For resources on Angular.js, Backbone.js, D3.js, Dojo, Ember.js, Express.js, jQuery, Knockout.js, and any other JS toolkit/framework, please refer to Javascript Frameworks Resources and Tutorials, or to its source file javascript-frameworks-resources.md.
Penxy ViewerContact us via email or Facebook:
Binary serialization formatsHello my dear friends. Today we will talk about binary serialization formats. Serialization is the process of translating data structures or object state into a format that can be stored and resurrected later in the same or another computer environment.
What I Learned From Getting My Side Project AcquiredI started Asterank in May 2012. Earlier that week, Planetary Resources announced its intent to mine water and valuable materials from asteroids. Like many others, I was intrigued. It was an inspiring, impossible long-term vision.
2013-11-14 07:11:57In the previous article on ARM64, I mentioned that one advantage of the new architecture is the fact that it has twice as many registers, allowing code load data from RAM less often, which is much slower.
I wrote FAT on an airplane, for heaven's sakeWhen you wrote code for 16-bit Windows, one of the things you spent time doing as part of performance tuning was deciding which functions should be grouped together in which segments. Code in 16-bit Windows executed out of code segments, each of which could be up to 64KB in size.
SQL Server Storage Internals 101This article is an extract from the book Tribal SQL. In this article, Mark S. Rasmussen offers a concise introduction to the physical storage internals behind SQL Server databases. He doesn't dive into every detail, but provides a simple, clear picture of how SQL Server stores data.
Most useful NLog configurationsWhat are the best or most useful configurations for logging with NLog? (These can be simple or complex, as long as they're useful.)
Putting everything together - Free tools for startupsA month ago, we launched Shyahi. Beyond learning the in’s and out’s of launching a startup, over the last few months while developing Shyahi we also learned that every small business needs a toolbox for efficiency. Below are some free tools that we used to put Shyahi together.
The Linux Backdoor Attempt of 2003Josh wrote recently about a serious security bug that appeared in Debian Linux back in 2006, and whether it was really a backdoor inserted by the NSA. (He concluded that it probably was not.) Today I want to write about another incident, in 2003, in which someone tried to backdoor the Linux kernel.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.