Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- DATA SCIENCE



  Emotion analysis on Twitter for past 5 years

Emotion analysis is a new research direction in computer science in these years, what it does is expressing emotions and feelings of people with data. The means to do emotion analysis include natural language processing, statistical and signal processing. The platforms which are most suitable for emotion analysis are also microblogging like social networking platform, Twitter is one good example.Computing Laboratory of the University of Vermont project Hedonometer conducted emotion analysis for...

   Emotion analysisTwitter,Hedonometer,happiness     2013-05-08 06:17:25

  Lessons from the Trenches

I believe that making a game is part art and part science, so it's no wonder that managing a game project is also part art and part science. Clearly if it was all science then the industry would get a collective F for not having made any significant progress over the last decade - all one has to do is just glance at the published postmortems to see that the same patterns are repeated over and over.A game has to be fun, engaging, grab users in the first two minutes and also keep their a...

   Game,Trenches,Tips,Game design,pattern     2011-10-10 05:08:50

  How Speeding The "Most Important Algorithm Of Our Lifetime" Could Change This Modern World

Math breakthroughs don't often capture the headlines--but MIT researchers have just made one that could lead to all sorts of amazing technological breakthroughs that in just a few years will touch every hour of your life. Last week at the Association for Computing Machinery's Symposium on Discrete Algorithms (SODA) a new way of calculating Fast Fourier Transforms was presented by a group of MIT researchers. It's possible that under cert...

   FFT,Speed-up,Fast fourier transform     2012-03-20 07:47:04

  Mastering a New Programming Language: A Professional Guide

Introduction Learning a new programming language can seem daunting, but with the right approach, anyone can become proficient in a new language. Whether you're a beginner or an experienced programmer, mastering a new language can open up new opportunities in your career and enable you to tackle new and exciting programming challenges. In this guide, we'll provide you with a step-by-step process for mastering a new programming language. Step 1: Choose a Language and Set Goals The first step in ma...

   PROGRAMMING,GUIDE,TIPS     2023-04-22 02:52:00

  We’re working our young people too hard

Yesterday, I shared an anecdote involving a school I once attended with a list. This anecdote eventually became the basis for a blog post. Traffic was fairly normal for the first few hours until it found its way onto hackernews.Then it exploded.The comments on both the original blog post and the post on hackernews filled almost immediately with opinionated hackers, teachers and students sharing similar experiences, discussing the problem and figuring out what should be done about it.Repeate...

   Education,Science,Teacher,Student,Exam     2011-11-17 08:38:01

  The Singular Secret of the Rockstar Programmer

Before all the laws of software, before the purpose of software, before the science of software design itself, there is a singular fact that determines the success or failure of a software developer. This fact makes the difference between the senior engineer who can seem to pick up new languages in a day and the junior developer who struggles for ten years just to get a paycheck, programming other people’s designs and never improving enough to get a promotion. It differentiates the poor...

   Programming,Tip,Great developer,Rockstar     2011-08-07 23:42:09

  Hey kids, just say NO to programming !

Cory Doctorow's latest talk 'The Coming War on General Purpose Computing' really puts things in perspective about life in the 21st century. This got me thinking more about functional programming languages and how they are related to the intentional limitation/crippling of turing machines by industry and government. What if Stallman is right about the intentional efforts to limit freedom of information ? What if it's even worse than we all think it is ? In relation to functional languages ...

   Programming,Factor,View,Kids,No     2012-01-16 10:16:19

  Live in Beijing and Thinking about Starting a Tech Company? Read. This. Post. Now.

The Disrupt Beijing Hackathon starts in a little more than 24 hours, and we’ve been working hard over the last few days to make it even more of a no-brainer for local Beijing developers to attend.In addition to the chance to be the next GroupMeor win valuable prizes, we have decided to give all Hackathon attendees who complete a hack and present in the 24-hour period free tickets to the Disrupt conference Monday and Tuesday. That’s a $1,000-plus value for s...

   Startup,Beijing,TechCrunch,Disrupt,2011     2011-10-28 12:41:43

  If Multitasking Is Impossible, Why Are Some People So Good at It?

"Multitasking means screwing up several things at once," somebody once said, wrongly. In fact, we don't do many things at once, ever. We do many things in quick succession. And some of us are very good at it.Nagy-Bagoly Arpad/ShutterstockEverybody multitasks. We have conversations while driving. We answer email while browsing the Web. It's hard to imagine living any other way. What would be the alternative, removing the seats from your car to ensure you only drive alone? Block every website not ...

   Multitasking,Human,Program,Task switch,Myth     2011-11-18 09:03:22

  How key-based cache expiration works

There are only two hard things in Computer Science: cache invalidation and naming things — Phil Karlton Doing cache invalidation by hand is an incredibly frustrating and error-prone process. You’re very likely to forget a spot and let stale data get served. That’s enough to turn most people off russian-doll caching structures, like the one we’re using for Basecamp Next. Thankfully there’s a better way. A much better way. It’s called key-based cac...

   Cache,Expiration,Key-base cache,Work     2012-02-20 05:32:40