2004-03-31
Case Of The Missing Gas From Yahoo! Groups EnergyResources Group
Technology Benefiting Humanity Memo to the new generation of tech philanthropists: Apply the same intellect and discipline to your philanthropy as you employ in business.
2004-03-30
Design Patterns Tutorial An article that briefly describes commonly used Design Patterns; Singleton, Factory Method, Adapter, Proxy, Decorator, Composite, Observer, MVC, Template and Strategy.
Rules for Effective Source Code Control Larkware lead developer and author Mike Gunderloy believes every software developer should use some form of source code control, which promotes more harmonious collaboration between team members and provides a secure back-up file of code as well. When choosing the best source code control system, ...
Extra headaches of securing XML | CNET News.com Web services pose a serious security threat to enterprise networks given the lack of understanding about XML among security professionals and the low profile security has played in Web services deployment to date. Current Web services implementations are not much of a threat since ...
How India became the capital of the computing revolution Wired profiles Indian programmers who code for $11K a year.