SEARCH KEYWORD -- ORDER



  PHP Security

1. IntroductionWriting PHP applications is pretty easy. Most people grasp the syntax rather quickly and will within short time be able to produce a script that works using tutorials, references, books, and help forum forums like the one we have here at PHP Freaks. The problem is that most people forget one of the most important aspects that one must consider when writing PHP applications. Many beginners forget the security aspect of PHP. Generally, your users are nice people, they will...

   PHP,Security,SQL Injection,XSS Cross sit     2011-10-01 02:25:31

  Why we don’t hire .NET programmers

Skip my post and read this one instead.  It says the same thing, but less offensively.  (Or, rather, more offensively to Facebook and Google employees, less offensive to .NET developers, though the underlying message is the same.) Tuesday midnight edit: After >500 comments, >1000 tweets, and >1000 Facebook likes, I’m closing comments on this thread so we can all get back to work.  The very last comment takes the cake, however, and is a fitting close.  Th...

   ASP.NET,High level,Low flexibility,Weakness     2011-12-20 08:43:28

  Open Source (Almost) Everything

When Chris and I first started working on GitHub in late 2007, we split the work into two parts. Chris worked on the Rails app and I worked on Grit, the first ever Git bindings for Ruby. After six months of development, Grit had become complete enough to power GitHub during our public launch of the site and we were faced with an interesting question:Should we open source Grit or keep it proprietary?Keeping it private would provide a higher hurdle for competing Ruby-based Git hosting sites, givin...

   Open source,Benefits,Popularity,Advertisement,Advantage     2011-11-23 07:58:15

  Should All Web Traffic Be Encrypted?

The prevalence of free, open WiFi has made it rather easy for a WiFi eavesdropper to steal your identity cookie for the websites you visit while you're connected to that WiFi access point. This is something I talked about in Breaking the Web's Cookie Jar. It's difficult to fix without making major changes to the web's infrastructure. In the year since I wrote that, a number of major websites have "solved" the WiFi eavesdropping problem by either making encrypted HTTPS web traffic an accou...

   Web traffic,Security,HTTPS.Encryption,Wifi     2012-02-24 05:02:58

  A Different Kind of Technical Interview

Everyone who's been programming professionally for a while knows the standard format of the technical interview. You go in, there's a whiteboard in the room, and you write code on it to answer questions.Everyone also has the same basic complaints about these interviews. In a normal work environment, you have access to an API or search engine, but at a whiteboard you don't. Whiteboard questions generally don't include much in the way of overall design, and they're typically limited to simple algo...

   Interview,Programming,Methods,Pairing     2011-06-04 07:56:21

  How Cloud Computing is changing the Face of Business

The world of information is getting bigger and bigger and so does the need for cloud computing is felt broadly across various industries and platforms. The ever growing popularity and adoption are due to the fact that cloud computing is efficient, reliable and secure than any other business model. However, the way cloud computing is adopted across different enterprises may vary. How cloud computing has been adopted worldwide by companies- let us have a look at few statistics that would blow you...

   CLOUD COMPUTING,SOFTWARE DEVELOPMENT,CLOUD SERVICES,CLOUD SOLUTION,SOFTWARE SOLUTIONS     2017-08-22 02:49:53

  Ten things I want Siri to be able to do for me

Now that I've had my iPhone 4S for a couple of days, I'm amazed with what Siri can do. I've asked a number of questions -- real ones, not questions like "What is the meaning of life?" -- and have been totally impressed with how my interaction with the iPhone has changed. But there are more things I'd love to be able to do with Siri, which is the reason for this post.Everyone should understand that Siri is currently a beta product from Apple. A lot of the things I'm talking about here should happ...

   Siri,iPhone 4S,AI,Tweet,Four square,Intelligent agent     2011-10-17 11:24:37

  The "C is Efficient" Language Fallacy

I came across an article yesterday about programming languages, which hit on one of my major peeves, so I can't resist responding. The article is at greythumb.org, and it's called Programmer's rant: what should and should not be added to C/C++. It's a variation on the extremely common belief that C and C++ are the best languages to use when you need code to run fast. They're not. They're good at things that need to get very close to the hardware - not in the efficiency sense, but in the...

   C,GCC,Fallacy,Evolvement     2012-01-09 08:54:46

   How to Calculate Distance in Asp.Net MVC with Google Maps

Internet users are vastly dependent on both Google and Bing mapping tools. The API available for developers provides them an ability to add value to the solutions developed by them.There is no such requirement of using everything. There are times when only a snippet can make a big difference to the app users. In this article, asp.net development experts will explain how to use Google Maps APIs and help office staff to calculate distance. When a team is travelling for the job, they either ride on...

   ASP.NET MVC     2017-03-10 06:29:23

  The 10 Greatest Hacks of My Life

My co-founder and I briefly considered applying to YCombinator for the Winter 2012 session. We eventually decided to bootstrap Curvio initially, and raise a seed round on our own after we launch (so far so good!). But looking over the YC application, one question intrigued me:Please tell us about the time you, tansey, most successfully hacked some (non-computer) system to your advantage.Now, there are a lot of ways to interpret this. A mechanical interpretation would be about...

   Hack,Most important,Example,Curvio     2011-10-22 12:47:42