Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Details



  A Python assignment trap

Python has no assignment, it only has reference. Assume, we have following code snippet: >>> values = [0, 1, 2] >>> values[1] = values >>> values [0, [...], 2] Why the result is not [0, [0, 1, 2], 2], instead it goes into an infinite loop? To understand this, we need to understand some basics about Python. Python has no variables, it only has labels. When we run: values = [0, 1, 2] Python will first create a list object [0,1,2], then it labels it as values. If we later...

   Python,Assignment,Trap,Shallow copy     2013-07-19 22:08:36

  Microsoft forms a new subsidiary focused on open source called Microsoft Open Technologies

Microsoft once again changes its attitude and intends to set up an open technology subsidiaries in order to promote the formulation of open-source projects and standards.The new company name is Microsoft Open Technologies and Jean Paoli, Microsoft executives will be the president of the new company. The company will also form interoperability strategy team in the future. The newly established company will have about 50-75 employees.Over the years, Microsoft has been considered to be the rival of...

   Microsft,Open source,Microsoft Open Technologies     2012-04-13 06:10:45

  Getting started with C++ TR1 regular expressions

Overview This article is written for the benefit of someone familiar with regular expressions but not with the use of regular expressions in C++ via the TR1 (C++ Standards Committee Technical Report 1) extensions. Comparisons will be made with Perl for those familiar with Perl, though no knowledge of Perl is required. The focus is not on the syntax of regular expressions per se but rather how to use regular expressions to search for patterns and make replacements. Support for TR1 ext...

   Regular expression,Replace,TR1,Extension     2011-08-14 07:25:20

  $40 million per year to keep Wikipedia running

Wikipedia is an incredibly frugal and efficient nonprofit organization. It serves half a billion visits per month. But do you know how much it costs to keep this huge website running? According to 2012-13 Wikimedia Foundation Annual Plan, the expected spending is around $40 million. Some may argue that Wikipedia is just a site with "just text", why does it cost so much? Oliver Emberton shared his view. To keep Wikipedia running and serve 500 million visits per month. First, you're going to need ...

   Wikipedia,Spending,Cost     2013-09-24 23:05:10

  Some Thoughts on Twitter's Availability Problems

As a regular user of Twitter I've felt the waves of frustration wash over me these past couple of weeks as the service has been hit by one outage after another. This led me to start pondering the problem space [especially as it relates to what I'm currently working on at work] and deduce that the service must have some serious architectural flaws which have nothing to do with the reason usually thrown about by non-technical pundits (i.e. Ruby on Rails is to blame). Some of my suspicions ...

   Twitter,Architecture,Availability,Design     2011-08-12 07:39:21

  JavaScript interview questions

This post will cover the JavaScript questions I have encountered and have seen during my programming career. They will mainly focus on vanilla JavaScript though there are lots of excellent frameworks out there and many people are using them in their daily work. this keyword this keyword is an very important but easy to confuse concept in JavaScript since it is always referring to the calling object of the function. 1. What will be the output of below code snippet? function User(name) { this....

   JAVASCRIPT,ALGORITHM,THIS,CLOSURE     2019-03-09 07:05:46

  Here is what XcodeGhost author says

The first compiler malware in iOS was disclosed by Chinese iOS developers on Wednesday(Beijing time). The name of this malware is XcodeGhost as described by Alibaba researchers who released the analysis of this malware.  The malicious code is located in a Mach-O object file that was repackaged into some versions of Xcode installers. These malicious installers were then uploaded to Baidu’s cloud file sharing service for used by Chinese iOS/OS X developers. Xcode is Apple’s offic...

   IOS,SECURITY,XCODEGHOST,APP STORE,APPLE     2015-09-18 20:51:38

  12 useful Chrome commands

Many useful features of Chrome don't show up on its menus. You can access them through the chrome:// command. In this article we will introduce 12 useful chrome:// commands. 1. chrome://flags It can be used to turn on or turn off some chrome features. 2. chrome://dns This command will show the domain name list caught by the browser. 3. chrome://downloads You can access this through chrome menu as well. The shortcut is Ctrl+J 4. chrome://extensions This command equals to Menu->Tools->Ext...

   Chrome,chrome://     2013-01-25 04:38:03

  Why are ugly websites so successful?

“Techmeme has redesigned,” Gabe Rivera founder of the popular technology news site wrote in January 2012. “Drudge Report is now indisputably the web’s ugliest news site.” I use Techmeme all the time. I find it an excellent news website. It’s a collection of well-selected links to important issues in the technology industry. It doesn’t look pretty but it works fine for me. Asides from the quality of its stories it also has black text on white bac...

   Website design,Ugly,Success,Analysis     2012-02-13 05:27:56

  Access control in Java -- Permission check order

Previously we showed you how to turn on SecurityManager in Java. After SecurityManager is turned on, a series of permission checks will be applied on the code you are calling in your application to protect some resources against malicious access such as files, sockets etc. To perform these permission checks, a set of Permissions will be created and checked using the AccessController. The AccessController has three purposes : To decide whether an access to a critical system resource is to be all...

   JAVA,SECURITY,ACCESSCONTROLLER     2016-03-07 04:17:40