SEARCH KEYWORD -- Response web design
18 Good Web and Mobile Development Frameworks
iWebKitjQTouchjQuery MobileSencha TouchWijmo – jQuery UI WidgetsThe-M-Project – HTML5 Javascript FrameworkTreesaver.js – Framework for Creating Magazine-Style LayoutsjQuery Form Framework – jFormerNot Just A Grid – Flexible and Modular CSS FrameworkZepto.js – Minimalist JavaScript Framework for MobileGalleria – JavaScript Image Gallery FrameworkGury – HTML5 Canvas Utility LibraryAmplifyMobl – Open-Source HTML5-Based LanguageSproutCor...
20 free fonts for web design
1.Comfortaa2.Quicksand3.Fertigo Pro4.Telegrafico5.Forque6.Romeral7.Sling8.League Gothic9.Molot10.Junction11.Tertre12.Nevis13.Existence Light14.Mentone15.Walkaway16.Jalane Light17.Insolent18.Kaffeesatz19.Vollkorn20.Gnuolane原文出自:ITeye...
Web design,Fonts,Comfortaa,Quicksand 2011-04-20 00:30:24
Java API vs Framework
What is the difference between a Java Library and a framework? The two concepts are essentially important for a Java developer. The most important difference between a library and a framework is Inversion of Control. It means that when you call a library you are in control. But with a framework, the control is inverted: the framework calls you. (This is called the Hollywood Principle: Don’t call Us, We’ll call You.) This is pretty much the definition of a framework. Basicall...
Difference,API,Framework,Library,Java 2011-12-19 13:40:33
PHP sucks (but, some frameworks don't)
I started web development with PHP, and I've decided I've had enough. Why? Keep reading.PHP (the language) sucks. There, I said it. 1029380128301928301823 GlobalsObject system hacked onC extension system sucksDocumentation sucks (read more; no, I'm not drunk)Has a terrible communityAll in all, designed by total idiots. You've probably heard this a ton of times before, but, here it is again. THERE ARE JUST WAY TOO MANY GLOBALS. Why in the world does md5() need to be global? Do you serio...
PHP,Sucks,Framework,Good,Bad Design 2011-11-20 07:08:16
IoT System Cyber Attack Case Study 02: Python Deserialization Attack and Library Hijacking Attack
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop that demonstrates how a red team attacker can permanently compromise a people detection radar IoT device. The attack path is achieved through a series of attacks, including traffic eavesdropping, data deserialization attacks, web shell attacks, remote command/code execution, and Python library hijacking attacks. This case study is intended for IoT and data security professional training, aiming to ill...
The Day Programmer vs. The Night Programmer
This post is a slightly edited form of an e-mail that I sent around internally last year. But it was suggested to me recently that I post it up to my blog to see what people think – am I right or wrong? Over the years I’ve come to the belief that there are two kinds of programmer in the world, no matter what technology they work with, lets call them: 1. Day Programmers 2. Night Programmers Now ...
Programmer,Day programmer,Night programmer,Difference 2012-03-05 05:12:09
Round Peg, Square Hole: How to Know If a Developer is a Good Fit for Your Team
Over the last few months, we have been recruiting developers, and we’ve started to get a sense for the type of developer who is a good fit for our team. These attributes probably apply for developers at most web startups, so I wanted to share them with you. Before I get into it, the most important thing to know is that technical skill is a threshold requirement. The assumption is that any person who is a fit for our team will have the relevant technical experience t...
Recruitment,Gire ,Employee,Skill 2011-07-09 09:50:54
How Integers Should Work (In Systems Programming Languages)
My last post outlined some of the possibilities for integer semantics in programming languages, and asked which option was correct. This post contains my answers. Just to be clear: I want practical solutions, but I’m not very interested by historical issues or backwards compatibility with any existing language, and particularly not with C and C++. We’ll start with: Premise 1: Operations on default integer types return the mathematically correct result or else trap. This is th...
Number,Algorithm,System,Embedded system 2011-12-05 12:48:41
Why I Will Never Feel Threatened by Programmers in India
I got a call from a friend of a friend the other night. It was a fellow with whom I’d talked 11 months ago about a project he and his partner were looking to start. We established then that I wasn’t the guy for him, that I was likely too expensive for their big-dreams, small-means budget. Fast forward to present day: their project is still not launched, it’s still not right. They’ve paid for something between 600-700 hours of development with a firm in India, an...
Indian programmer,Outsourcing,Poor quality,Low cost 2011-12-05 13:00:13
Why I Will Never Feel Threatened by Programmers in India
I got a call from a friend of a friend the other night. It was a fellow with whom I’d talked 11 months ago about a project he and his partner were looking to start. We established then that I wasn’t the guy for him, that I was likely too expensive for their big-dreams, small-means budget. Fast forward to present day: their project is still not launched, it’s still not right. They’ve paid for something between 600-700 hours of development with a firm in India, an...
Indian programmer,Outsourcing,Poor quality,Low cost 2011-12-05 13:00:04
RECENT
- OT Power Grid System Development
- Fix Surface Keyboard not Working Issue
- Python Process Protection Watchdog
- The Strange Behavior of the void Type in TypeScript
- MySQL Index Merge Optimization Practices
- Applying Large Language Models (LLMs) to Solve Cybersecurity Questions
- Everyone Can Write Tech Blogs
- Python SSH Connection Tools
- Revolutionize Your Event Planning with Interactive Presentation Templates
- New Unreal Engine 5 and Nvidia Technology in Black Myth: Wukong
- more>>