Friday, December 4, 2009

Scrum Poker (ou Poker Planning)

Artigo bastante elucidativo, de uma forma divertida :), sobre Poker Planning, metodologia proposta por Mike Cohn, para calcular estimativas para a duração das stories.

http://www.crisp.se/planningpoker

Have fun :o)

Thursday, November 26, 2009

What Do Actors and Programmers Have in Common?

Artigo interessante sobre metodologias (estrategias?) partilhadas por estes dois grupos, aparentemente tão distintos :)

[…]
So, what do actors and programmers have in common?
Well, some amazingly fundamental things as it turns out:

* Iterative work
* Collaboration
* Innovation

Theatre work and product development both thrive on iteration and collaboration. Lee described this in terms of rehearsal and the emergent look of a play leading up to and even after opening night. Rob affirmed the value of a collaborative and iterative approach in product development[…]

Mais aqui: http://www.rallydev.com/agileblog/2009/11/what-do-actors-and-programmers-have-in-common/

Tuesday, November 17, 2009

How to implement Scrum in 10 easy steps :)

Artigo que propõe uma metodologia para aplicar a metodologia :)
Scrum, entenda-se :))

Daqui: http://www.agile-software-development.com/2007/09/how-to-implement-scrum-in-10-easy-steps.html

- Step #1: Get your backlog in order!
- Step #2: How to estimate your product backlog
- Step #3: Sprint Planning/clarify requirements
- Step #4: Sprint Planning/estimate tasks
- Step #5: Create a collaborative workspace
- Step #6: Sprint!
- Step #7: Stand up and be counted!
- Step #8: Track progress with a daily burndown chart
- Step #9: Finish when you said you would
- Step #10: Review, reflect, repeat...

Pragmatic Agile Development (PAD)

Interessante.
Uma abordagem a metodologias ageis, baseada em Scrum, mas com algumas alterações.

Aqui fica um pequeno resumo.

Pragmatic Agile Development (PAD) and Agile Scrum

It is important to note that the way we use Agile Scrum varies from a purist version of Scrum as we have made modifications to Agile Scrum to work well for our development environment. Our version of Scrum is called Pragmatic Agile Development (PAD) and differs from a more purist Scrum implementation in these ways:

1. Scrum Planning - In Scrum, planning for an upcoming sprint is accomplished in 1 day, in PAD the planning spans 1 week. This is because we write more detailed specifications than a purist Scrum does (see next bullet item).
2. User Stories vs. Specifications - In Scrum, requirements are written on index cards (called User Stories) and does not contain prototypes or detailed explanations of the feature set. In PAD, we spend time detailing the requirement specifications with prototypes to ensure that time is well spent on the feature, reducing rework.
3. 30 Day Sprints - In Scrum, development is done in 30 calendar days. In PAD, development is done in 30 working days, skipping holidays. This provides us with more evenly distributed sprints.
4. Team Composition - In Scrum, developers are expected to perform all duties (analysis, design, coding, test case development, execution, and documentation). In PAD, developers help with analysis and design and perform all the coding. We have specialized team members (Software Quality Engineers) for test case development and specialized team members for documentation. We do this because our experience has shown that we need specialists in these areas.


E o link: http://softwareplanner.com/Newsletters/newsletter_2008_05_SP.htm

Thursday, November 12, 2009

KISS! :)

KISS. Keep IT Simple Stupid.

Manter o SCRUM simples, nao complicar.
O que quer dizer isto??

Manter as stories simples.
Manter a Review/Planning Meetings simples.
Etc, etc, etc...
Simplicidade. Simplicidade. Simplicidade.

A NAO ESQUECER!! :))

Artigos interessantes sobre KISS e SCRUM :)

http://pt.wikipedia.org/wiki/Keep_It_Simple
http://diego-pacheco.blogspot.com/2009/04/o-melhor-do-xp.html
http://www.techcrunch.com/2009/04/28/keep-it-simple-stupid/
http://rafaelspereira.wordpress.com/2008/04/13/keep-it-simple/
http://blog.lppjunior.com/planejamento-de-software-keep-it-simple-stupid/

E ainda, YAGNI :)

Tudo deve ser feito da forma mais simples possível, mas não mais simples que isso.
Albert Einstein

A perfeição é alcançada não quando não há mais nada para adicionar,
mas quando não há mais nada que se possa retirar.
Antoine de Saint-Exupéry

A simplicidade é a ultima sofisticação.
Leonardo Da Vinci

:)

Thursday, October 22, 2009

SCRUM User Stories

In Scrum, work is expressed in the backlog as user stories. A team may write its user stories in a number of ways as long as they are written from the perspective of the end user. Put another way, team members are encouraged to think of their work from the perspective of who will use it (hence “user” story). A team can express a story as a noun (i.e. “text message” on a cell phone project) or a sentence or phrase (i.e. “debug GPS tracking system”).

Many Scrum teams have adopted the user story template developed by Mike Cohn, which identifies who the end user is, what the end user wants, and why in a single sentence. This model of the user story is most often written like this: “As a [end user role], I want [the desire] so that [the rationale]."

To illustrate, consider how a developer working on a calculator application for a PC might express his work. First, the developer would want to identify who will benefit from this appication: a PC user. Second, he would want to decide what the PC user will want to get out of it: a convenient, prepackaged calculator application. Third, he would want to be able to explain why it’s important for the PC user to have this application. This piece of information is the most open to interpretation, but one can safely assume that the PC user would want to use it to add, subtract, multiply, and divide. Thus the developer’s user story could read something like the following: “As a PC user, I want a calculator with basic functionality on my PC so that I can conveniently perform basic mathematic operations.”

In summary, user stories document requirements with particular attention to the end user’s point of view. Stories can be written in myriad ways, but Cohn’s model really works in Scrum because it provides so much information about the story. Because user stories are oriented to reflect the desires of the end user, they help developers remain focused on the customer.

Daqui: http://scrummethodology.com/scrum-user-stories/

SCRUM Ceremonies - Detalhes

Scrum has three ceremonies: Sprint Planning, Sprint Review, and the Daily Scrum Meeting.

Sprint Planning Meeting

Preparation for a Scrum sprint begins when the Product Owner develops a plan for a product or a project. The Product Owner can be a customer representative or a customer proxy. For product companies, the customer is a market, and the Product Owner serves as a proxy for the market. A Product Owner needs a vision for the product that frames its ultimate purpose, a business plan that shows what revenue streams can be anticipated from the product in which timeframes, and a road map that plans out several releases, with features ordered by contribution to return on investment (ROI). S/he prepares a list of customer requirements prioritized by business value. This list is the Product Backlog , a single list of features prioritized by value delivered to the customer.

The Scrum begins when enough of the Product Backlog is defined and prioritized to launch the first thirty-day sprint. A Sprint Planning Meeting is used to develop a detailed plan for the iteration. It begins with the Product Owner reviewing the vision, the roadmap, the release plan, and the Product Backlog with the Scrum team. The team reviews the estimates for features on the Product Backlog and confirms that they are as accurate as possible. The team decides how much work it can successfully take into the sprint based on team size, available hours, and level of team productivity. It is important that the team "pull" items from the top of the Product Backlog that they can commit to deliver in a thirty-day sprint. Pull systems have been show to deliver significant productivity gains in lean product development.

When the Scrum team has selected and committed to deliver a set of top priority features from the Product Backlog, the ScrumMaster leads the team in a planning session to break down Product Backlogs features into sprint tasks. These are the specific development activities required to implement a feature and form the Sprint Backlog. This phase of the Sprint Planning Meeting is time-boxed to a maximum of four hours.

Daily Scrum Meeting

Once planning is complete, the Sprint begins its thirty-day cycle. Each day the ScrumMaster leads the team in the Daily Scrum Meeting. This is a fifteen-minute meeting designed to clarify the state of the Scrum. Each team member speaks to three questions: what did I do yesterday, what did I do today, and what impediments got in my way? While anyone can attend this meeting, only team members who have committed to deliver work to the Scrum are allowed to speak. The goal is to get a global snapshot of the project, discover any new dependencies, address any personal needs of committed individuals, and adjust the work plan in real time to the needs of the day.

Sprint Review Meeting

At the end of a sprint, a Sprint Review Meeting is held. This meeting is time-boxed to a maximum of four hours. The first half of the meeting is set aside to demonstrate to the Product Owner the potentially shippable code that has been developed during the sprint. The Product Owner leads this part of the meeting and invites all interested stakeholders to attend. The state of the business, the market, and the technology are reviewed. The Product Owner determines which items on the Product Backlog have been completed in the Sprint, and discusses with the Scrum team and stakeholders how best to reprioritize the Product Backlog for the next sprint. The goal for the next sprint is defined.

The second half of the Sprint Review Meeting is a retrospective for the Scrum team that is led by the ScrumMaster. The team assesses the way they worked together in the sprint and identifies positive ways of working together that can be encouraged as future practice. the team also identifies the things that could work better and develops strategies for improvement.

After the Scrum Review Meeting, the process begins again. Iterations proceed until enough features have been done to complete or release a product.

Daqui: http://www.scrumalliance.org/pages/scrum_ceremonies

SCRM Artifacts - Detalhes

Scrum has three artifacts: the Product Backlog, the Sprint Backlog, and a Burndown Chart.

Product Backlog

At the beginning of the project, the product owner prepares a list of customer requirements prioritized by business value. This list is the Product Backlog, a single list of features prioritized by value delivered to the customer. The Scrum Team contributes to the product backlog by estimating the cost of developing features.

The Product Backlog should include all features visible to the customer, as well as the technical requirements needed to build the product. The highest priority items in the Product Backlog need to be broken down into small enough chunks to be estimable and testable. About ten developer-days of work is a good size for a Product Backlog item that can be ready for implementation in the next iteration. Features that will be implemented further out in time can be less detailed.

Sprint Backlog

The Sprint Backlog is an artifact of the Sprint Planning Meeting. When the Scrum Team has selected and committed to deliver a set of top priority features from the Product Backlog, the Product Backlog's features are broken down into a Sprint Backlog: a list of the specific development tasks required to implement a feature. These tasks are broken down into pieces that will require less than two days (or sixteen developer-hours) of work. When the Sprint Backlog is complete, the total work estimated is compared with original estimates from the Product Backlog. If there is a significant difference, the team negotiates with the Product Owner to get the right amount of work to take into the Sprint with a high probability of success.

Burndown Chart

The Burndown Chart shows the cumulative work remaining in a Sprint, day-by-day.

At the Sprint Planning Meeting the Scrum Team identifies and estimates specific tasks that must be completed for the Sprint to be successful. The total of all Sprint Backlog estimates of work remaining to be completed is the cumulative backlog. When tasks are completed as the Sprint proceeds, the ScrumMaster recalculates the remaining work to be done and the Sprint Backlog decreases, or burns down over time. If the cumulative Sprint Backlog is zero at the end of the Sprint, the Sprint is successful.

The Product Backlog items brought into the Sprint are fixed for the duration of the Sprint. However, the Sprint Backlog may change for several reasons:

  • The development team gains a better understanding of work to be done as time progresses and may find that they need to add new tasks to the Sprint Backlog to complete the Product Backlog items selected.
  • Defects may be identified and logged as additional tasks. While these are viewed primarily as unfinished work on committed tasks, it may be necessary to keep track of them separately.
  • The Product Owner may work with the team during the Sprint to help refine team understanding of the Sprint goal. The ScrumMaster and Team may decide that minor adjustments that do not lengthen the Sprint are appropriate to optimize customer value.

The Burndown Chart is used as a tool to guide the development team to successful completion of a Sprint on time with working code that is potentially shippable as a product.

Daqui: http://www.scrumalliance.org/pages/scrum_artifacts

SCRUM Roles - Detalhes

Scrum has three roles: Product Owner, ScrumMaster, and Team.

The Product Owner has the following responsibilities.

  • Define the features of the product;
  • Decide on release date and content;
  • Be responsible for the profitability of the product (ROI);
  • Prioritize features according to market value;
  • Adjust features and priority every 30 days, as needed; and
  • Accept or reject work results.

The product owner is responsible for the first of the three Scrum ceremonies : Scrum Planning.

The ScrumMaster is a facilitative team leader working closing with the Product Owner. He must:

  • Ensure that the team is fully functional and productive;
  • Enable close cooperation across all roles and functions;
  • Remove barriers;
  • Shield the team from external interferences; and
  • Ensure that the process is followed, including issuing invitations to Daily Scrum, Sprint Review and Sprint Planning meetings.

The ScrumMaster has three primary responsibilities in addition to leading the Daily Scrum meeting:

  1. The ScrumMaster needs to know what tasks have been completed, what tasks have started, any new tasks that have been discovered, and any estimates that may have changed. This makes it possible to update the Burndown Chart which shows the cumulative work remaining day by day. The ScrumMaster must also look carefully at the number of open tasks in progress. Work in progress needs to be minimized to achieve lean productivity gains.
  2. The ScrumMaster needs to surface dependencies and blocks which are impediments to the Scrum. They need to be prioritized and tracked. A remediation plan needs to be implemented for impediments in priority order. Some can be resolved with the team, some can be resolved across teams, and others will need management involvement as they may be company issues that block all teams from achieving their production capacity. For example, a telecom company recently implemented Scrum and found eighteen items on their impediment list, only two of which were directly related to Scrum teams. The others were company issues that needed management attention.
  3. Last but not least, the ScrumMaster may notice personal problems or conflicts within the Scrum that need resolution. These need to be clarified by the ScrumMaster and be resolved by dialogue within the team, or the ScrumMaster may need help from management or the Human Resources. Certified ScrumMaster James Coplien developed over 200 case studies of notable projects while working at ATT Bell Labs. He reports that over 50% of productivity losses were caused by personnel issues. The ScrumMaster must pay attention to them to ensure the team is fully functional and productive.

The Team:

  • Is cross-functional, with seven (plus/minus two) members;
  • Selects the Sprint goal and specifies work results;
  • Has the right to do everything within the boundaries of the project guidelines to reach the Sprint goal;
  • Organizes itself and its work; and
  • Demos work results to the Product Owner.
Daqui: http://www.scrumalliance.org/pages/scrum_roles

SCRUM!! (Let's go agile... ;))

Aqui ficam alguns conceitos gerais sobre SCRUM, à laia de nota...

Scrum is a "lean" approach to software development. The term Scrum comes from a 1986 study [1] by Takeuchi and Nonaka that was published in the Harvard Business Review. In that study, Takeuchi and Nonaka note that projects using small, cross-functional teams historically produce the best results.

Scrum is a simple "inspect and adapt" framework that has three roles, three ceremonies, and three artifacts [1] designed to deliver working software in Sprints, usually 30-day iterations.

  • Roles: Product Owner, ScrumMaster, Team;
  • Ceremonies: Sprint Planning, Sprint Review, and Daily Scrum Meeting;
  • Artifacts: Product Backlog, Sprint Backlog, and Burndown Chart
Daqui: http://www.scrumalliance.org/

Friday, September 18, 2009

Wednesday, July 1, 2009

Friday, February 6, 2009

Sharding??

Deparei-me com o termo Sharding recentemente...

O termo foi designado e difundido pela equipa do Google. É um termo vistoso :), mas quando percebi o que era confesso que a surpresa e uma pequenita risada se apoderou de mim... :o)

Trata-de de um novo nome para o particionamento de Bases de Dados, conceito que já existe há uns bons anos...
Confesso que achei piada!! :))

Há no entanto quem defenda que não são exactamente a mesma coisa:

"
The difference between partitioning and sharding is that sharding applies specifically to the technique of horizontal partitioning, whereas partitioning itself could be either horizontal or vertical. The term sharding is slightly more specific. The tech industry is full of nomenclature like this. It's important that we define it as doing so helps us to communicate better, even if we just decide that two terms are in fact the same." {[2] - Comments}

Fica a discutibilidade da coisa ao critério do leitor, e aqui ficam também dois artigos interessantes sobre o conceito de Sharding, um sobre as vantagens, desvantagens e aspectos a ter em conta,

[1] http://www.codefutures.com/database-sharding/

e um sobre o nome do conceito :),

[2] http://lethargy.org/~jesus/archives/95-Partitioning-vs.-Federation-vs.-Sharding.html
(os comentários também são interessantes!)

Have fun! :)

Friday, January 30, 2009

Porque nem só de tecnicices é feita a informática... :)

Um artigo bastante interessante e elucidativo!

P'ra malta mai'miuda :) mas não só :)

Daqui: http://clix.expresso.pt/gen.pl?p=stories&op=view&fokey=ex.stories/494027

Pais e filhos de mãos dadas na Net
O mundo virtual é a porta de entrada para muitas oportunidades. O risco também está sempre lá, mas há que saber enfrentá-lo. pais portugueses são dos mais controladores
A forma como os pais europeus acompanham a utilização que os filhos fazem da Net será o tema do debate que se realiza em Lisboa a 10 de Fevereiro, quando se celebra o Dia Europeu para a Internet Segura.
Os dados mais recentes do Eurobarómetro revelam que os pais portugueses são dos mais controladores, mas, contraditoriamente, serão aqueles que se mexem com menor à-vontade no universo dos computadores. Certo é que há muito a fazer para acabar com os mitos e ajudar as crianças e os jovens a escapar dos riscos da Rede. E que depende sempre do diálogo.

Hélder Oliveira / WHO

--> Jovens: riscos a não correr…
  • Evitar colocar na Net informações pessoais ou imagens reveladoras: desconhece-se onde podem parar e não podem ser apagadas se copiadas.
  • Desconfiar se alguém que não se conhece fizer demasiadas perguntas pessoais e de identificação.
  • Evitar marcar encontros com pessoas que só se conhece online.
  • Não alimentar discussões online
  • Recordar sempre que a Net pode parecer anónima mas não é.
  • Usar as linhas de apoio e denúncias de conteúdos ofensivos linhaalerta.internetsegura.pt para casos de pornografia infantil, apologia do racismo e da violência ou www.inhope.org que agrega as hotlines de denúncia de conteúdos ilegais).
  • Sair do computador sempre que se encontrar conteúdos ou imagens perturbantes e falar com alguém.
  • Não abrir e-mails que possam ter assuntos ou textos estranhos, nem carregar em links ou anexos que não pareçam de confiança.
  • Não instalar programas desconhecidos e ter sempre o sistema operativo e o antivírus actualizados.
  • Lembrar que o mundo virtual não está separado do mundo físico e muitas regras, sobretudo de boa educação, são válidas em ambos.
  • Quando alguém que não se conhece falar online, procurar saber mais sobre a pessoa e tentar confirmar a sua identidade.
  • Pensar bem antes de enviar uma mensagem que possa ser considerada agressiva ou ofensiva. Insultos verbais ou por escrito não são diferentes.
  • Se se deparar com alguma imagem ou conteúdo perturbantes, sair do computador e falar com alguém.
  • Se achar que algo de estranho se está a passar no computador ou se alguém o(a) estiver a incomodar, falar com os pais, professores ou amigos.
  • Não seguir links dados pelo Messenger a menos que a pessoa com quem se está a falar confirme que que o site é seguro.
  • Quando um programa faz aparecer uma janela de informação ou aviso, ler sempre o que lá está e tentar perceber o que se passou antes de clicar em alguma coisa.

--> ...e oportunidades a aproveitar
  • Através da Rede podemos conhecer novas influências musicais, filmes, tendências da literatura. Um universo mais vasto e muito para além do que a rádio e a televisão mostram.
  • Instantâneo é a palavra-chave. Quase imediatamente acede-se a informação especializada sobre um assunto qualquer, comum ou incomum.
  • Poder conhecer novas pessoas e influências, com atitudes e ideias diferentes - ou semelhantes - às nossas, alargando horizontes. Estejam estas pessoas onde estiverem.
  • Conseguir mostrar e disponibilizar aos outros aquilo que se cria: músicas, filmes, fotografias, textos.
  • Poder ultrapassar barreiras ou dificuldades físicas, nossas e dos outros, trabalhar e estudar à distância, mesmo sem sair de casa.
  • É possível explorar as nossas ideias, e as dos outros, exprimir aquilo que pensamos e dialogar com outros.
  • O Instante Messenging é uma das ferramentas de contacto mais populares entre os jovens. Podem ser usadas como uma forma de contactar com novos amigos, embora seja também das áreas onde o acompanhamento e o diálogo com os pais é mais importante e útil para evitar problemas ou enganos.
  • A grande oportunidade é poder usar a Internet para aprender a usar a própria Internet: desde fóruns, a sites e a pessoas dispostas a ajudar, muita coisa pode ser aprendida.

Conselhos e listagem realizados em colaboração com Daniel Cardoso, 22 anos, participante do projecto EU-kids

Pais: há que acompanhar e não controlar
  • Assuma a responsabilidade. A segurança online de crianças e jovens é responsabilidade de todos, mas cabe aos pais e à família estabelecer os princípios fundamentais.
  • Promova a sua literacia digital. Um dos problemas que está na base das situações de risco e insegurança vividas por crianças e jovens na Internet resulta do pouco à-vontade que pais e educadores têm do funcionamento do universo das tecnologias de informação em geral e computadores e Net em particular. Não é preciso saber tanto quanto eles, mas um mínimo ajuda sempre.
  • Promova o diálogo e aprenda com os seus filhos a utilizar as ferramentas online. Procure também os recursos informativos disponíveis online.
  • Dialogue com os seus filhos sobre a utilização que eles fazem dos computadores e deixe claras as suas expectativas e quais os valores que devem presidir à utilização. Deixe claro o que é e o que não é aceitável. Fale-lhe também do que há de bom e alerte para os riscos existentes.
  • Coloque o computador em uma zona comum da casa. Não dê livre acesso ao computador e à Internet, a qualquer dia e hora, sem qualquer supervisão. Procure colocar o computador com o ecrã virado para o interior do espaço e não para a parede.
  • Defina regras de utilização em conversa com os seus filhos.
  • Garanta o cumprimento destas regras. A forma de utilização pode ficar plasmada numa listagem afixada em local visível, perto do computador.
  • Conheça novas ferramentas para além dos básicos antivírus. A classificação de conteúdos, monitorização da utilização e controlo de tempo poderão ser úteis. Por si só, não são soluções definitivas, mas podem ajudar, sobretudo com crianças mais novas.
  • Regule os encontros offline. Um dos grandes perigos para uma criança ou para um jovem são os encontros reais com pessoas que se conhece apenas do universo da Internet.

Conselhos dados por Tito de Morais do projecto muidossegurosna.net

Monday, January 26, 2009

Academia Microsoft em Castelo Branco

Olha a minha escolinha do bacharelato :):)

Daqui: http://diario.iol.pt/tecnologia/microsoft-castelo-branco-academia-microsoft-escola-superior-de-tecnologia-tecnologia-ultimas-noticias/1036334-4069.html

Academia Microsoft em Castelo Branco

Espaço vai ficar na Escola Superior de Tecnologia do Instituto Politécnico

Uma Academia Microsoft vai instalar-se na Escola Superior de Tecnologia do Instituto Politécnico de Castelo Branco a partir de quarta-feira, anunciou esta segunda-feira a instituição, escreve a Lusa.

A iniciativa surge no âmbito do projecto Academias da Agência para a Sociedade do Conhecimento e visa a criação de espaços para formação em Tecnologias de Informação e Comunicação, tanto profissionalizante como na óptica do utilizador.

Para o efeito, são integradas iniciativas já existentes no terreno da responsabilidade de empresas ligadas ao ramo, como é o caso da Microsoft - sendo que na Escola Superior de Tecnologia funciona já a Academia Cisco, especializada em redes.

Os formadores da academia serão docentes da Escola Superior de Tecnologia certificados pela Microsoft.

Para além das vantagens para os estudantes, a escola ganha acesso «a currículos, recursos, ferramentas e suporte que permitem fornecer formação e certificação de alta qualidade», destaca a instituição de ensino superior.

A academia possibilita ainda «aos empregadores locais o acesso a recursos humanos mais competentes nas áreas das tecnologias da informação», acrescenta.

Segundo a direcção da escola «a adesão EST ao programa IT Academy da Microsoft assume uma grande relevância na estratégia da escola, na medida em que contribuirá para a qualificação e requalificação profissional de activos, numa área que necessita de grande desenvolvimento em Portugal, das Tecnologias da Informação e Comunicação».

Thursday, January 22, 2009

Protocolo HTTP - Reminders... :)

Métodos GET, POST???
Qual usar? Qual a diferença?? Humm??

Então essencialmente:
- GET: enviamos os parâmetros por querystring e recebemos o resultado (não necessariamente XML)
- POST: enviamos os parâmetros no body do pedido e recebemos o resultado (não necessariamente XML)

Não é muito vulgar mas pode acontecer querermos enviar um XML por POST e parâmetros no URL.
De notar que há sites que só aceitam pedidos através de um dos métodos (GET ou POST) porque esse item é configurável no IIS.

Descrição interessante aqui:
http://www.cs.tut.fi/~jkorpela/forms/methods.html, tópico The fundamental differences between "GET" and "POST"

Detalhes interessantes também aqui:
http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html (creio que pouca gente sabe que existem estes todos...)

E prontux!

Have fun! :)

Thursday, January 8, 2009

Antivirus de borla (só p análise e pouco mais, mas...)

Estava eu em luta com o meu PC, que teimava em se arrastar cada vez mais, eis senão quando descobri que andavam por aqui uns troianos armados em gregos!

Então, com a ajudita de um querido colega, descobri uma página que analisa o disco gratuitamente e detecta ameaças. Para desinfecções, é preciso pagar (a não ser q sejam fraquitas...), mas já ajuda pra malta ver o que se anda a passar nos bastidores da máquina.

Aqui fica o link:
http://www.pandasecurity.com/portugal/homeusers/solutions/activescan/default.htm?track=80381

Enjoy...