
Ode to The Code Monkey
What you lack are not more lines of code, rather it’s architecture and a road. To substitute quality with speed, Is the motto of the code monkey creed….

What you lack are not more lines of code, rather it’s architecture and a road. To substitute quality with speed, Is the motto of the code monkey creed….
It seems that if necessity is the mother of invention, then revenue from high internet traffic is the granddaddy of the con. Site sponsored advertising practice has now become so popular that many clever enterprising individuals and larger organizations are running large campaigns for site scams know as MFA (made for AdSense). These scraper sites are siphoning tens of millions of dollars from the likes of Google.

After participating in and leading many painful software design meetings, I have come to the realization that the best way to sell the top design idea is to first share some of the alternative and inferior ones.

Most failures in software usability can be attributed to poor decisions at the executive level, which are promulgated due to a culture of silence. Developers and designers should be encouraged to think critically about their work and be provided with official channels for expressing their opinions (in a non polemic manner).
Another interesting observation—which is not without its irony—is that large vendors such as Microsoft are completely unaware of the malware distribution platforms and are aggressively purchasing advertising space on these sites.

The greatest engineering feats are the ones we don’t notice. The hallmark of a great designer is his ability to translate complexity into simplicity. The automatic transmission in a car represents significantly more engineering effort than a manual transmission, but it positively transforms the average user experience. The best consumer electronics always focus on hiding complexity, not showcasing it.
Its not enough to capture and display errors. Real quality of service goes beyond just acknowledging your application’s faults. My rule of thumb is that there is no such thing as an “informative error message”. A good error is one that has been eliminated through error-handling code and product design.

On February 20, 1939, over 20,000 American supporters of the Nazi party packed Madison Square Garden in New York City. They anxiously awaited the appearance of Fritz Julius Kuhn, the newly anointed American Führer of the German-American Bund. The event took place two days before George Washington’s birthday and a 30-foot-high portrait of the first president (who was described by Fritz as the first Fascist) hung behind the podium along with Nazi flags and swastikas.

When I first watched the clip, I really thought that it was another Borat promotional, but after a few seconds, I realized that it was actually the real thing. Many men were in suits, moms, dads and grandparents were there with their young kids in tow, clearly, not a lynch mob wielding pitch forks. At least not judging from the dress code.
In many cases, the objective of phishing is to just recover your webmail credentials since the resale value of a legitimate web mail account on the black market can be as high as $2-$3—twice the amount one can get for a stolen credit card number.