Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Check



  7 Resources Every JavaScript Developer Should Know

A web developer today is expected to be an expert in every aspect of their craft and JavaScript is no exception.  Years ago JavaScript seemed to be more of an annoyance, producing those trailers at the bottom of the browser.  This has changed and JavaScript is a first-class citizen as a functional programming language and what seems like an unlimited number of resources covering the language. I have been doing more and more JavaScript lately, both on the front-end and some node.js...

   JavaScript,Resource,Study,Website     2012-03-15 12:54:40

  Optimization Tricks used by the Lockless Memory Allocator

With the releasing of the Lockless Memory Allocator under the GPL version 3.0 license, we can now discuss more of the optimization tricks used inside it. Many of these are things you wouldn't want to use in normal code. However, when speed is the ultimate goal, sometimes we need to break a few rules and use code that is a little sneaky.The SlabA slab is a well-known technique for allocating fixed size objects. For a given object size, a chunk of memory is divided up into smaller regions of that ...

   Optimization,Memory allocation     2011-11-16 08:02:16

  Install and setup Kafka on Windows

Kafka has become a very popular distributed message delivery service which decouples different services while making message delivery between service easy, fast and reliable. In this post, we will walk through how to install and set up Kafka on Windows. Pre-requisite Java Apache ZooKeeper Installation Go to Kafka's download link and download the latest stable release, we downloaded 2.2.0 as of this writing. After downloading, copy the installation file to some folder and unzip it.  Sinc...

   KAFKA,STREAM,USER GUIDE     2019-06-01 02:12:07

  Recent Online Scams You Need to Know About

It’s easy to forget that the internet is a dangerous place and that it’s easy to become a victim. Everyone wants to think that they’re too smart to fall for online scams or obvious fraud. Yet actions speak louder than words, and 97% of people still struggle to identify a phishing scam. Awareness is critical in beating the cybercriminals. So here are examples of the latest online scams and tips on how to avoid becoming a victim of similar attacks. What are Online Scams? Online s...

   DATA SECURITY,VPN     2019-12-12 07:18:36

  Cracking Siri

On October 14, 2011, Apple introduced the new iPhone 4S. One of its major new features was Siri, a personal assistant application. Siri uses a natural language processing technology to interact with the user.Interestingly, Apple explained that Siri works by sending data to a remote server (that’s probably why Siri only works over 3G or WiFi). As soon as we could put our hands on the new iPhone 4S, we decided to have a sneak peek at how it really works.Today, we managed to crack ...

   Siri,Cracking,Defect,Speech to text,Record,AI     2011-11-15 08:38:23

  A mini post on GoLang context

In a GoLang web server, every request coming in will be handled by a goroutine. In the request handler, the logic may also need to create new goroutine to handle other tasks like RPC call. When the request is processed and response is returned, these goroutines created need to be exited so that no goroutine leak should happen. package main import ( "fmt" "log" "net/http" ) func main() { http.HandleFunc("/echo", func(w http.ResponseWriter, r *http.Request) { fmt.Println(&r) w.Write(...

   CONTEXT,GOLANG     2019-12-14 06:21:02

  Japanese Used Cars-Top Six Myths about Buying One in Russia

With the prices of brand new vehicles steadily increasing. Prospective car owners in Russia have started to move towards buying used vehicles. Being a reliable name in the automobile manufacturing world, Japanese used vehicles are playing a good contribution in fulfilling this increasing demand. Japanese used vehicles have become a major contributor to the overall trade of automotive industry. Keeping this fact in mind, it could be easily assumed that buying one should be a completely hassle-fr...

   JAPANESE USED CARS FOR SALE IN RUSSIA     2017-11-06 13:29:15

  PHP to integrate with Sign in with Google

Google has a huge user base and hence it provides an authentication service for third party service to integrate with them so that people can sign in with Google in their services. Google also adopts OAuth 2 to provide this kind of Open ID connect service. This post will introduce how to integrate with sign in with Google functionality in your PHP website.  Create a client app on Google The first step you should follow is to create a Google app, you can follow the post here to create the p...

   PHP,GOOGLE API,OPEN API,SIGN IN WITH GOOGLE     2019-03-03 02:00:09

  Write Your Own R Packages

Introduction A set of user-defined functions (UDF) or utility functions are helpful to simplify our code and avoid repeating the same typing for daily analysis work. Previously, I saved all my R functions to a single R file. Whenever I want to use them, I can simply source the R file to import all functions. This is a simple but not perfect approach, especially when I want to check the documentation of certain functions. It was quite annoying that you can’t just type ?func&n...

   DATA SCIENCE,R PROGRAMMING,DATA ENGINEERING     2019-10-19 07:20:52

  How does computer boot up?

The whole boot process of computer can be summarized in 4 phases. 1. BIOS In the 70's  read-only memory(ROM) was invented. The boot program is written into ROM, the first thing the computer does is to read and execute this program when it's powered on. The program in this chip is called "Basic Input/Output System" (BIOS). 1.1 Power-On Self-Test The BIOS will first check whether the computer hardware can fulfill the basic conditions for booting up, this process is called Power-On Self-Test...

   Computer, boot, partition     2013-02-23 23:19:47