background preloader

Shaping up with Angular.js - Shaping up with Angular.js

Shaping up with Angular.js - Shaping up with Angular.js
Related:  shiny stuff

Five simple database design tips A flawed database can affect all areas of your application, so getting the design right is of paramount importance. Check out Builder's five simple design tips, and share some of your own. If an enterprise’s data is its lifeblood, then the database design can be the most important part of an application. Volumes have been written on this topic, and entire college degrees have been built around it. However, as has been said time and time again here on Builder.com, there’s no teacher like experience. I’ll get the show started by listing my five favorite tips and giving a brief explanation of the rationale behind each one. #1: Use meaningful field namesI once worked on a project I inherited from another programmer who liked to name fields using the name of the onscreen control that displayed the data from that field. Unless you are using a system that restricts you to short field names, make them as descriptive as possible—within reason, of course.

Ten Common Database Design Mistakes No list of mistakes is ever going to be exhaustive. People (myself included) do a lot of really stupid things, at times, in the name of “getting it done.” This list simply reflects the database design mistakes that are currently on my mind, or in some cases, constantly on my mind. Before I start with the list, let me be honest for a minute. So, the list: Poor design/planning Ignoring normalization Poor naming standards Lack of documentation One table to hold all domain values Using identity/guid columns as your only key Not using SQL facilities to protect data integrity Not using stored procedures to access data Trying to build generic objects Lack of testing Poor design/planning “If you don’t know where you are going, any road will take you there” – George Harrison Prophetic words for all parts of life and a description of the type of issues that plague many projects these days. Far too often, a proper planning phase is ignored in favor of just “getting it done”. Ignoring Normalization

Unity 3 – April 2013 patterns & practices Developer Center April 2013 Unity is a lightweight, extensible dependency injection container with support for instance and type interception. Overview Unity is a lightweight, extensible dependency injection container with support for constructor, property, and method call injection. Simplified object creation, especially for hierarchical object structures and dependencies. Unity is a general-purpose container for use in any type of Microsoft.NET Framework-based application. In addition, Unity is extensible. This release adds support for Windows Store apps as well as the registration by convention feature to ease the task of configuring Unity. Audience Requirements These reusable components and guidance are intended primarily for software developers and software architects. Contents of This Release Microsoft Unity 3 contains the following: Binaries. System Requirements Supported architectures: x86 and x64. For a rich development environment, the following are recommended:

Codecademy Labs c# - Best Practices of fault toleration and reliability for scheduled tasks or services Audit and document Security User Rights Assignment using C# | Network Audit and Documentation, CENTREL Solutions Blog For more information on the Windows Server documentation abilities of XIA Configuration please see the following We've recently been asked about the auditing of User Rights Assignment as seen in the Local Group Policy Editor. Having looked into this issue it is apparent that this cannot be done with any high level API such as WMI and requires the use of P/Invoke and the Win32 method LsaEnumerateAccountsWithUserRight. I've seen many posts on the Internet on the topic but I haven't seen a simplified example of this in use so have writen a quick C# sample application to enumerate the various rights and privileges and display the users assigned to that right in a grouped listview as per the screenshot below. This can be downloaded from our web site in Visual Studio 2010 The sample supports the following Document and Audit User Rights Assignment with XIA Configu

Your Personal PLC Tutor Site - RS232 Communications/software Learn quickly with our PLC Training DVD Series: on sale $599.00 $379 Click here now for details! RS-232 Communications (software) Now that we understand the hardware part of the picture, let's dive right into the software part. ASCII is a human-readable to computer-readable translation code. The picture below shows how data leaves the serial port for the character "E" (45h 100 0101b) and Even parity. Another important thing that is sometimes used is called software handshaking (flow control). The last thing we should know about is delimiters. Sometimes an STX and ETX pair is used for transmission/reception as well. Finally, we might also come across an ACK/NAK pair. RS-232 has a lot of information to absorb, so feel free to reread it.

agile SE-Radio Episode 307: Harsh Sinha on Product Management Bryan Reinero talks with Harsh Sinha, VP of Engineering at TransferWise, about Product Management. Product Management deals with the planning, delivery and marketing of a software product. Continue Reading » SE-Radio Episode 306: Ron Lichty on Managing Programmers Ron Lichty talks with SE-Radio’s Nate Black about managing programmers. Continue Reading » SE-Radio Episode 280: Gerald Weinberg on Bugs Errors and Software Quality Marcus Blankenship talks with Gerald Weinberg about software errors, the fallacy of perfection, how languages and process can reduce errors, and the attitude great programmers have about their work. Continue Reading » SE-Radio Episode 253: Fred George on Developer Anarchy Fred George talks with Eberhard about “Developer Anarchy” – a development approach Fred has been using very successfully in different organizations. Continue Reading » Continue Reading »

Episode 253 | Kyle Scarmardo - Motivation Matters Kyle Scarmardo talks with Dave Rael about being deliberate with your time, the importance of self-awareness, coaching and mentoring, and taking action Kyle spent sixteen years in the Information Technology space for a large financial company, the 20th largest private company in America, where he worked his way up from the bottom to become an executive in 13 years at the age of 35. The latter part of his career heavily involved helping others with self-improvement, career growth, improving executive function, applying new strategies to better communicate and influence, and assist with culture change. In this work Kyle tapped into a passion that ultimately would pull him away from a full time focus on technology.

Blocking Unwanted Connections with a Hosts File What it does ... You can use a modified HOSTS file to block ads, banners, 3rd party Cookies, 3rd party page counters, web bugs, and even most hijackers and possibly unwanted programs. This is accomplished by blocking the connection(s) that supplies these little gems. The Hosts file is loaded into memory (cache) at startup, so there is no need to turn on, adjust or change any settings with the exception of the DNS Client service (see below). Example - the following entry 0.0.0.0 ad.doubleclick.net blocks all files supplied by that DoubleClick Server to the web page you are viewing. Using a well designed HOSTS file can speed the loading of web pages by not having to wait for these ads, annoying banners, hit counters, etc. to load. In case you're wondering ... this all happens in microseconds, which is much faster than trying to fetch a file from half way around the world. Special Note: new Windows 10 users ... the MVPS Hosts file installs just fine, no need to make any changes. Important!

Related: