Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Day programmer



  Hackers vs. Coders

Photo Credit: Pranav MistryBeing a good hacker is an invaluable skill. But is being a coder the same as being a hacker? Is it possible that coders are at a creative disadvantage to hackers who don’t know how to code?Here’s a story that helped me see the difference.I was recently invited to mentor at Startup Weekend. On Friday night, we gathered to eat pizza, pitch ideas, create teams and discuss launch plans. At the end of the day, everyone was feeling great about what theyââ...

   Hacker,Coder,Comparison,Innovation     2011-05-11 02:11:09

  SSH Security and You - /bin/false is *not* security

Backstory While at RIT around 2004 or 2005, I discovered that a few important machines at the datacenter allowed all students, faculty, and staff to authenticate against them via ssh. Everyone's shells appear to be set to /bin/false (or some derivative) on said machines, so the only thing you'll see after you authenticate is the login banner and your connection will close. I thought to myself, "Fine, no shell for me. I wonder if port forwarding works?" ...

   Linux,Security,/bin/false,SSH     2012-02-06 07:46:29

  The 10 Greatest Hacks of My Life

My co-founder and I briefly considered applying to YCombinator for the Winter 2012 session. We eventually decided to bootstrap Curvio initially, and raise a seed round on our own after we launch (so far so good!). But looking over the YC application, one question intrigued me:Please tell us about the time you, tansey, most successfully hacked some (non-computer) system to your advantage.Now, there are a lot of ways to interpret this. A mechanical interpretation would be about...

   Hack,Most important,Example,Curvio     2011-10-22 12:47:42

  FONT SIZING WITH REM

Determining a unit of measurement to size our text can be a topic of heated debate, even in this day and age. Unfortunately, there are still various pros and cons that make the various techniques less desirable. It's just a matter of which less-desirable is most desirable.There are two main techniques that are extolled:Size with pxSize with emLet's review these two approaches before I reveal the magical third.Sizing with pxIn the early days of the web, we used pixels to size our text. It's relia...

   CSS3,Font size,Rem,Font,Html5     2011-09-20 12:42:42

  Tips for Socializing With Friends During College

The shift from high school to college is a pivotal time in a young adult's life, complete with new responsibilities and the exciting opportunity to forge new relationships. Navigating social life in college can be daunting for many, but with the right tips, it's entirely possible to create a fulfilling social experience while still maintaining academic focus. From joining interest-based campus clubs to managing a healthy balance between studies and socializing, there are several strategies to en...

   SOCIAL NETWORK,COLLEGE     2024-04-16 06:40:55

  List of freely available programming books

Meta-ListsHow to Design Programs: An Introduction to Computing and Programming25 Free Computer Science EbooksFree Tech BooksMindView IncWikibooks: ProgrammingCheat Sheets (Free)CodePlex List of Free E-BooksBook Training - On Video!Sofware Program Managers Network - Free EBooksEBook Share @ linbai.infoFreeBooksClub.NetTheassayer.orgO'Reilly's Open Books ProjectTechBooksForFree.comGalileo Computing (German)Microsoft Press: Free E-BooksGraphics ProgrammingGPU GemsGPU Gems 2 - ch 8,14...

   Free,eBook,Links,Programming,List     2011-11-14 08:03:34

  Identify & Address 3 Common BYOD Adoption Problems

With an abundance of mobile phones, tablets, and other personal devices; delivering Enterprise Mobility Solutions has become much more easier as compared to early years, however; the new avenues that have opened up for Enterprise Mobility Consulting in India brings in new, interesting and unforeseen challenges as well. Alongside the growing presence of SaaS applications and BYOD; data protection and integrity has become very critical and a concern that demands immediate attention. Here are some ...

   enterprise mobility solutions, enterprise mobility consulting, enterprise mobility management servic     2015-03-16 06:05:21

  Skills Needed to be a Web Developer in 2011

Many web developers think they already have all the knowledge they need to continue their careers. Check out this list of the ten skills all web developers must have to succeed in 2011 and beyond, and see how you measure up.1) Speak The Basic Languages of the WebBesides the content mark-up of HTML and the style rich sheets of CSS, how are you at your JavaScript and other advanced DHTML features? HTML 5, the latest upcoming W3C standard, includes audio and video embedding, database connectivity a...

   HTML5,Web skills,PHP,.NET,Java     2011-05-12 00:47:49

  Can Your Programming Language Do This?

One day, you're browsing through your code, and you notice two big blocks that look almost exactly the same. In fact, they're exactly the same, except that one block refers to "Spaghetti" and one block refers to "Chocolate Moose." // A trivial example: alert("I'd like some Spaghetti!"); alert("I'd like some Chocolate Moose!"); These examples happen to be in JavaScript, but even if you don't know JavaScript, you should be able to follow along. The repeated code looks wrong, ...

   Programming,Maintainability,Reusable     2011-05-31 07:42:41

  Code reviews in the 21st Century

There's an old adage that goes something like: 'Do not talk about religion or politics'.  Why?  Because these subjects are full of strong opinions but are thin on objective answers.   One person's certainty is another person's skepticism; someone else's common sense just appears as an a prior bias to those who see matters differently.  Sadly,  conversing these controversial subjects can generate more heat than light.   All too often people can get s...

   Code review,21 Centuary     2012-02-10 06:39:14