SEARCH KEYWORD -- SYSTEM
Leaving comments in real life
As a programmer I like to write comments because I know that some future person (often me) is going to need to know something about my code that won't be immediately obvious from reading it. Here's a recent example from my homebrew display's code:// protocol_init: Set up a newly powered-on string of lights. The lights are arranged// in an array wired diagonally starting from the bottom left. For ease of programming// it's better if they are given numbers which correspond to coor...
Comment,Programming,Style,Format,Coding standard 2011-11-15 11:42:19
PopCap’s 10 rules for commercial failure in mobile games development
PopCap, the company behind social gaming hits as Plants vs. Zombies and Bejeweled, has a way of doing presentations at conferences. Last year’s Social Gaming Summit presentation was insightful in the sense that developers were advised to postpone trying to make money from their game until there is some serious traction. At yesterday’s London Games Conference, PopCap’s presentation was equally remarkable. During a brief presentation David Bishop (Senior Game Designer) ...
Game design,Rules,Smart phone 2012-04-16 13:25:27
10 rules of PHP-masters
1. Use PHP only when it is necessary – Rasmus Lerdorf There is no better source than the creator of PHP, to learn what he can do. Rasmus Lerdorf created PHP in 1995. Since then, the language has spread like a wildfire rate in the developer community, incidentally changing the face of the Internet. However, Rasmus did not create PHP with these intentions. PHP was created for the needs of web development. As is the case with many other projects wi...
PHP,Master,Experience,Advice 2011-12-16 09:38:07
The 10 Greatest Hacks of My Life
My co-founder and I briefly considered applying to YCombinator for the Winter 2012 session. We eventually decided to bootstrap Curvio initially, and raise a seed round on our own after we launch (so far so good!). But looking over the YC application, one question intrigued me:Please tell us about the time you, tansey, most successfully hacked some (non-computer) system to your advantage.Now, there are a lot of ways to interpret this. A mechanical interpretation would be about...
Hack,Most important,Example,Curvio 2011-10-22 12:47:42
Vim anti-patterns
The benefits of getting to grips with Vim are immense in terms of editing speed and maintaining your “flow†when you’re on a roll, whether writing code, poetry, or prose, but because the learning curve is so steep for a text editor, it’s very easy to retain habits from your time learning the editor that stick with you well into mastery. Because Vim makes you so fast and fluent, it’s especially hard to root these out because you might not even notice them...
Vim,Anti-pattern,macro,syntax 2012-02-08 10:06:15
New Text-to-Speech API for Chrome extensions
Interested in making your Chrome Extension (or packaged app) talk using synthesized speech? Chrome now includes a Text-to-Speech (TTS) API that’s simple to use, powerful, and flexible for users.Let’s start with the "simple to use" part. A few clever apps and extensions figured out how to talk before this API was available – typically by sending text to a remote server that returns an MP3 file that can be played using HTML5 audio. With the new API, you just need to add "...
TTS,Google,Speech,Text,Text to Speech 2011-10-21 08:46:41
Python SSH Connection Tools
Program Design Purpose: We aim to create a simple Python SSH tool library that facilitates SSH communication, SCP file transfer, and SSH port forwarding through multiple jump hosts in an SSH tunnel chain. The library is designed to provide a simple API for establishing nested SSH tunnel connections through multiple jump hosts with customizable TCP ports. This allows users or their programs to automate SSH tasks such as: Batch processing SSH connection tasks, such as connecting to multiple ser...
Goodbye Manual Processes, Hello Automation Certificate Lifecycle Management Like It’s Supposed to Be
At the heart of every story lies a villain and a hero. In the never-ending story of certificate lifecycle management, there’s no bigger villain than manual effort. Destructive, irrepressible, and risk-laden, this villain causes nothing but mayhem and loss. Automation, the hero, is the complete opposite of manual effort. Proactive, solution-oriented, and breach-proof, this hero deserves recognition, allegiance, and attention, yet they get none of that from a majority of today’s organi...
DATA SECURITY,CERTIFICATE 2023-06-20 08:10:02
10 Great Tips On How To Become A Successful Android App Developer
Android operating system is very popular among people and makes app development for Android market fruitful. There are many professionals who are trying to come up with great ideas and create great apps, but not all of them are really dealing with it. So, what do you need to become a successful Android-apps developer? What You Need for Becoming an Android App Developer 1. Acquire technical skills. You must know the necessary tools to become an Android app developer. You do not actually need to ...
IT System Cyber Attack Case Study 01: Malicious Macro and Backdoor Trojan Attack on IT-Network
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop showcasing a practical demonstration of a red team attacker implementing an IT system/network attack via a Malicious Macro MS-Office-Word file (CVE-2015-1641) and phishing email generation program to penetrate multiple layers of firewall defenses and implant a backdoor trojan into the railway system's OT network. Related Links: GitHub Project Link , LinkedIn Post Link Attacker Vector: Malicious Macro ...
RECENT
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- more>>