SEARCH KEYWORD -- CONTENT SECURITY POLICY
#46 – Why software sucks
No one makes bad software on purpose. No benevolent programmer has ever sat down, planning out weeks of work, with the intention of frustrating people and making them cry. Bad software, or bad anything, happens because making things is hard, making good things doubly so. The three things that make it difficult are: Possessing the diverse skills needed not to suck.Understanding who you’re making the thing for.Orchestrating the interplay of skills, egos and constraints over the course of...
Software design,Sucks,Software industry 2012-03-19 13:10:37
The Anatomy of a Perfect Web Site
Many sites on the web are good. They are well-designed, clear, have great information architecture and are easy to navigate. Often, web designers emphasize the “design†part too much, and neglect the other equally important things. However, there are sites which aren’t that aesthetically pleasing, but still are the best sites in the world. They may look like a big, sad bag of wrestling underwear on the outside, but their underlying user experience is really, really refine...
Website,web design,Anatomy,Interaction,Feature 2011-11-08 09:00:34
C Preprocessor Hell
Lisp programmers should stop reading right now because they'll likely suffer severe injury of the jaw muscles as they laugh themselves silly at how hard it is to do some things in C. The C language has a pre-processor (typically called cpp) that is both infuriating and powerful. How powerful is usually best described as 'just too little' and it has happened more than once that I found myself almost - but not quite - able to do what I wanted to do. The frustration can run very deep at ti...
C,Preprocessor,Lisp,Hell 2012-01-19 10:22:31
How To Make Sure Your Next Date Isn’t A Psychopath Via Online Checks
Online dating is pretty much the norm these days when it comes to looking for love, but it can't be denied there’s still a bit of a stigma attached and most certainly an air of mystery. After all, until you meet face-to-face there’s no real way of knowing who they are. It’s putting your faith in a stranger and, of course, that’s more often than not absolutely fine. Over the years though there have been a number of horror stories and it’s enough to put even the most...
Man Survives Steve Ballmer’s Flying Chair To Build ’21st Century Linux’
Mark Lucovsky, famous for building Windows NT and watching Steve Ballmer throw a chair.Mark Lucovsky was the other man in the room when Steve Ballmer threw his chair and called Eric Schmidt a “fucking pussy.â€Yes, the story is true. At least according to Lucovsky. Microsoft calls it a “gross exaggeration,†but Lucovsky says that when he walked into Ballmer’s office and told the Microsoft CEO he was leaving the company for Google, Ballmer picked up his chai...
VMWare,Founder,Mark Lucovsky,Microsoft,Google,Cloud Foundry 2011-11-25 03:00:39
Nokia : Nokia map is better than Apple map
Recently, the new release of Apple map is criticized by many users because of its search results accuracy. By this time, Nokia which has its map service Ovi Maps has a comparison of three maps in its Conversations blog. These three maps are the one on the Lumia 920, the Google Map on Samsung Galaxy S3, the map on Apple iPhone 5, It wants to show that Nokia is the best among them. Let's take a look:1. Offline modeOn Lumia 920 Map, the map of the entire country is downloaded, you can position, sea...
Why I left Google
Ok, I relent. Everyone wants to know why I left and answering individually isn’t scaling so here it is, laid out in its long form. Read a little (I get to the punch line in the 3rd paragraph) or read it all. But a warning in advance: there is no drama here, no tell-all, no former colleagues bashed and nothing more than you couldn’t already surmise from what’s happening in the press these days surrounding Google and its attitudes toward user privacy and software develo...
James Whittaker,Google,Leave,Microsoft,Ad 2012-03-14 13:43:44
IoT System Cyber Attack Case Study 02: Python Deserialization Attack and Library Hijacking Attack
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop that demonstrates how a red team attacker can permanently compromise a people detection radar IoT device. The attack path is achieved through a series of attacks, including traffic eavesdropping, data deserialization attacks, web shell attacks, remote command/code execution, and Python library hijacking attacks. This case study is intended for IoT and data security professional training, aiming to ill...
Do We Really Need Wi-Fi in Schools?
Why do I think Wi-Fi is needed in schools? Times have changed. We need to adapt to the changes. I believe the internet is probably the most important tool available today. The world- wide web contains information about anything you could possibly want or need to know. It allows an even playing field for people who don’t have the information and knowledge to be able to get it. Students today are the future. They need to be able to access as much knowledge as possible to be...
GIF’s - Effective Engagement Tool Of Elearning
Elearning has been continuously facing the challenge of keeping the learners engaged. Many methods are being used to ensure that the learner understands the concepts even without an instructor. The inclusion of various multimedia modes like informative audios, videos, games, animations, etc. has become almost necessary to include as these are considered to make the concepts easier to understand. In a nutshell, there are many advantages of using multimedia in an eLearning program, however, ...
RECENT
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- more>>