Your IT Staff Unpoachable

When it comes to hiring practices, the tables have turned – capsized, actually. After a global recession saw thousands of jobs lost in IT departments everywhere, now the race is on to hire swarms of top talent. The trouble is: There isn’t enough talent to go around, and the threat of losing key staff to “poachers” is growing daily. “In the current war for talent in Silicon Valley, a lot of leaders believe that it is not possible to compete with the Google an...

   IT,Experts,Keep,Unpoachable     2011-07-25 08:35:49

  Ruby WinRM undefined method `split' for nil:NilClass

WinRM service is a service provided by Windows to enable remote access a Windows system. It is similar to what SSH is for *nix. And it is frequently used in applications which want to automate process or accessing remote Windows system and perform actions on them. Ruby also provided the WinRM gem which is an implementation of the WinRM service.  When using WinRM gem, one may often want to use :negotiate as the transport protocol for authentication. This transport will negotiate using d...

   RUBY,WINRM,INIT_AUTH,PROXY     2017-03-08 02:21:09

  ICO Checklist: How to Launch a Successful Initial Coin Offering

Amongst the many important things that took place in Blockchain industry in 2017, Initial Coin Offerings (ICO) may be considered as the most important of all. ICO helps business/idea owners to pre-sell access to their services or products and in a way to fund the development of those services or products. To help founders/ startups define an effective launch process and provide perspective on everything that they will need on their ICO journey, we have jotted down few points which will serve as...

   INITIAL COIN OFFERING,ICO CHECKLIST,INITIAL COIN OFFERINGS (ICO)     2018-05-28 07:32:53

  Let's talk about JavaScript deep clone

In JavaScript, deep clone means creating a brand new object that includes all nested objects, with all properties being completely independent copies. This is different from shallow copying, which only copies the first-level properties, with nested objects being referenced rather than copied. There are multiple ways to perform deep copying in JavaScript, but the best one to use depends on the specific use case. Can use JSON.parse & JSON.stringify? ❌ JSON.parse(JSON.stringify(obj)) is a dep...

   JAVASCRIPT,DEEP CLONE     2023-02-25 08:57:11

  Essential skills any web developer should have

As a web developer, besides writing HTML code, there is much more to do before the site can go live. You may consider about user experience, device compatibility, security etc. To be a good web developer, you should acquire some essential skills for web development. Below we list some of them. Some of them you may be familiar with a long time ago, but definitely some of them you may not be so familiar with or even never hear about before. Interface and User Experience Be aware that browsers imp...

   Web development,User experience     2014-03-21 06:44:49

  List of freely available programming books

Meta-ListsHow to Design Programs: An Introduction to Computing and Programming25 Free Computer Science EbooksFree Tech BooksMindView IncWikibooks: ProgrammingCheat Sheets (Free)CodePlex List of Free E-BooksBook Training - On Video!Sofware Program Managers Network - Free EBooksEBook Share @ linbai.infoFreeBooksClub.NetTheassayer.orgO'Reilly's Open Books ProjectTechBooksForFree.comGalileo Computing (German)Microsoft Press: Free E-BooksGraphics ProgrammingGPU GemsGPU Gems 2 - ch 8,14...

   Free,eBook,Links,Programming,List     2011-11-14 08:03:34

  Why I Hate Android

Why do I hate Android? It’s definitely one of the questions I get asked most often these days. And most of those that don’t ask probably assume it’s because I’m an iPhone guy. People see negative take after negative take about the operating system and label me as “unreasonable” or “biased” or worse. I should probably explain. Believe it or not, I actually don’t hate Android. That is to say, I don’t hate the concept of Androi...

   Android,Hate,Feature     2012-01-10 07:19:27

  Stop Designing Pages And Start Designing Flows

For designers, it’s easy to jump right into the design phase of a website before giving the user experience the consideration it deserves. Too often, we prematurely turn our focus to page design and information architecture, when we should focus on the user flows that need to be supported by our designs. It’s time to make the user flows a bigger priority in our design process. Design flows that are tied to clear objectives allow us to create a ...

   Web design,Paradigm,Advice,User experience,Flow     2012-01-05 08:16:18

  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10

  Stuff The Internet Says On Scalability For September 16, 2011

Between love and madness lies HighScalability:Google now 10x better: MapReduce sorts 1 petabyte of data using 8000 computers in 33 minutes; 1 Billion on Social Networks;Tumblr at 10 Billion Posts; Twitter at 100 Million Users; Testing at Google Scale: 1800 builds, 120 million test suites, 60 million tests run daily.From the Dash Memo on Google's Plan: Go is a very promising systems-programming language in the vein of C++. We fully hope and expect that Go become...

   Scalability,Go,Google,MapReduce,Muppet,M     2011-09-20 11:22:36