Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Bug report



  Design Trends That Can Help You Boost Ecommerce Sales

Since the beginning of 2016, a considerable growth in the eCommerce sector has been experienced across the globe. There are certain trends that were accepted globally but as liking, preferences and monetary conditions of people vary from region to region, we can say that different places have their own trends when it comes to Ecommerce software solutions. In this blog we have brought to you some of the most significant eCommerce design trends that are lingering around the development world.&nbs...

   BUSINESS, ECOMMERCE,ECOMMERCE DEVELOPMENT COMPANY,ECOMMERCE SOFTWARE SOLUTIONS,OUTSOURCING IT     2016-02-22 23:58:18

  What is Hystrix and How does Hystrix work

Background In distributed systems, there is one effect where the unavailability of one service or some services will lead to the service unavailability of the whole system, this is called service avalanche effect. A common way to prevent service avalanche is do manual service fallback, in fact Hystrix also provides another option beside this. Definition of Service Avalanche Effect Service avalanche effect is a kind of effect where the service provider fails to provide service which causes t...

   AVALANCHE EFFECT,HYSTRIX,DISTRIBUTED SYSTEM     2019-02-04 06:00:38

  Secure Your Go Code With Vulnerability Check Tool

Security vulnerabilities exist in any language and any code, some are written by ourselves, but more are from the upstream dependencies, even the underlying Linux. We have discussed the security protection methods for Go and Kubernetes Image in Path to a Perfect Go Dockerfile and Image Vulnerability Scanning for Optimal Kubernetes Security, in which the security scanning was performed based on generic. As the Go community grows, more and more open-source packages have caused ...

   GOVULNCHECK,GOSEC,GOLANG     2022-10-29 23:43:20

  Are college students learning?

In his State of the Union address last Tuesday, President Obama proposed several measures to lower college tuition. University leaders responded cautiously, warning that cost-cutting reforms might also cut into instructional quality. But here's the big open secret in American higher education: Most institutions have no meaningful way to measure the quality...

   College students,Learning,Survey     2012-02-02 07:10:02

  Strict mode in JavaScript

1. Introduction In addition to normal mode, ECMAScript 5 includes the other mode : strict mode. It means it will make JavaScript codes execute in a more strict environment. The purposes to have strict mode are: Remove some unreasonable and parts of JavaScript syntax. Reduce some of the quirk behaviors. Remove some insecure parts of code execution. Make the execution environment more secure Improve interpret efficiency and increase the execution speed Build foundation for future JavaScript versi...

   JavaScript, Strict mode. Introduction     2013-01-17 05:00:26

  Service discovery with etcd

In previous post, we have talked about etcd and its usage. This post we will cover how to implement server discovery with etcd. Service discovery is to solve one of the most commonly seen scenarios in distributed system where how to find the corresponding target service to talk to. In short, it is to find some server which one can talk to based on some service name. A complete service discovery system include below three key functions: Service registration: A service must register itself to so...

   ETCD,SERVICE DISCOVERY,DEMO,TUTORIAL     2021-03-08 05:36:29

  The price of information

SOMETIMES it takes but a single pebble to start an avalanche. On January 21st Timothy Gowers, a mathematician at Cambridge University, wrote a blog post outlining the reasons for his longstanding boycott of research journals published by Elsevier. This firm, which is based in the Netherlands, owns more than 2,000 journals, including such top-ranking titles as Cell and the Lancet. However Dr Gowers, who won the Fields medal, mathematics’s equivalent of a Nobel prize, in 1998,...

   Information,Price,Value,Facebook,Social network     2012-02-07 06:24:53

  Cross Browser HTML5 Drag and Drop

HTML5 Drag and Drop has been talked about a lot lately, but it’s hard to find really useful information about implementing it across multiple browsers.Mozilla, Apple and Microsoft all have pages describing how to use it, but their examples seem to work only in their particular browser (Apple’s example doesn’t even work in their own! Updated, Jan. 11, 2009: Although I have not been able to get this example working on Safari 2.0.4 and 3....

   HTML5,Drag and drop, Demo,Source code,Cr     2011-09-20 13:42:45

  Google engineer: What I learned in the war

Veteran's Day is an ideal time to hear from one of those rare folks who combine corporate and military careers. Dan Cross, a software engineer at Google (GOOG) and a 1st Lieutenant in the U.S. Marine Corps, took a leave to serve active duty in Afghanistan, came home a year ago, and brought back lessons that he couldn't have learned in business. While he had never seen himself as the military type until a personal tragedy made him reroute his career, he's a better man for it. Cross, 34, is now an...

   Military,Marine,Google,Engineer,Lessons,Teamwork     2011-11-12 10:36:03

  Integer overflow

You may be familiar with integer overflow, but what you may not be familiar with is how gcc handles signed integer overflow. First let's look at the standard, for unsigned integer, the standard says : A computation involving unsigned operands can never overflow, because a result that cannot be represented by the resulting unsigned integer type is reduced modulo the number that is one greater than the largest value that can be represented by the resulting type. In other words, unsigned integer ov...

   Integer overflow,gcc,Linux     2012-10-20 13:33:10