Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Bit operation



  Convert time to Unix time

Unix time is defined as the number of seconds that have elapsed since midnight Coordinated Universal Time (UTC), 1 January 1970,not counting leap seconds. It is used widely in Unix-like and many other operating systems and file formats. It is neither a linear representation of time nor a true representation of UTC. Unix time may be checked on some Unix systems by typing date +%s on the command line. Sometimes it's a bit difficult to compare times stored in different applications or systems with ...

   UNIX time, Oracle DATE, conversion, timestamp     2013-01-19 09:04:17

  Networking Terminologies

Portmaps sudo apt-get install -y portmap Portmap is a part of ONC RPC (Open Network Computing Remote Procedure) collection of software for implementing remote procedure calls between Computer Programs. It is widely used by NFS (Network File System) and NIS. Portmap is a server that converts RPC program number to DARPA protocol port number. It must be used in order to make RPC calls. Network Infomation Service (NIS) sudo apt-get install -y nis NIS is a client server directory service provi...

   Linux,Network programming,Network file system     2012-02-16 06:22:30

  If programming language is a knife, what would it be?

The following diagram shows that if is a programming language is a knife, what would it be.? This figure I personally feel very interesting.I try to give my  explanation for some languages  here:.C + +, C and Pascal are the Swiss Army knife. The knife of the C language has a USB, that can do hardware operation. C++, a knife with everything, C + + is a variety of languages​​. Swiss army knife (figure C+ + is very powerful, do not think that it is fictional, this knife is r...

   Programming language,Knife,Swiss army life     2012-04-21 00:52:22

  Check out Google Reader substitutes

It's only a few hours left that Google Reader will be shut down Since Google decides to decommission such a good product, many people are disappointed about Google. The gene of Google is completely different from Facebook, The strategy of promoting Google+ everywhere is becoming a bit offensive. As a heavy user of Google Reader, people have to start looking for an alternative, Below we give a comparison of different Google Reader substitutes. And we compare them with following parameters: Lload...

   RSS reader,Google Reader,Feedly     2013-06-30 08:46:42

  Huawei is open to acquire Nokia

Last night Huawei unveiled a new flagship smartphone Ascend P6 in London. It may be the thinnest smartphone in the world and its potential competitor is Samsung Galaxy S4. Before the press event, an article from FT said that Huawei was open to buy Nokia. "We are considering these sorts of acquisitions,maybe the combination has some synerges but depends on the willingness of Nokia. We are open-minded." remarked by Huawei's Richard Yu. After this news, Nokia's share price surges 11% to $4.10 per ...

   Huawei,Nokia     2013-06-19 00:43:38

  A Different Kind of Technical Interview

Everyone who's been programming professionally for a while knows the standard format of the technical interview. You go in, there's a whiteboard in the room, and you write code on it to answer questions.Everyone also has the same basic complaints about these interviews. In a normal work environment, you have access to an API or search engine, but at a whiteboard you don't. Whiteboard questions generally don't include much in the way of overall design, and they're typically limited to simple algo...

   Interview,Programming,Methods,Pairing     2011-06-04 07:56:21

  How Java Application Developers Can Build Secure Internet Based Apps?

There are few compiled solution tested by experts to guide Java application development and maintenance team how they can start safe journey on Internet. Strong encryption, wise passwords, secure hardware are few of the tech tools that should be used by Java app development team to secure their Internet based apps.   The Internet is most amazing yet most risky platform where nobody knows either they are doing safe transaction on Internet or there is some dog watching out for data packets t...

   JAVA APPLICATION MAINTENANCE,JAVA APPLICATION DEVELOPMENT     2015-09-16 02:13:17

  Why should we keep column as NOT NULL instead of NULL in MySQL?

Keep table column as NOT NULL instead of NULL except in some special cases. This statement is cited by many articles of MySQL optimization, but they don't say why we should do this. Here we discuss about this. First why are there many people using NULL when defining table? The reasons may be: NULL the the default when defining table, the rookies or people who don't want to have much troubles will keep this default setting Many people think NOT NULL will require more space Many people don't want...

   MySQL,NULL,reason     2012-10-27 03:21:27

  Application vs Database Programming

A few years ago, I had a problem.  A database routine for processing bulk payments for LedgerSMB that was humming along in my test cases was failing when tested under load with real data prior to implementation.  Some testing showed that while it ran fine with small numbers of inputs, it eventually slowed way down as the number of inputs rose.  Andrew Sullivan, who was also on the project through a different company, suggested it was something called a "cache miss" because I...

   Application Programming,Database programming,Comparison,Difference     2012-03-04 12:08:35

  One interesting story about Chinese software development

I have once seen an interesting complaint written by one foreigner about Beijing South Railway Station (China) on foursquare. It says: "There is simply no way to buy a ticket at the machine unless you have a Chinese ID. What the hell they have English interface for then?" Apparently,the foreigner cannot buy ticket because he doesn’t have Chinese ID but there still presents an English interface for foreigners on the vending machine. Because of my profession, I find this awkward situation w...

   Software design,User experience,Importance     2012-03-26 14:42:50