SEARCH KEYWORD -- Add
Helping people find good Perl tutorials
If a co-worker comes to you and asks you: "I would like to learn Perl, where can I find a good Perl Tutorial?", I am sure your would have a few recommendations. If the same person did not know you she would have to type some search term in Google and hope she found the right learning material.Recently Christian Walde (Mithaldu) asked "How do newbies find Perl learning materials online?". Dave Cross responded by checking the top results when searching for "perl tutorial".It shows that many p...
Perl,Perl tutorial,Resource,Website 2011-11-03 13:34:33
SQL Grammar Summary
æ•´ç†äº†ä¸€ä¸‹ï¼Œå¸Œæœ›å¯¹å¤§å®¶æœ‰ç”¨SQLè¯å¥å¤§å…¨ --è¯ å¥ åŠŸ 能--æ•°æ®æ“作SELECT --从数æ®åº“表ä¸æ£€ç´¢æ•°æ®è¡Œå’Œåˆ—INSERT --å‘æ•°æ®åº“è¡¨æ·»åŠ æ–°æ•°æ®è¡ŒDELETE --从数æ®åº“表ä¸åˆ 除数æ®è¡ŒUPDATE --æ›´æ–°æ•°æ®åº“表ä¸çš„æ...
SQL,Query,Summary,Select,Update,Delete,I 2011-05-20 12:04:55
Why Dynamic Programming Languages Are Slow
In a statically typed language, the compiler knows the data-type of a variable and how to represent that. In a dynamically-typed language, it has to keep flag describing the actual type of the value of the variable, and the program has to perform a data-dependent branch on that value each time it manipulates a variable. It also has to look up all methods and operators on it. The knock-on effect of this on branching and data locality is lethal to general purpose runtime performance. T...
Dynamic language,Slow,Analysis 2012-03-26 15:33:11
Some hidden XSS injection vulnerabilities
XSS injection refers to a Web page generates some unexpected executable js codes based on user input and these executable codes are executed by web browser,i.e, the source code sent to web browser by the server contains some illegal js codes, and these illegal js codes are related to user's input. Common XSS injection vulnerabilities can be fixed with some functions such as htmlspecialchars(escaping HTML special characters) and strip_tags() or similar, but there are some hidden XSS injecti...
XSS,PHP,Security,Code,JavaScript 2012-08-27 20:32:08
Notes on Programming in C
Introduction Kernighan and Plauger's The Elements of Programming Style was an important and rightly influential book. But sometimes I feel its concise rules were taken as a cookbook approach to good style instead of the succinct expression of a philosophy they were meant to be. If the book claims that variable names should be chosen meaningfully, doesn't it then follow that variables whose names are small essays on their use are even better? Isn't MaximumV...
Should All Web Traffic Be Encrypted?
The prevalence of free, open WiFi has made it rather easy for a WiFi eavesdropper to steal your identity cookie for the websites you visit while you're connected to that WiFi access point. This is something I talked about in Breaking the Web's Cookie Jar. It's difficult to fix without making major changes to the web's infrastructure. In the year since I wrote that, a number of major websites have "solved" the WiFi eavesdropping problem by either making encrypted HTTPS web traffic an accou...
Web traffic,Security,HTTPS.Encryption,Wifi 2012-02-24 05:02:58
Android Tutorial: Creating and Using an SD Card in the Emulator
In a previous post, I mentioned how user-friendly Android is for developers. There’s extensive documentation and information on the architecture, the different components and best practices. However, the documentation has a few blind spots. Many of the tools have little documentation and no usage examples. The information is there, it’s just hidden behind a few layers of Android theory.So I’m going to try and document a few of the basic things that you’ll probabl...
Overlap Detection
How does one detect when two strings overlap? In the case below, the four-letter suffix of string 1 matches the four-letter prefix of string 2. 1: "Fire at Will" 2: "William Riker is number one" Sometimes there are several matches; finding the longest is not always straight forward. 1: "Have some CoCo and CoCo" 2: "CoCo and CoCo is here." 2: "CoCo and CoCo is here." 2: "CoCo and CoCo is here." The naïve solution is to take...
String overlap,detection,python,implementation 2012-03-05 05:05:36
There are no free lunches on the internet
Hot data: An IT technician checks the network servers at a data farm. Alamy Photograph: Juice Images/AlamyPhysics has Newton's first law ("Every body persists in its state of being at rest or of moving uniformly straight forward, except insofar as it is compelled to change its state by force impressed"). The equivalent forinternet services is simpler, though just as general in its applicability: it says that there is no such thing as a free lunch.The strange thing is that most use...
Free lunch,Facebook,Google,Privacy information 2011-11-21 03:03:31
Ten things I want Siri to be able to do for me
Now that I've had my iPhone 4S for a couple of days, I'm amazed with what Siri can do. I've asked a number of questions -- real ones, not questions like "What is the meaning of life?" -- and have been totally impressed with how my interaction with the iPhone has changed. But there are more things I'd love to be able to do with Siri, which is the reason for this post.Everyone should understand that Siri is currently a beta product from Apple. A lot of the things I'm talking about here should happ...
Siri,iPhone 4S,AI,Tweet,Four square,Intelligent agent 2011-10-17 11:24:37
RECENT
- Common Pitfalls When Handling JSON in Golang
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- more>>