SEARCH KEYWORD -- TYPE



  An open letter to those who want to start programming

First off, welcome to the fraternity. There aren’t too many people who want to create stuff and solve problems. You are a hacker. You are one of those who wants to do something interesting. “When you don’t create things, you become defined by your tastes rather than ability." – WhyTheLuckyStiff Take the words below with a pinch of salt. All these come from me – a bag-and-tag programmer. I love to get things working, rather than sit at something and over-o...

   Tips,Programming,C,C++,Java,Skill,Develo     2011-08-11 11:24:50

  40+ Techniques to enhance your php code

1. Do not use relative paths , instead define a ROOT path Its quite common to see such lines : 1require_once('../../lib/some_class.php'); This approach has many drawbacks : It first searches for directories specified in the include paths of php , then looks from the current directory. So many directories are checked. When a script is included by another script in a different directory , its base directory changes to that of the including script. Another issue , is that when a script is being ru...

   PHP,Quirk,Trick,Efficiency,Techniques     2012-04-10 13:06:55

  CSS3 & HTML5 Support in Browsers

Last week we launched FindMeByIP.com, a simple app which reveals your browsers' support for CSS3 and HTML5 features in an easy to read format using Modernizr.We've had a great response and we're going to be implementing some of your feedbackin the near future.UPDATE: Check out our Web Designers' HTML5 & CSS3 ChecklistFor now though I thought people mind find it useful to know the state of support in the current browser market.  I've taken all the A-Gra...

   CSS,HTML5,Web browser,Support     2011-05-14 11:26:45

  A Guide on Creating a Magento 2 Extension

Normal 0 false false false EN-US X-NONE X-NONE

   MAGENTO, MAGENTO 2,MAGENTO 2 MODULE CREATOR     2016-02-29 03:08:08

  3 Most Popular Ways Hackers Steal Your Phone Data – Stay Safe

Our mobile devices store personal information, including passwords, usernames, birthdates, financial information, social security numbers, PIN, etc. Hence, this makes hacking a mobile phone an attractive option for hackers and scammers. There are various techniques that hackers use to spy on a mobile phone for personal information. Also, stalkers can make use of spy apps and malicious software to spy on unsuspecting people. Mobile phones are not secure because these devices connect to other net...

   TECH     2019-11-29 00:29:40

  Twenty Years of Linux according to Linus Torvalds

Summary: In an interview, Linus Torvalds talks about Linux’s multiple 20th birthdays and life with Linux.The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux, started the celebration of Linux’s 20th anniversary at the Linux Foundation Collaboration Summit, but when is Linux’s real birthday? Is it August 25th, when Linus announced the project? October 5th 1991, when 0.02, the first public release was made? I decided to go st...

   Linux,Linus Tonalds,Interview,Developmen     2011-09-28 09:39:10

  Asus ZenBook 3 vs MacBook: Has Apple Met Its Match?

With its upcoming ZenBook 3, Asus is the latest company to compete with Apple's superthin 12-inch MacBook. Due out later this year, the 12.5-inch laptop is even slimmer than the MacBook and one-ups Apple's offering with a faster CPU and a range of fashion colors. Though we haven't been able to test the ZenBook 3 in our labs yet, we've studied the specs and spent some hands-on time with the slim system to learn about its capabilities. So based on what we know today, which superslim not...

   ZENBOOK 3,PREMIUM LAPTOP,MODEL WITH 8GB,ASUS     2016-06-07 01:15:56

  Internet trends and your web development strategy

Takeaway: Ryan Boudreaux looks at some of the latest reports on how users are spending their time on the web. Keeping an eye on trends is one way for web developers to stay current. Recent figures in Internet activity include several interesting trends, including: the number of smartphone-user adoption rates Cyber Monday sales figures mobile banking app usage social networking on mobile social media hours spent online search habits Trends in worldwide Internet activity may or may not translate ...

   Internet trend,Mobile,Web design,Web app     2012-02-01 00:02:29

  Man Survives Steve Ballmer’s Flying Chair To Build ’21st Century Linux’

Mark Lucovsky, famous for building Windows NT and watching Steve Ballmer throw a chair.Mark Lucovsky was the other man in the room when Steve Ballmer threw his chair and called Eric Schmidt a “fucking pussy.”Yes, the story is true. At least according to Lucovsky. Microsoft calls it a “gross exaggeration,” but Lucovsky says that when he walked into Ballmer’s office and told the Microsoft CEO he was leaving the company for Google, Ballmer picked up his chai...

   VMWare,Founder,Mark Lucovsky,Microsoft,Google,Cloud Foundry     2011-11-25 03:00:39

  All I Know About Certificates -- Websites

In last article, we know the role of clients and their responsibilities for certificate verification. Finally, let's talk about websites. We've discussed many potential issues between CAs and clients concerning certificates, but the most frequent issue is with websites—many websites have faced this problem: certificate expiration. Websites need to ensure two things: Ensure their certificate does not expire. Protect their private key from being leaked. If someone else obtains the priv...

   CLIENTS,WEBSITES,SSL CERTIFICATE,CERTIFICATE AUTHORITY,CA     2024-07-26 22:33:29