Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Facebook Home



  How the Internet is Changing Economics

I'm not an economist by training, but I've spent a long time observing markets, and I've often wondered what the great economic thinkers of centuries past (Marx, Smith, Keynes, others) would say if they were alive today and could witness the transformations that have been caused by mass media (radio, TV, print) and the Internet. The Internet, in particular, has had a transformative effect that will doubtless be studied for hundreds of years to come. One of the things that can be said abou...

   Internet,Economic,Change,Reason     2012-01-14 12:03:05

  The price of information

SOMETIMES it takes but a single pebble to start an avalanche. On January 21st Timothy Gowers, a mathematician at Cambridge University, wrote a blog post outlining the reasons for his longstanding boycott of research journals published by Elsevier. This firm, which is based in the Netherlands, owns more than 2,000 journals, including such top-ranking titles as Cell and the Lancet. However Dr Gowers, who won the Fields medal, mathematics’s equivalent of a Nobel prize, in 1998,...

   Information,Price,Value,Facebook,Social network     2012-02-07 06:24:53

  Some laws of interactive design

The well known quote from Alan Cooper is   Conforming to the standard unless there is a better choice. There are some best practices in interaction design. How many do you know? 1. Fitts' Law The time from one start point to target point is determined by two parameters: The distance to the target and the size of the target. )D and W in above picture), the formula is : T=a+blog2(D/W+1). It was first proposed by Paul Fitts, it is mathematical model used to predict the time from any poin...

   interaction design, laws, Fitts' law     2012-11-16 11:25:24

  Create temp file in Bash using mktemp and trap

When working on Linux Bash, sometimes there is need to create temporary file. A common way of creating temp file on Linux is creating some file in /tmp directory. However there is security risk when creating temp file in /tmp directory. This post will show how to securely create temp file in Linux Bash. When creating file in /tmp directory, there are some security risks. This directory can be accessed by any user on the system, any user can write data into this directory as well. The files creat...

   LINUX,MKTEMP,TRAP,TEMP FILE     2019-12-30 23:28:23

  8 very useful and free web security testing tools

With more pervasive of web applications, web security threats are becoming increasingly prominent. Hackers gain web server control by exploiting web server vulnerabilities and SQL injection vulnerabilities, then they may tamper with web content, or steal important internal data, the more serious is to inject malicious code into web pages to affect visitors of websites. Attention is gradually warming up to Web Application Security. Here we recommend eight very useful and free web security testing...

   Website, security,Web security,Attack     2012-07-22 10:59:09

  Why are column oriented databases so much faster than row oriented databases?

I have been playing around with Hybrid Word Aligned Bitmaps for a few weeks now, and they turn out to be a rather remarkable data structure.  I believe that they are utilized extensively in modern column oriented databases such as Vertica and MonetDB. Essentially HWABs are a data structure that allows you to represent a sparse bitmap (series of 0's and 1's) really efficiently in memory.  The key trick here is the use of run length encoding to compress the bitmap into fe...

   Database,Column oriented,Speed analysis,Vertica     2012-01-29 04:27:05

  REST和gRPC对比全知道

长期以来,REST是构建API的唯一“标准”。它取代了混乱的“太多XML”的SOAP。但是近年来,出现了新的替代品。2015 年,Facebook 向公众发布了GraphQL,而 2016 年,Google 推出了gRPC。本文将重点介绍 gRPC,并与仍广泛使用的 REST 进行比较。 概述 以下表格将为您提供讨论点的概述,并显示 REST 和 gRPC 的优劣之处。 主题 REST gRPC 标准化 没有标准 定义明确 范式 基于资源...

   COMPARISON,GRPC,REST     2023-04-29 06:44:09

  Additional steps need to implement to setup shadow-boxV2 OPTEE on Raspberry PI

We followed the Shadow-box v2 project from the https://github.com/kkamagui/shadow-box-for-arm to set up the trustZone on Raspberry PI modeB to protect the Linux Kernel. But got a problem when doing the step: [3.6.5. Activate Shadow-Box for ARM and Start Secure Pi!] to create the hash for the memory area. The result is not shown. If you met the same problem, this is what I did to fix the problem on my PI: 1.1  When we do the step [3.5.1. Copy OP-TEE OS with Shadow-Box for ARM and N...

   HARDWARE,RASPBERRY PI     2019-05-20 08:52:55

  Why programmers work at night

A popular saying goes that Programmers are machines that turn caffeine into code. And sure enough, ask a random programmer when they do their best work and there’s a high chance they will admit to a lot of late nights. Some earlier, some later. A popular trend is to get up at 4am and get some work done before the day’s craziness begins. Others like going to bed at 4am. At the gist of all this is avoiding distractions. But you could just lock the door, what’s so special a...

   Programmer,Sleep,Later,Efficiency,Habit     2011-12-16 10:13:27

  the Performance Golden Rule

Yesterday I did a workshop at Google Ventures for some of their portfolio companies. I didn’t know how much performance background the audience would have, so I did an overview of everything performance-related starting with my first presentations back in 2007. It was very nostalgic. It has been years since I talked about the best practices from High Performance Web Sites. I reviewed some of those early tips, like Make Fewer HTTP Requests, Add an Expires Header, and Gzip Components. ...

   Web design,Golden rule,Performance     2012-02-17 07:51:09