SEARCH KEYWORD -- 2012
Tricks with Direct Memory Access in Java
Java was initially designed as a safe managed environment. Nevertheless, Java HotSpot VM contains a “backdoor†that provides a number of low-level operations to manipulate memory and threads directly. This backdoor – sun.misc.Unsafe – is widely used by JDK itself in packages like java.nio or java.util.concurrent. It is hard to imagine a Java developer that uses this backdoor in any regular development because this API is extremely dangerous...
Java,Directly memory access,Tricks,JVM 2012-02-13 05:31:19
Do you really understand Geolocation?
LBS(Location based service) services continue to emerge, it seems that every product has some relationship with maps. But to be honest, do you really understand what is Geolocation? Not necessarily. Although lots of products have LBS service, they can be categorized as sign, search, navigation and information display, these are functional features of the map as a software should have. However, Geolocation is not software, it is just a functional feature, a functional feature of all LBS applicat...
geolocation,app,significance 2012-10-22 12:11:41
Will We Need Teachers Or Algorithms?
Editor’s note: This is Part III of a guest post written by legendary Silicon Valley investor Vinod Khosla, the founder of Khosla Ventures. In Part I, he laid the groundwork by describing how artificial intelligence is a combination of human and computer capabilities In Part II, he discussed how software and mobile technologies can augment and even replace doctors. Now, in Part III, he talks about how technology will sweep through education. In my last post, I ...
Teacher,Algorithm,Development 2012-01-16 10:17:45
An Object is not a Hash
Following my article A String is not an Error, I want to bring attention to an issue that similarly applies to JavaScript in general, but has special relevance in the Node.JS environment. The problem boils down to the usage of {} as a data-structure where the keys are supplied by untrusted user input, and the mechanisms that are normally used to assert whether a key exists. Consider the example of a simple blog created with Express. We decide to store blog posts in memory in a {}, indexed ...
Object,Hash,Node.js,JavaScript 2012-01-19 10:16:10
Building the new AJAX mail UI part 2: Better than templates, building highly dynamic web pages
This is part 2 of a series of technical posts documenting some of the interesting work and technologies we’ve used to power the new interface (see also part 1, Instant notifications of new emails via eventsource/server-sent events). Regular users can skip these posts, but we hope technical users find them interesting. As dynamic websites constructed entirely on the client side become de rigueur, there are a number of templating languages battling it out to become the One True Wayâ„...
Web design,Dynamic,Ajax,UI 2012-02-21 05:32:29
How the Internet is Changing Economics
I'm not an economist by training, but I've spent a long time observing markets, and I've often wondered what the great economic thinkers of centuries past (Marx, Smith, Keynes, others) would say if they were alive today and could witness the transformations that have been caused by mass media (radio, TV, print) and the Internet. The Internet, in particular, has had a transformative effect that will doubtless be studied for hundreds of years to come. One of the things that can be said abou...
JavaScript programming style
Douglas Crockford is a JavaScript expert, he is the inventor of JSON. In November 2011 he made a speech "Youtube", during the speech he talked about what JavaScript programming style is.I recommend this speech to everyone, it not only helps you learn JavaScript but also make you enjoying because Crockford is very humorous and he made audience laugh frequently.Next I will summarize JavaScript programming style according to this speech and his article code convention. The so-called programming ...
JavaScript, programming style,Curly braces,Equal 2015-10-14 10:16:44
Responsive Web Design
With the popularity of 3G, more and more people are surfing the Internet using mobile phones. Mobile devices are becoming common devices for accessing internet. So web design faces a big challenge which is how to display the same webpage on different devices with different screen resolutions.Screen resolution of mobile device are usually not very large, the width is below 600px, while PC usually has a resolution over 1000px. It is not an easy task to display the same content with satisfyin...
CSS,Web design,Layout,Response web design 2012-05-03 06:59:40
IDC lists top 6 myths, realities about open source
Summary: What are the top 6 myths? That open source software will enter every market, is inherently innovative, it improves faster than commercial software, that it has less lock-in, that it’s free and that it has little benefit if one is not involved in the community. IDC calls these ideas “myths†but acknowledges there’s more than a grain of truth to all of them At its Directions 2012 conference in Boston today, IDC rev...
IDC,Open source,Reality,Free,Contribution 2012-03-16 08:47:53
Linux Command Line tips that every Linux user should know t
Below is the collection of Linux command line tips which I’ve found useful for Linux users. To get more information about the command mentioned below just open your terminal and type man <command>.Things a Linux user must learnLearn bash: No need to refer a lengthy bash guide or something else. Just read the complete man page of bash (man bash).Learn vim: You might be using Emacs or Eclipse for your work all the time but nothing can compete vim.Learn ssh: Learn the basics of passw...
Linux,Unix,Command line,Tips 2012-03-21 09:27:03
RECENT
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- more>>