SEARCH KEYWORD -- Software engineer



  Becoming a Better Developer, Part 1: Making Fans

If you're trying to grow your startup you've come to the right place. Get my 170-page ebook on how to grow a startup and join thousands of self-funded entrepreneurs by subscribing to my newsletter at right. This is the first of what I hope to become an ongoing series about non-technical ways to improve yourself as a developer. Becoming a better developer involves more than learning new technical skills; learning about your company and co-workers will dramatically improve the software y...

   Developer,Tips     2011-06-29 08:38:26

  Fujitsu CTO: Flash is just a stopgap

Flash is a necessary waystation as we travel to a single in-memory storage architecture. That's the view from a Fujitsu chief technology officer's office. Dr Joseph Reger, CTO at Fujitsu Technology Solutions, is that office-holder, and – according to him – flash is beset with problems that will become unsolvable. He says we are seeing increases in flash density at the expense of our ability to read and write data. Each shrink in process geometry, from 3X to 2X and onto 1X, ...

   Flash,Memory,Bottleneck,Limitation,Futur     2011-08-12 07:31:34

  Recover deleted file in Linux EXT3 file system

Environment : CentOS 5.3 x86_64, /dev/sdb1 is the data segment /data0. EXT3 file system. Problem : /data0/tcsql/cankao/phpcws-1.5.0/httpcws.cpp is deleted mistakenly and httpcws.cpp is not backed up. It will take much time to rewrite this program again. So we must recover it back. debugfs is feasible in EXT2 file system, but in EXT3 file system, it's not very useful. There is one open source software called ext3grep which can help us recover deleted file in EXT3 file system. The recovery steps a...

   Linux,EXT3,File recovery     2013-08-16 07:06:45

  When and Where to Use Pointers in Go

When declaring variables in Go, we usually have two syntax options: In some scenarios, pointers; in others, reference; sometimes, either. It’s great to have choices, but it is also confusing sometimes as to which one in which scenario. To be more reasonable in choice-making, I started from pointers, walked through their natures, and summarized some rules in using them in Go. from unsplash, Jordan Ladikos Pointers Go has pointers. A pointer holds the memory address of a ...

   POINTER,GOLANG     2022-05-01 02:24:43

  How to hire an idiot

Wow, I remember how idealistic I was when I was about to bring on my first employee! After dealing with bad bosses over my career, after doing a whole lot of thinking about how I was going to be a great boss, and after doing a whole lot of reading about how to hire effective people, I was really looking forward to it. I was going to:-- Hire people smarter than myself, who get things done!-- Trust them to do their job, let them do their job and give them enough resources to do it!-- Pay them WELL...

   Employee,Idiot,Work experience,Pay,Process     2011-10-24 11:47:54

  Dart is to JavaScript as C# is to C++

Given the background of Lars Bak, the Google engineer whose V8 JavaScript interpreter upended Firefox's claim on speed, it was reasonable to suspect Google's new Web development language might look a lot like Smalltalk. But that might have taken the Web in a strange and different direction. Today, on the day of a Web developers' conference in Denmark, Google and members of the Chromium open source development team raised the curtain on Dart, the company's bid for a new and somewhat more str...

   Dart,Google,JavaScript,Virtual Machine,Chromium     2011-10-21 08:40:09

  IoT System Cyber Attack Case Study 02: Python Deserialization Attack and Library Hijacking Attack

Project Design Purpose: The objective of this cyber attack case study is to develop a workshop that demonstrates how a red team attacker can permanently compromise a people detection radar IoT device. The attack path is achieved through a series of attacks, including traffic eavesdropping, data deserialization attacks, web shell attacks, remote command/code execution, and Python library hijacking attacks. This case study is intended for IoT and data security professional training, aiming to ill...

       2024-07-14 01:40:09

  Announcing the Windows 8 Editions

Today I would like to share information with you on the editions that will be available for "Windows 8" when it is released to market. We have talked about Windows 8 as Windows reimagined, from the chipset to the user experience. This also applies to the editions available – we have worked to make it easier for customers to know what edition will work best for them when they purchase a new Windows 8 PC or upgrade their existing PC. Windows 8 has the flexibility you need - whether...

   Windows 8,Windows RT,New version     2012-04-17 06:19:16

  Screen recording in Windows 10

Have you ever wondered how to take screen recording easily on Windows? Normally you would think to download some software online and install it on your machine such as Camtasia. However, many of them are either non-free or uneasy to use. Fortunately, there is a built-in tool provided in Windows 10 which can be used to take simple screen recording plus audio recording. The tool is called the Game Bar which is primarily intended for gamers to take screenshots of their plays and achievements. Don't...

   WINDOWS 10,GAME BAR,SCREEN RECORDING     2018-03-06 11:42:07

  Including Related Objects in Queries

Every time you hit a mobile network, it slows your users down and introduces another point of failure. So when you're designing your application, you need to take advantage of every opportunity to omit needless requests. Parse's philosophy is to help make this easier by providing standard ways to reduce network requests. One example is caching queries, which lets you avoid resending requests you've already sent. Another example, which we've launched in the most recent version of the...

   Software design,Request,Network load,Resource manage,Mobile     2011-12-07 08:51:56