SEARCH KEYWORD -- AVALANCHE EFFECT
GoLang to build smaller executable file
Normally the executable file built with go is a bit large, it is always desired that a smaller executable file should be generated though. In this post, a couple of ways to reduce the size of the executable will be introduced. The end effect is that the executable file size would be much less than the normal generated one. The file which is built normally has below size. Mode LastWriteTime Length Name ---- ------------- ------ ---- -a---- 12/14...
GOLANG,EXECUTABLE 2019-12-13 20:10:45
Reasons to use blue in design
Blue color is used in many product designs and logo designs such as Facebook, Microsoft, Twitter and our site. Why do companies choose blue color in their design? It's not a coincidence for them to choose blue. One saying is the color blue is associated with trust, efficiency, clarity and simplicity. Beside this reason, are there other reasons? From an interface design standpoint, blue is an incredibly useful color. Among the dark colors designers have in their toolbox, red, orange and green al...
noConflict mechanism in jQuery
Many JavaScript frameworks like to use $ as function or variable name, jQuery is one of them. In jQuery, $ is just a reference to window.jQuery, so even if $ is deleted, window.jQuery will still be available to ensure the whole library can work normally. jQuery API design takes fully consideration of multiple frameworks conflicts, we can use jQuery.noConflict function to easily handle control. jQuery.noConflict accepts one optional boolean parameter[1] to determine whether to hand jQuery object ...
jQuery,noConflict,$ 2013-03-14 19:40:36
Let browser prompt for storing password when doing AJAX login
In Web 2.0 era, more and more web applications are using AJAX to replace the traditional HTML form element to perform user login. This usually provides a better user experience than form submission. But it also brings a side effect to the end users. That is the browser will not prompt the user whether s/he wants to save the password so that s/he no needs to enter the username/password again when visiting the same site next time. Below is the code snippet which does the AJAX login. <scri...
Turn on SecurityManager in Java
SecurityManager in Java is to check whether the application codes can access some restricted resource such as file, socket etc. This can be used in applications which have high security requirements. With this feature turned on, our system resources can be secured with only permitted operations. When JVM starts, it will first check whether the SecurityManager is on by checking the system property java.security.manager, if it's on, then an instance of SecurityManager will be created and it can be...
SecurityManager,enable,program 2013-12-16 05:03:53
Commonly used AJAX frameworks
Have you ever wondered to design your website like desktop applications? Fortunately, with AJAX we can achieve this. By using AJAX, we no need to refresh the whole page when we just want to update a portion of a website such as the weather information or news panel. This makes our web apps look like desktop applications and bring good user experience to our visitors. You can create an XMLHttpRequest object every time when you want to initialize an AJAX call, unfortunately you may need repeat eve...
How to be jQuery-free?
jQuery is now the most famous JavaScript library. There are around 57.3% websites in the world using jQuery, i.e, 6 out of 10 websites are using jQuery. If we only consider those websites which use libraries, then the percentage is even higher which is 91.7%. Although jQuery is very popular, its size is still a headache to many websites maintainers. The uncompressed jQuery 2.0 has a size of 235KB, the size is 81KB after optimization.The jQuery 1.8.3 which supports IE 6/7/8 has a uncompressed si...
jQuery,JavaScript,ECMAScript,CSS3 2013-05-13 11:53:20
Twitter prosecuted five companies
Recently Twitter sought help from law enforcement agencies because they can not stand spam emails. On Thursday, Twitter prosecuted five separate companies which provide tools so that spam on Twitter can be spread easier.Twitter said in a statement, Twitter now has 140 million active users, and the number of users are still increasing quickly, as Twitter continues to grow, spam also began looking to come to. Although the content of the spam on Twitter is not the proportion, it still gave rise to ...
Twitter,Spam,Prosecution 2012-04-06 01:58:37
An easy way to log client side information to server
JavaScript debug is a very troublesome thing in web application development. Because many web browsers will not notify you if there is any error in the JavaScript codes you write. They just silently fail and block the following codes execution. In order to debug JavaScript codes, we need a good log mechanism which will help us log the error information,, we often need to log errors in JavaScript codes to server for debug purpose in a production web application, What should we do? The first ...
JavaScript log, Ajax,Image,Debug 2012-12-30 09:16:50
CSS3 animation vs CSS3 transition
Both CSS3 animation and CSS3 transition can be used to transition an element in a webpage. They can be used to transition some CSS properties within a given period of time. They have many similarities. They do have a few differences as well. So an user needs to understand the differences between them in order to better use them in different scenarios. First, let's see an example on how to change the width of a div from 100px to 200px within 2 seconds when hovering on it. With CSS3 animation , th...
CSS3 animation,CSS3 transition, Difference 2015-06-15 08:46:39
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>