Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Deprecated methods



  What is encryption? Its role in the modern age

“Messages and calls are end-to-end encrypted.” If you are a WhatsApp user, you must have read this statement at the top of chats you open. Now, what does it mean? The statement signifies that all the messages or voice notes shared between users are encrypted, and no one can read or listen in on them. As mostly all of us use messaging apps and emails, information security has become a major concern. Moreover, we don’t know how many digital footprints we leave on the web can be t...

   DATA SECURITY,VPN     2021-01-21 08:04:16

  5 Modern Strategies to Improve Your Hiring Process

Without even a pinch of doubt, the labor market across the globe has turned highly competitive. So, there goes a rat race where the best recruiters vie to hire the most potential candidates. Let's say you need to hire Java developers. Certainly, your hiring challenge would be to find applicants with niche skills. Sadly enough, the traditional hiring methods are detrimental to getting the creme of the talent pool. It's time-consuming and involves a lot of manual and paperwork, wherein there are c...

   HIRE,JAVA,DEVELOPERS     2017-06-28 00:15:48

  How To Make Sure Your Next Date Isn’t A Psychopath Via Online Checks

Online dating is pretty much the norm these days when it comes to looking for love, but it can't be denied there’s still a bit of a stigma attached and most certainly an air of mystery. After all, until you meet face-to-face there’s no real way of knowing who they are. It’s putting your faith in a stranger and, of course, that’s more often than not absolutely fine. Over the years though there have been a number of horror stories and it’s enough to put even the most...

   PROMOTION,DATE     2019-06-12 10:44:11

  Device Experiences & Responsive Design

Most recently LukeW was the Chief Product Officer (CPO) and co-founder of Bagcheck which was acquired by Twitter Inc. in 2011. Luke is also the author of the book Mobile First and was Chief Design Architect (VP) at Yahoo! Inc. While the task of designing Web applications and sites for multiple devices can be daunting, two techniques can make the process more manageable: classifying device experiences and designing/building responsively. Here’s how these two approaches can work toge...

   User experience,Device,Responsive design     2012-03-31 00:10:31

  Java API vs Framework

What is the difference between a Java Library and a framework? The two concepts are essentially important for a Java developer. The most important difference between a library and a framework is Inversion of Control. It means that when you call a library you are in control. But with a framework, the control is inverted: the framework calls you. (This is called the Hollywood Principle: Don’t call Us, We’ll call You.) This is pretty much the definition of a framework. Basicall...

   Difference,API,Framework,Library,Java     2011-12-19 13:40:33

  Mobile payment status quo in Singapore

Currently there are lots of mobile payment companies operating in Singapore, these players include GrabPay(a subsidiary of Grab), AliPay, WeChat Pay, Fave Pay, NETS Pay and some others. In some hawker centers, you can see QR code from different companies. This brings lots of benefits to users. But this introduces a big headache to consumers as they have to download different apps to use in different merchants. There is no dominating mobile payment company in Singapore though there are a few lead...

   SINGAPORE,GRAB,GRABPAY,ALIPAY     2019-02-27 07:19:49

  How to password protect a Winzip file

Winzip files are great ways of sharing documents and images of large sizes over the web or through email, since their reduced size makes it possible for them to be sent and received. Also, it is easier to manage one attachment than multiple. But what if the file contains sensitive information you don’t want snoopers to see? Simply add a password protection in Winzip. Adding a password will ensure more security and reliability of the transported files. How to add a Password to your Zip Fil...

   DATA SECURITY,WINZIP     2019-08-29 11:42:41

  Method chaining and lazy evaluation in Ruby

Method chaining has been all the rage lately and every database wrapper or aything else that’s uses queries seems to be doing it. But, how does it work? To figure that out, we’ll write a library that can chain method calls to build up a MongoDB query in this article. Let’s get started! Oh, and don’t worry if you haven’t used MongoDB before, I’m just using it as an example to query on. If you’re using this guide to build a querying library...

   Ruby,Method chaining,Lazy evaluation,Implementation     2011-11-29 08:51:17

  Prototypes and Inheritance in JavaScript

Forget everything you know about object-oriented programming. Instead, I want you to think about race cars. Yes – race cars. Recently I was watching the 24 Hours of Le Mans –a popular racing event in France. The fastest cars in the race are the Le Mans Prototypes. Although these cars are built by car manufacturers like Audi and Peugeot, they are not cars you’ll see on the streets and highways of your home town. They are built exclusively for high-speed endurance ra...

   JavaScript,Prototype,Inheritance     2012-02-27 04:55:22

  A Javascript When Function

function when(conditionFunc, execFunc, interval){ if (conditionFunc()){ execFunc(); }else{ setTimeout(function(){ when(conditionFunc, execFunc, interval);}, interval); } } You have some code which should only execute when a condition is true. E.g. You have code which relies on a javascript library but can't be sure the library has loaded yet and don't want the code to execute until it has. This is common if you have a bookmarklet which injects more than one <...

   JavaScript,When,Implementation,When function     2012-02-24 05:08:34