SEARCH KEYWORD -- TYPE
Lessons Learned while Introducing a New Programming Language
I've used a lot of languages (professionally) over the years: (off the top of my head) Cold Fusion, HTML, Javascript, php, SQL, CSS, ASP(classic & .net), C#, Ruby, Flex, Java, & Clojure. Each language has pros and cons. Being a programmer, it's easiest to discuss the cons - and in general I believe it was best said:I hate all programming languages - Matt FoemmelI think it's important to start with this in mind. At some point you're going to hate what you're advocating, so imagine h...
Experience,New language,Tips,Risk 2012-03-05 05:13:59
10 super useful PHP snippets you probably haven’t seen
When working with PHP, it is very useful to have a “toolbox†of handy functions and code snippets that can save lots of time when needed. Today, I’m going to show you 10 super useful code snippets that you probably never heard of. Text messaging with PHP using the TextMagic API If for some reason, you need to send text messages to your clients cell phones, you should definitely have a look to TextMagic. They provide an easy API which allow you to send SMS to cell...
PHP,Code,Snippet,Useful code segment 2012-01-19 11:07:16
5 Reasons to Join a Startup After Graduating
After I wrote my last post, a surprising number of people emailed me asking why I decided to join a startup after graduating from Duke. Many of those I heard from face similar decisions today: either they are college seniors choosing between a big company and a startup, or they are recent graduates who work at a big company and are thinking about making the switch. What’s interesting is that most are already leaning towards the startup career path: it seems they just want someone to ...
Startup,Graduation,Work,Advice,Passion,Learn 2011-11-23 08:12:13
bakercom1 5 Ways to Make Your IT Staff Unpoachable
When it comes to hiring practices, the tables have turned – capsized, actually. After a global recession saw thousands of jobs lost in IT departments everywhere, now the race is on to hire swarms of top talent. The trouble is: There isn’t enough talent to go around, and the threat of losing key staff to “poachers†is growing daily. “In the current war for talent in Silicon Valley, a lot of leaders believe that it is not possible to compete with the Google an...
IT,Experts,Keep,Unpoachable 2011-07-25 08:35:49
It’s Not China; It’s Efficiency That Is Killing Our Jobs
The majority of wealth is now concentrated at the top of the social ladder. This is particularly true in the US, and the gap is widening every year. This, I believe, is because of efficiency, not China. Today the best ideas can efficiently and quickly propagate worldwide, and everyone can efficiently find them and buy them. This makes the owners of these ideas filthy rich, and those ideas that are not the best, can hardly survive. It’s not just transfer of information that is fast; wealth...
China,Efficiency,Job,Opportunity,Wealth 2011-10-23 11:43:18
Making Sites Shine with @font-face
Like many of my web designer brethren, I’m a bit of a typographic geek. And like many web designers, I’ve been frustrated (to say the least) about the historical state of web typography.At first, we were limited to a common, but very small set of “web safe†fonts. Anything beyond those fonts, we had to rely on images. Images for text not only meant we had to create and maintain dozens (if not hundreds) of images, but it introduced accessibility issue...
HTML,Font face,Font family,Demo,Example 2011-08-19 08:16:29
PHP Security
1. IntroductionWriting PHP applications is pretty easy. Most people grasp the syntax rather quickly and will within short time be able to produce a script that works using tutorials, references, books, and help forum forums like the one we have here at PHP Freaks. The problem is that most people forget one of the most important aspects that one must consider when writing PHP applications. Many beginners forget the security aspect of PHP. Generally, your users are nice people, they will...
PHP,Security,SQL Injection,XSS Cross sit 2011-10-01 02:25:31
IT System Cyber Attack Case Study 01: Malicious Macro and Backdoor Trojan Attack on IT-Network
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop showcasing a practical demonstration of a red team attacker implementing an IT system/network attack via a Malicious Macro MS-Office-Word file (CVE-2015-1641) and phishing email generation program to penetrate multiple layers of firewall defenses and implant a backdoor trojan into the railway system's OT network. Related Links: GitHub Project Link , LinkedIn Post Link Attacker Vector: Malicious Macro ...
PHP: a fractal of bad design
Preface I’m cranky. I complain about a lot of things. There’s a lot in the world of technology I don’t like, and that’s really to be expected—programming is a hilariously young discipline, and none of us have the slightest clue what we’re doing. Combine with Sturgeon’s Law, and I have a lifetime’s worth of stuff to gripe about. This is not the same. PHP is not merely awkward to use, or ill-suited for what I want, or suboptimal, or...
Preprocessor magic:Default Arguments in C
This post is for programmers who like C or for one reason or another can't use anything else but C in one of their projects. The advantages of having default arguments is not something that needs convincing. It's just very nice and convenient to have them. C++ offers the ability to define them but C under the C99 standard has no way to allow it. In this post I will detail two ways I know of implementing default arguments in C. If a reader happens to know additional ways please share in ...
C,Preprocessor,Default arguments 2012-02-19 06:17:04
RECENT
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- more>>