“Serious flaw found in Internet Explorer”. That’s like saying, “garbage found in the dumpster”. Although I don’t disagree that the flaw is serious, I DO question the utility and value of using Internet Explorer, as well as the ongoing expectation that IE is useful for anything other than downloading a competent browser.
I was working on a project that required simple arithmetic for very large integers, a set of algorithms called “Arbitrary Precision Math”.
Thinking back to elementary school, simple algorithms exist for addition, subtraction, and multiplication of two numbers with any number of digits.
To my surprise, every algorithm for division either relies on logarithms, which are difficult to implement in arbitrary precision, or the first instruction was “guess the first number, then guess the second number” etc…
Update: 10/2015: I’ve put together a YouTube video for this post. Check it out, here:
Read on, for a simple, reliable, repeatable algorithm for dividing integers of any length.
Most professionally-developed websites are simple, fast, and easy to use.
However, there is nothing in the world more frustrating than a website or web application that is poorly-designed or hard to use.
Here are some common mistakes that Web Designers might not think about, but make a huge impact to the customer
How to guestimate peak volume, and volume at any arbitrary time using total volume with an elliptical distribution curve.
Someone says, “we have 10,000 hits per day on our website”, but what does that mean from an instantaneous demand standpoint?
A distribution curve can help you figure that out.
Denial of Service (DoS) attacks took down both Sony’s Playstation Network (PSN) and Microsoft’s XBox Live (XBL) on Christmas day – turning the joy of Christmas in to frustration and disappointment for anyone who received a new game for Christmas. As of 12/26, XBox was largely restored, while Playstation was still at least partially offline, with PS3 access intermittent at best, the Playstation Network website “unavailable due to scheduled maintenance”, and PS4 access completely unavailable.
Knowing in advance that threats had been made of a DoS attack on Christmas day, both companies had plenty of time to prepare, yet they either chose to ignore the threats or take insufficient precautions, leaving their staff scrambling, and their customers frustrated.
Here is a simple method that could have been used to prevent the whole fiasco.
Part 1 can be found here: http://justinparrtech.com/JustinParr-Tech/top-developer-mistakes/
Security issues and design flaws can be costly to fix, once an application has already been written.
In spite of everyone’s best efforts and intentions, these are some additional, common mistakes that can be made during the application design / development process.
Background: Like the undead, Windows XP’s installed base continues to live, even after the Microsoft-published End-Of-Life (EOL) date of 4/8/2014.
What “End of Life” means, is that Microsoft no longer provides free updates, namely security updates, for the operating system.
Unlike other Microsoft operating systems, and due to many factors, Windows XP has a huge installed base.
This article details the XP EOL event, including the good, the bad, and how Microsoft could have handled this better.
On Feb 23, 2014, Comcast announced a multi-year deal with Netflix aimed at improving the viewer experience of Netflix customers who use Comcast broadband services.
Comcast Press Release
Although details are very limited at this point, the press release states:
…the companies have established a more direct connection between Netflix and Comcast…
There are those who are either concerned that this violates the concept of net-neutrality, or speculate that this is a “game changer” from an internet economics perspective.
In reality, this is an incredibly smart move for Netflix, and a tremendous win for Netflix / Comcast customers.
The Adobe 2013 data breach, in which about 40 million account user names and other details were disclosed, as well as other data breaches in which cleartext passwords are disclosed, underscores the need for password hashing, as opposed to cleartext or encryption.
|Adobe Data Breach:
Cupid Media Data Breach:
Encryption is reversible, where hashing is not.
Click here to read more!
Background: Even with top notch architecture, coding, and Quality Assurance (QA), it’s easy to make these simple mistakes, that once introduced in to production, can be quite costly to fix.
Production issues can cause down time, brand / reputation impact, loss of customer / end-user confidence, loss of productivity, loss of revenue, and wasted resources.
This article describes some of the more common mistakes that can be made, going from development in to production.