SEARCH KEYWORD -- CERTIFICATE CHAIN
Method chaining and lazy evaluation in Ruby
Method chaining has been all the rage lately and every database wrapper or aything else that’s uses queries seems to be doing it. But, how does it work? To figure that out, we’ll write a library that can chain method calls to build up a MongoDB query in this article. Let’s get started! Oh, and don’t worry if you haven’t used MongoDB before, I’m just using it as an example to query on. If you’re using this guide to build a querying library...
Ruby,Method chaining,Lazy evaluation,Implementation 2011-11-29 08:51:17
My secret Hobby: Applying for jobs
I have a probably unusual habit: I'm applying for jobs as programmer at least once a year. It 's not that I don't have a job, or that I don't like what I do, but since I am self employed and running my own company I have the feeling that I am coming out of touch of what the current job market is like, and so I started to apply for jobs at different companies once in a while. Just to keep in mind how this is like and for the fun of it.I think this is also a good training should I need to be emplo...
Crazy! 618 million daily active users on Facebook
Facebook released 2012 Q4 financial report. Facebook total revenue in the fourth quarter of 2012 is $1.585 billion, an increase of 40% over the same period last year, about 23% of the total revenue are from mobile advertising. Net profit is $64 million, down 79% over the same period last year.Now Facebook monthly active users reach 10.6 million, daily active users reach 618 million. The daily active users from mobile are more than the daily active users from desktop side the first time.In the e...
Facebook,Financial report,Mobile 2013-01-31 03:13:06
Chrome to block mixed content downloads in version 86
Google has announced its plan to block mixed content downloads in Chrome in February 2020 and now the day to block mixed content downloads is coming soon as we are nearing October when Chrome 86 is supposed to be released. What is mixed content downloads? According to Google, it is non-HTTPS downloads started on secure pages. For example, if you access a page called https://example.com/download, and in this page, there is a download link to http://download.example.com/something, ...
CHROME,MIXED CONTENT DOWNLOADS 2020-09-18 21:10:53
A plugin to update last_error in Delayed Job
delayed_job is a process based asynchronous task processing gem which can be ran at background. It will fork the specified number of processes to execute the tasks asynchronously. The task status is usually stored in the database so that it can be easily integrated into a Rails application where asynchronous job execution is desired. Normally when a job fails to execute or error occurs, it would save the error into the database with the column last_error. Ideally all these will be handled b...
RUBY,RUBY ON RAILS,DELAYED JOB,LAST_ERROR 2017-11-18 13:05:49
Understanding JavaScript closure and where it can be used
Closure The official definition of closure is: an expression (usually a function) that has many variables and is bound to an environment that includes those variables. In JavaScript, closure refers to the ability of a function to access the lexical scope in which it was defined, even after the function has been executed and left that scope. This ability is due to the fact that when a function is created, it generates a closure that includes a reference to the definition environment of the curr...
CLOSURE,JAVASCRIPT,USAGE 2023-03-05 02:17:08
4 Technologies That Impact You (Without Your Knowledge)
Our world to day is so driven by technology that it’s easy to stay on top of the major changes and developments. We know when there’s a major new innovation in personal electronics; we know that the 5G network is rolling out this year; we track the progress of smart cars, learning thermostats, and interactive home speakers. We even tend to care about how major tech companies around the world are performing! However, as “plugged in” as we all seem to be to the world of tec...
AI,DATA ANALYTICS,IOT 2020-04-16 06:35:54
App's user value doesn't necessarily bring business value
There is an old saying in Internet world, you can get business value as long as you can achieve user value. Is this statement outdated in mobile Internet era? This statement originated from PC Internet era, but now the time users spend on PC drops and user behavior tends to be stable and conservative. In contrast, people are more willing to stay on mobile devices. The difference between PC and mobile is that users are freely to move around on PC end. People can navigate from one link to another ...
App,Business value,User value 2013-06-25 10:52:12
Cracking Siri
On October 14, 2011, Apple introduced the new iPhone 4S. One of its major new features was Siri, a personal assistant application. Siri uses a natural language processing technology to interact with the user.Interestingly, Apple explained that Siri works by sending data to a remote server (that’s probably why Siri only works over 3G or WiFi). As soon as we could put our hands on the new iPhone 4S, we decided to have a sneak peek at how it really works.Today, we managed to crack ...
Siri,Cracking,Defect,Speech to text,Record,AI 2011-11-15 08:38:23
Prototypes and Object Orientation
David Chisnall takes a look at the two dominant paradigms in object-oriented languages (classes and prototypes) and discusses the strengths and weaknesses of each.Two terms are quite often confused when describing programming languages:class-based and object-oriented:Simula was the first class-based language. It provided classes (actually implemented using closures) as a means of encapsulating abstract data types.Smalltalk was the first object-oriented language. It provided a...
Prototype,OOP,Differential,Comparison,Mo 2011-09-02 11:51:26
RECENT
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- more>>