Bookmark
The Independent Qt Tutorial - TOC
www.digitalfanatics.org/projects/qt_tutorial/index.html, posted 2010 by peter in development graphics howto kde qt reference
The Independent Qt Tutorial is an on-line book aiming to cover most topics involved in the process of developing professional quality Qt applications. The text is example driven, filled with lots of tips and has links to the official Qt documentation.
Bookmark
A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux
www.muppetlabs.com/~breadbox/software/tiny/teensy.html, posted 2010 by peter in development hack linux
This document explores methods for squeezing excess bytes out of simple programs. (Of course, the more practical purpose of this document is to describe a few of the inner workings of the ELF file format and the Linux operating system. But hopefully you can also learn something about how to make really teensy ELF executables in the process.)
Bookmark
Ksplice » How to quadruple your productivity with an army of student interns - System administration and software
blog.ksplice.com/2010/03/quadruple-productivity-with-an-intern-army/, posted 2010 by peter in business development management people startup toread
So, how do you quadruple the size of your engineering team in one month and still keep everyone productive?
Bookmark
Bygg din egen radiosajt med vårt öppna API! - API - Support - sr.se
www.sr.se/sida/gruppsida.aspx?programid=2321&grupp=9974&artikel=3406644, posted 2010 by peter in audio development inswedish media sweden toread
Nu släpper Sveriges Radio ett öppet api som gör det enklare för dig som vill använda vårt utbud i en egen applikation eller radiosajt. För oss innebär ett api att vi tillhandahåller xml-baserade tjänster som är lätta att programmera mot.
Bookmark
Anatomy of the Websites | Sitonomy.com
www.sitonomy.com/, posted 2010 by peter in design development online search webdesign
Sitonomy is a free service that allows developers and designers to find out which technologies are used in a specific blog/site. Together with the provided statistic information of popular technologies, this service makes it easier to decide what technologies are suitable to your own site. List of top alternatives are provided for the following categories: affiliate networks, advertising networks, analytical tools and more.
Bookmark
Coding error leads to uneven EU browser ballot distribution
arstechnica.com/microsoft/news/2010/03/coding-error-leads-to-uneven-eu-browser-ballot-distribution.ars, posted 2010 by peter in conspiracy development eu humor microsoft windows
The Windows Browser Ballot, the browser selection screen that is being offered to Windows users in Europe starting this month, is already coming under fire. Slovakian IT news site DSL.sk decided to test the ballot and found that its distribution was very peculiar, with Internet Explorer appearing in the rightmost position almost 50 percent of the time when the ballot was viewed from within IE.
...
This browser ballot, as simple as it is, has been months in the making. The decision to do the randomization client-side, where it depends on the web browser, rather than server-side, where it would be consistent for all users, is a little surprising. But most remarkable at all is that no one responsible for signing off and saying "that's an acceptable response to the Competition Commission's complaint" bothered to do this testing. If this browser ballot is important then surely its implementation should be a high quality one?
Bookmark
What Second Life can teach your datacenter about scaling Web apps
arstechnica.com/business/data-centers/2010/02/what-second-life-can-teach-all-companies-about-scaling-web-apps.ars, posted 2010 by peter in development scalability storage toread
Trouble is, implementing the best scaling practices is not free, and is often overlooked early in a product's lifecycle. Small teams use modern frameworks to quickly develop useful applications, with little need to worry about scale: today you can run a successful application on very little infrastructure... at least, you can up to a point. Past this point lies an uncomfortable middle ground, where small teams face scaling challenges as their system becomes successful, often without the benefit of an ideal design or lots of resources to implement one. This article will lay out some pragmatic advice for getting past this point in the real world of limited foresight and budgets.
Bookmark
http://onjava.com/onjava/2005/10/26/ajax-handling-bookmarks-and-back-button.html
onjava.com/onjava/2005/10/26/ajax-handling-bookmarks-and-back-button.html, posted 2010 by peter in development howto javascript toread webdesign
This article presents an open source JavaScript library that finally brings bookmarking and back button support to AJAX applications. By the end of this tutorial, developers will have a solution to an AJAX problem that not even Google Maps or Gmail possesses: robust, usable bookmarking and back and forward behavior that works exactly like the rest of the Web.
...
The principal discoveries of the framework presented in this article are twofold. First, a hidden HTML form is used to allow for a large transient session cache of client-side information; this cache is robust against navigation to and away from the page. Second, a combination of hyperlink anchors and hidden iframes is used to intercept and record browser history events, tying into the back and forward buttons. Both techniques are wrapped with a simple JavaScript library to ease development.
Bookmark
BrowserCam : Screen capture and Remote Access service for cross platform compatibility testing and HTML design quality assurance
www.browsercam.com/Default2.aspx, posted 2010 by peter in design development html mobile online testing usability webdesign
See your web design on any browser on any operating system. Check javascripts, DHTML, forms and other dynamic functionality on any platform. Not just yours. Use our bank of testing machines remotely to test your website.
Bookmark
CWE - 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
cwe.mitre.org/top25/, posted 2010 by peter in development list reference security testing
The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all.
The Top 25 list is a tool for education and awareness to help programmers to prevent the kinds of vulnerabilities that plague the software industry, by identifying and avoiding all-too-common mistakes that occur before software is even shipped. Software customers can use the same list to help them to ask for more secure software. Researchers in software security can use the Top 25 to focus on a narrow but important subset of all known security weaknesses. Finally, software managers and CIOs can use the Top 25 list as a measuring stick of progress in their efforts to secure their software.
|< First < Previous 311–320 (521) Next > Last >|