Wastholm.com

The Independent Qt Tutorial is an on-line book aiming to cover most topics involved in the process of developing professional quality Qt applications. The text is example driven, filled with lots of tips and has links to the official Qt documentation.

This document explores methods for squeezing excess bytes out of simple programs. (Of course, the more practical purpose of this document is to describe a few of the inner workings of the ELF file format and the Linux operating system. But hopefully you can also learn something about how to make really teensy ELF executables in the process.)

Nu släpper Sveriges Radio ett öppet api som gör det enklare för dig som vill använda vårt utbud i en egen applikation eller radiosajt. För oss innebär ett api att vi tillhandahåller xml-baserade tjänster som är lätta att programmera mot.

Sitonomy is a free service that allows developers and designers to find out which technologies are used in a specific blog/site. Together with the provided statistic information of popular technologies, this service makes it easier to decide what technologies are suitable to your own site. List of top alternatives are provided for the following categories: affiliate networks, advertising networks, analytical tools and more.

The Windows Browser Ballot, the browser selection screen that is being offered to Windows users in Europe starting this month, is already coming under fire. Slovakian IT news site DSL.sk decided to test the ballot and found that its distribution was very peculiar, with Internet Explorer appearing in the rightmost position almost 50 percent of the time when the ballot was viewed from within IE.

...

This browser ballot, as simple as it is, has been months in the making. The decision to do the randomization client-side, where it depends on the web browser, rather than server-side, where it would be consistent for all users, is a little surprising. But most remarkable at all is that no one responsible for signing off and saying "that's an acceptable response to the Competition Commission's complaint" bothered to do this testing. If this browser ballot is important then surely its implementation should be a high quality one?

Trouble is, implementing the best scaling practices is not free, and is often overlooked early in a product's lifecycle. Small teams use modern frameworks to quickly develop useful applications, with little need to worry about scale: today you can run a successful application on very little infrastructure... at least, you can up to a point. Past this point lies an uncomfortable middle ground, where small teams face scaling challenges as their system becomes successful, often without the benefit of an ideal design or lots of resources to implement one. This article will lay out some pragmatic advice for getting past this point in the real world of limited foresight and budgets.

This article presents an open source JavaScript library that finally brings bookmarking and back button support to AJAX applications. By the end of this tutorial, developers will have a solution to an AJAX problem that not even Google Maps or Gmail possesses: robust, usable bookmarking and back and forward behavior that works exactly like the rest of the Web.

...

The principal discoveries of the framework presented in this article are twofold. First, a hidden HTML form is used to allow for a large transient session cache of client-side information; this cache is robust against navigation to and away from the page. Second, a combination of hyperlink anchors and hidden iframes is used to intercept and record browser history events, tying into the back and forward buttons. Both techniques are wrapped with a simple JavaScript library to ease development.

See your web design on any browser on any operating system. Check javascripts, DHTML, forms and other dynamic functionality on any platform. Not just yours. Use our bank of testing machines remotely to test your website.

The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all.

The Top 25 list is a tool for education and awareness to help programmers to prevent the kinds of vulnerabilities that plague the software industry, by identifying and avoiding all-too-common mistakes that occur before software is even shipped. Software customers can use the same list to help them to ask for more secure software. Researchers in software security can use the Top 25 to focus on a narrow but important subset of all known security weaknesses. Finally, software managers and CIOs can use the Top 25 list as a measuring stick of progress in their efforts to secure their software.

|< First   < Previous   309–318 (519)   Next >   Last >|