SEARCH KEYWORD -- magento user experience
Why doesn't Google copy successful startup ideas?
Google is definitely one of the largest players in Internet world. It owns the most popular search engine, mobile operating system and mapping service. It not only has huge user base but also is extremely rich. It can copy and create any product that is proven to be successful with its talent pool and money. But why doesn't Google copy those successful startup ideas? Based on the current status quo and culture gene of Google, there are several reasons Google doesn't copy startup ideas. First, Go...
How does computer boot up?
The whole boot process of computer can be summarized in 4 phases. 1. BIOS In the 70's read-only memory(ROM) was invented. The boot program is written into ROM, the first thing the computer does is to read and execute this program when it's powered on. The program in this chip is called "Basic Input/Output System" (BIOS). 1.1 Power-On Self-Test The BIOS will first check whether the computer hardware can fulfill the basic conditions for booting up, this process is called Power-On Self-Test...
Extension context menu is missing in Firefox after restart
If you have experience of writing Chrome extension, you may be familiar with how you can add a context menu for your extension. The code would be similar to below: chrome.runtime.onInstalled.addListener(function() { chrome.contextMenus.removeAll(); chrome.contextMenus.create({ "id": "your_id", "title": "Your Title", "contexts": ["all"] }); }); You need to add a listener listening to the extension install event. Once the extension is installed, create a contex...
CHROME,FIREFOX,EXTENSION,CONTEXT MENU 2018-11-16 20:58:20
Some hidden XSS injection vulnerabilities
XSS injection refers to a Web page generates some unexpected executable js codes based on user input and these executable codes are executed by web browser,i.e, the source code sent to web browser by the server contains some illegal js codes, and these illegal js codes are related to user's input. Common XSS injection vulnerabilities can be fixed with some functions such as htmlspecialchars(escaping HTML special characters) and strip_tags() or similar, but there are some hidden XSS injecti...
XSS,PHP,Security,Code,JavaScript 2012-08-27 20:32:08
Meta tag in HTML header
In server response, we can use response.setHeader() to set the meta information in header of a HTML page. The usage is response.setHeader(name,context); meta is used to simulate the response header of HTTP protocol in HTML page. It should be put between the <head> and </head> tag. 1. <meta name="Generator" content="" > <!--This is to specify the tool which generates this page such as Microsoft FrontPage 4.0 etc --> 2. <meta name="keywords" content=""> <!-- To tel...
What is pjax and why we should use it?
What is pjax? Now many websites such as Facebook, Twitter support one browsing style which is when you click one link on their sites, the page will not be redirected, instead only the page contents are updated and URL on address bar is changed. This kind of user experience is much better compared to load the whole page with a blink. There is one important component in the above browsing experience, these websites' AJAX refresh support browser history, when refreshing the page, the address on the...
Enable mouse scrolling with Apple wireless mouse on Windows PC
Today I was trying to use my Apple wireless mouse on my Windows PC, after pairing the mouse using Bluetooth, it worked fine until I noticed that I couldn't scroll browser pages properly. Tried many ways but all failed. Did some investigation online and found a workable solution. This post will share my experience. To enable mouse scrolling, there is a driver needed to be installed. First to go to Brigadier which is a Windows- and OS X-compatible Python script that fetches, from Apple's...
APPLE,WIRELESS MOUSE,SCROLLING,WINDOWS 10 2022-10-01 01:44:37
What to Know About Windows 11
Windows 11 launched in October, with Microsoft bringing some changes to the operating system. It was the first name change in six years, and the rollout began on October 5. The rollout is being phased on eligible devices. You can download it if you don’t want to wait for it to be your device’s turn. Some businesses are opting to defer upgrades to Windows 11, as are some individuals. Others are excited to take advantage. The following are some things to know about impleme...
MICROSOFT,WINDOWS 11 2021-12-06 10:41:04
How to Deal with Accusations of Negligence as a Business
Understand the nature of negligence Professional negligence claims can arise from various situations. These range from missed deadlines to alleged errors in service delivery. Understanding what constitutes negligence in your industry is the start of both prevention and defense. Specific standards vary by field, but negligence generally involves failing to provide the level of care that a reasonably competent professional would deliver under the circumstances. Many businesses face accusati...
INSURANCE,ERROR AND OMISSION 2025-02-13 06:59:28
GoLang Interview Questions
Below lists some frequently asked GoLang interview questions and their corresponding answers based on the author's experience. The list is updated frequently with new understandings. Stay tuned. What is the GMP model of GoLang? GoLang uses goroutine to achieve concurrency and it is famous for high concurrency support as the language defines its own goroutine dispatching and processing system which is well known as GMP model. How it works is that M is normally defined as the OS thread being spawn...
MEMORY,CONCURRENCY,INTERVIEW QUESTION,GOLANG 2024-05-25 03:08:18
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>