SEARCH KEYWORD -- TOP SOFTWARE COMPANIES
Opinion: The Elusive 'Quick Iteration' - Tips for Indie Devs
[In this reprinted #altdevblogaday-opinion piece, WB Games/Kindling Games' Kristen Bornemann offers independent developers advice on iterating and shipping their projects as fast as possible.] From agile and scrum to extreme programming, everyone's trying to nail down what it takes to iterate on products quickly and efficiently. There are a lot of methodologies that you can employ to guide you through shipping products. But today, I'll be talking specifically about video games and how, as a...
Game,Electronic,Efficient,Development me 2011-08-15 07:41:47
Redesigning the Technical Hiring Process
Since my last post on technical interviews, I’ve been fairly involved in hiring at Pulse as we grew our team from 6 people when I joined last November to 14 full-timers. In my previous post, I suggested that technical interviews, in the conventional sense, are not especially effective (by technical interviews, I mean the traditional 45 minute coding-at-a-whiteboard and algorithm puzzlers interviews). Those do a great job of telling you how well a candidate is at acing those types o...
Career,Recruitment,Process,Developer,Ski 2011-09-14 12:01:37
Emacs adventures
I have been using Emacs for over a year now. I actually didn’t learn a lot when I started using it (just the basics to get going and then some relatively common keyboard shortcuts), but lately I have been reading and learning much more about it. I’m so grateful by everything I’ve learned from different people on the net that I wanted to share a couple of things I’ve learned, and a simple major mode for editing AsciiDoc documents. As a long-time VIM user, I f...
Top 10 PHP Best Security Practices for Sys Admins
PHP is widely used for various of web development. However, misconfigured server-side scripting would create all sorts of problem. And here are php security best practices that you should aware when configuring PHP securely. Nowadays most of the web servers are operated under Linux environment (like: Ubuntu, Debian...etc). Hence, in the following article, I am going to use list top 10 ways to enhance PHP Security Best Practices under Linux environment. My sample setup for PHP Security Tips: D...
PHP,code security,System admin,Advice,Best practice 2012-02-01 00:04:37
Could coding be the next mass profession?
Like farming was in the 17th century, factory work during the industrial revolution, construction during the Great Depression, and manufacturing after World War II. Better, because writing code is a creative act which can be done with or without a traditional (antiquated?) office-based job, and can create enormous personal and economic value. Most young people start in jobs that don’t have much of a future. Most don’t get higher education – only a third get a...
Coder,Learning,Training,Profession 2012-01-05 08:02:50
Concise bash programming skills
The following are some concise bash programming skills which we may need in our daily programming work. 1. Check status of command execution The usual way: echo abcdee | grep -q abcd if [ $? -eq 0 ]; then echo "Found" else echo "Not found" fi Concise way: if echo abcdee | grep -q abc; then echo "Found" else echo "Not found" fi Of course you can remove if...else with following code [Sun Nov 04 05:58 AM] [kodango@devops] ~/workspace $ echo abcdee | grep -q ...
Why using anchors as buttons sucks
So let's say you're an awesome web developer making an awesome web app. One day, you add a link in the web app that has an event handler instead of an href. Testing it, you realize that your cursor doesn't change when hovering over it, unlike a normal link. You think for a minute and then give it a cursor:pointer style, which fixes the issue. You are happy.The next day, QA informs you that the link cannot be tabbed to. Confused, you do some research and find a solution to the problem: Sim...
Different types of keystore in Java -- Overview
Keystore is a storage facility to store cryptographic keys and certificates. They are most frequently used in SSL communications to prove the identity of servers and clients. A keystore can be a file or a hardware device. Three are three kinds of entries can be stored in a keystore depending on the types of keystores. The three types of entries are: PrivateKey : This is a type of keys which are used in asymmetric cryptography. It is usually protected with password because of its sensitivity. It ...
JAVA,KEYSTORE,OVERVIEW,JKS,PKCS12,JCEKS,PKCS11,DKS,BKS 2014-08-18 02:09:54
Top 10 Reasons to Use HTML5 Right Now
So you’re still not using HTML5, huh? I guess you probably have your reasons; it’s not fully adopted yet, it doesn’t work in IE, you don’t like users, you’re out of touch or you are just passionately in love with writing strict XHTML code. HTML5 is the revolution that the web needed and the fact is, it is the future whether you like it or not — suck it up and deal. HTML5 isn’t hard to use or understand and even though it’s not fully a...
HTML5,Accessibility,Cross browser compatibility 2011-12-08 02:52:38
C++11 multithreading tutorial
The code for this tutorial is on GitHub: https://github.com/sol-prog/threads. In my previous tutorials I’ve presented some of the newest C++11 additions to the language: regular expressions, raw strings and lambdas. Perhaps one of the biggest change to the language is the addition of multithreading support. Before C++11, it was possible to target multicore computers using OS facilities (pthreads on Unix like systems) or libraries like OpenMP and MPI. This tutorial is meant to get you st...
C++,Multithreading,Standard 11,Demo 2011-12-18 00:50:35
RECENT
- The Ultimate Guide to Implement Function Overloading in Python
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- more>>