SEARCH KEYWORD -- string format
How to write your own DSL in Ruby
DSL(Domain Specific Language) is a language defined to fulfill some domain specific requirements to ease people's work. It can be used to define attributes and actions of a domain easily and cleanly. And it is often created based on some common observations or micro patterns of some domain. In Ruby world, there are quite a few places people can find DSL. For example, Ruby itself, Chef recipes. To create a class in Ruby, the traditional OOP way would look like. class User @name = nil @email =...
Java vs F#
Dr Cliff Click of Azul Systems, specialists in manycore JVM systems, recently published a blog post about the performance of Java compared primarily to C and C++ but also discussing C# and .NET. Three of Cliff's comments are of particular interest:Under the heading "Places where C/C++ beats Java for obvious reasons":"Value Types, such as a 'Complex' type require a full object in Java." - Dr Cliff ClickWhat Cliff forgot to mention is that .NET also provides value types and a far more compell...
Java,F#,Performance,JVM 2012-03-07 05:07:31
New CSS3 Properties to Handle Text and Word Wrapping
About a year and a half ago, I wrote about CSS3′s word-wrap property. The angle of the article was the fact that it was a feature that was new in CSS3 that didn’t exist in CSS2.1 and it worked in just about every browser, including old IE. Well, now that’s all changed, which I discovered while researching additions to my CSS3 Click Chart. The word-wrap property has been removed from the CSS3 spec and other related properties have been added. Text-Wrap The text-wrap proper...
CSS3,Word wrap,Overflow-Wrap,Line-Break 2012-01-30 05:58:41
Telecom elements in WeChat
As an engineer who spends much time on focusing on WeChat like applications(Skype, Fring, Viber, Kik Messenger, WhatsApp, Talkbox, LINE, Kakao Talk) , I would like to share with you the telecom element in WeChat to show the inheritance and integration of traditional telecom services in the Internet service and applications.First, WeChat is an application to send messages, the fully IP-based messaging capabilities may replace the traditional telecom services such as SMS, MMS and VMS ,This is ver...
WeChat,Telecom operator 2013-04-13 20:29:46
Do You Make These 5 Database Design Mistakes?
Look, everyone makes mistakes. It’s true. But not all of us have the chance to make mistakes that end up costing millions of dollars in hardware and production support costs. Any one of the following five mistakes listed below will add additional costs to your company. It’s guaranteed. The costs could be hardware related (extra disk space, network bandwidth), which tend to add up quickly. The costs are also support related (bad performance, database re-design, report cre...
Database design,Mistake,Advice,Data type,Compatibility 2012-01-03 11:25:13
Top 9 Most Popular Programming Languages In IT Companies
1.) C LanguageC Language is a general-purpose computer programming language developed between 1969 and 1973by Dennis Ritchie at the Bell Telephone Laboratoriesfor use with the Unix operating system.Although C was designed for implementing system software. it is also widely used for developing portable application software.?0102030405060708091011#include <stdio.h> int main(void) { printf("hello, world!\n");&nbs...
C,Java,C#,C++,Ruby,Popular programming l 2011-04-27 09:21:52
Implementing DESede/ECB/NoPadding cipher algorithm in GoLang
By default, GoLang doesn't provide the ECB mode cipher for DESede though there is CBC mode provided. In cases we need to encrypt/decrypt data with ECB mode, we need to implement those by ourselves. This mode is frequently used when encrypting/decrypting PIN block which is small block data less than 16 bytes. In this post, we will introduce how to implement the DESede/ECB/NoPadding algorithm in GoLang by using the existing cipher support. Here we will not cover how DESede works in detail, instead...
Build a Kubectl Plugin from Scratch
by author The command-line tool kubectl is indispensable when using Kubernetes. You need it to query related Pod and Service information both in developing or performing some maintenance operations, such as events, scale, rolling update, etc. However, when using kubectl, there are many inconveniences. Though Kubernetes is officially maintaining kubectl¹, and you can submit the problems, improvement, and even PR in its Github Issues, you still have to wait long before its release. The m...
Lessons Learned About Documentation
Here at Kendo UI, we have always encouraged you to give us feedback. Whether it’s through our forums, or the Kendo UI User Voice site, what you think is important to us. We take your thoughts very seriously. We receive a lot of feature requests, enhancement requests and other various pieces of product feedback. One of the things that we heard loud and clear from our users was that our documentation could be better. We took a good look at what we had, and we ag...
Documentation,Lessons,Programming 2012-02-15 05:53:28
4 ways to obtain access token in OAuth 2.0
OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...
OAUTH2,ACCESS TOKEN,REFRESH TOKEN 2019-06-29 07:12:03
RECENT
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- more>>