Programming insights to Storytelling, it's all here.
I like to think I am a simple man. But I know that everyone that ever said that is the complete opposite. The reason I say this is because I don't immediately jump on the latest technology.
Creating a strong password is hard. Everyday we hear a story of someone's account that was hacked. On Twitter, there are always companies apologizing for tweets made by someone who hijacked their account.
Many years ago, developers saw a growth in traffic on the web and were appalled by how most websites poorly handled the spike. Moore's Law was still in effect, web servers were becoming faster every year, but software wasn't keeping up. So in response, Dan Kegel created a little place on the internet where developers could find the configurations needed to handle at least 10,000 concurrent connections.
I have horrible handwriting and I'm not ashamed of it. It's ugly and barely legible. In my family, I have the worst handwriting. But still, with enough effort, and guessing, you can read what I am trying to say.
If you are like me, you like using shortcuts to get work done. The typical way to search for a video on YouTube is to first go to youtube.com wait for it to load, then you type your query. This is a quick process and it's hard to imagine any step you can cut to make the process faster. But of course there is a way and it doesn't require any work at all.
Free USB charging stations are popping everywhere. For anyone with a smartphone, it is a relief. We have come to rely entirely on devices that can't last a full day. There is more entertainment then ever, bigger brighter screens, a constant connection to the internet, yet the best a smartphones has to offer is 3 to 4 hours screen time.
Why is it that I can't have a terabyte of RAM on my machine? With a 64bit chip I can virtually access all the memory address I'll ever need yet there is no way of attaching my extra memory to the motherboard.
I had a very hard time accepting Solid State Drives. Not because I didn't think they were cool, but because the whole internet was telling me that it was an untested technology that couldn't last more than a year at a time.
Most applications that come with a layer of security give the user the option to set up some rules. For example, when I set up an apache webserver, there are rules to determine which files are accessible to the user and which are not. The same goes with the firewall, you can set which ports are open and which are not.
There are times you want to make a very quick web request and don't care about the response looks like. It is possible to make requests using Ajax, but we still…