Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Submit



  5 Tech Devices to Help You Succeed with an Online Master’s Degree

Studying for a master’s degree can be one of the best steps to take for your career and personal development. Whether you want to pursue an academic career and go on to gain further qualifications such as a doctorate, or want to use your master’s degree to further your career prospects, earn a promotion in your current job or even facilitate a career change, there are many reasons why more and more people are choosing to return to education. The opportunity to study for a master&rsqu...

   CAREER,MASTER,STUDY,TECH DEVICE     2019-05-29 10:46:07

  The 5 types of programmers

In my code journeys and programming adventures I’ve encountered many strange foes, and even stranger allies. I’ve identified at least five different kinds of code warriors, some make for wonderful comrades in arms, while others seem to foil my every plan. However they all have their place in the pantheon of software development. Without a healthy mix of these different programming styles you’ll probably find your projects either take too long to complete, are not stable enou...

   Programmer,Type,Anti-Programmer,OCD     2012-01-11 04:40:09

  The war with spam comment

Spam comments are annoying and notorious. They are either malicious data from hackers to exploit the loopholes of the site or advertisements posted by robots. These kinds of comments have their own features and patterns, if we are careful enough, we can find ways to block most of them although it's not so easy. To block the comment with malicious executable codes such as JavaScript, we should remember one rule : never trust user input. So wherever there are user inputs, we need to check the vali...

   Spam comment,Block,Filter     2013-11-29 20:29:43

  Essential Rules To Protect Your Credit Card When Shopping Online

You have to protect yourself and your credit card online while shopping. There are a number of ways to do this, but some prove more technical than others. Your basic best defense includes sensible use and layers of protection. The best way to do this is to pick and choose which stores at which you charge purchases. You can reduce the chance of losing your card details to a thief by declining to allow the retailer to store your credit card. Use a password manager to save your passwords and make a...

   SECURITY,CREDIT CARD,MASTERCARD     2019-10-09 08:40:07

  Some laws of interactive design

The well known quote from Alan Cooper is   Conforming to the standard unless there is a better choice. There are some best practices in interaction design. How many do you know? 1. Fitts' Law The time from one start point to target point is determined by two parameters: The distance to the target and the size of the target. )D and W in above picture), the formula is : T=a+blog2(D/W+1). It was first proposed by Paul Fitts, it is mathematical model used to predict the time from any poin...

   interaction design, laws, Fitts' law     2012-11-16 11:25:24

  A mini guide to HTTP referer

In HTTP header, there is a field named Referer which is to provide the referrer of the current accessed page. In this post, we will introduce the usage of HTTP referer field. On the web, when a user visits a webpage, s/he must be from some place. This place is usually referred a s referer. This information is very important to some website operators and server owners as they want to know where they get the traffic from and this helps them provide better service for potential targeted users. In t...

   HTML,HTTP REFERER,REFERRERPOLICY     2019-06-29 02:23:25

  Is The Cloud Finally Catching Up With Mighty Oracle?

Oracle for years has seemed impervious to cloud computing. First Larry Ellison dismissed it. Then he sort of touted it, his version at least. But all along, Oracle was growing nicely. The industry chatter didn’t seem to matter. Big companies buy big software systems. Something changed this winter.   Oracle’s software license sales limped up just 2% in December, and the company blamed customer budget cuts and fears over the European debt crisis. Sales to Europe, Africa and...

   Cloud,Oracle,Incorporation,Trend     2012-02-23 07:17:03

  Publish Your Go Package on pkg.go.dev

go.dev is a site where various resources for Go developers are shared, such as “Get Started”, Tutorial, Packages (pkg.go.dev), and all the official blogs. Among them, Packages is where I visit most, which allows free access to all the open-source Go packages submitted by communities including the native Golang packages. Thanks to all the contributors, I enjoy the great benefit, and sometimes I want to be a contributor myself. Let’s submit a “complete” package t...

   GO.DEV,PUBLISH PACKAGE,GOLANG     2022-06-12 00:31:20

  Standardizing Python WSGI deployment

Over the past year I have been testing all of the new python platform as a service companies that have popped up, and I have posted my notes on my blog so that everyone can learn from my experiences. ep.io, apphosted.com, gondor.io, dotcloud.com, DjangoZoom.com, Heroku, Django hosting roundup, All and all, the platforms were very similar, they allowed you to easily host your python/django project without having to worry about managing a server or other typical system administr...

   Python,Standard,WAR,Java     2011-12-31 15:39:44

  SameSite attribute in cookie

Starting from Chrome 51, a new attribute SameSite has been introduced for browser cookie. This attribute is to prevent CSRF attack. Cookie is normally used to store data exchanged between client and server. It frequently stores user login information. If a malicious website can forge a HTTP request with the valid third party website cookie, it may be called a CSRF attack. For example, if a user logins to a bank website your-bank.com, the bank server responds a cookie: Set-Cookie:id=a3fWa; L...

   JAVASCRIPT,COOKIE,SAMESITE,CHROME,CSRF     2019-09-14 04:57:51