Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Front-end



  Why I Won’t Hire You

I will be very honest with you in this post. Most interview articles only show obvious mistakes, as if most people don’t know showing up late is bad form. I will tell you the things I didn’t really know about until I was the one interviewing, and interviewing for a variety of positions and person-types. No interview prep article ever prepared me in the right way for how interviewers really think. That is what I will be sharing with you today. When you first walk in...

   Career,Hire,Preparartion,CV,Resume     2012-01-11 04:38:19

  Why I Will Never Feel Threatened by Programmers in India

I got a call from a friend of a friend the other night. It was a fellow with whom I’d talked 11 months ago about a project he and his partner were looking to start. We established then that I wasn’t the guy for him, that I was likely too expensive for their big-dreams, small-means budget. Fast forward to present day: their project is still not launched, it’s still not right. They’ve paid for something between 600-700 hours of development with a firm in India, an...

   Indian programmer,Outsourcing,Poor quality,Low cost     2011-12-05 12:58:26

  Why I Will Never Feel Threatened by Programmers in India

I got a call from a friend of a friend the other night. It was a fellow with whom I’d talked 11 months ago about a project he and his partner were looking to start. We established then that I wasn’t the guy for him, that I was likely too expensive for their big-dreams, small-means budget. Fast forward to present day: their project is still not launched, it’s still not right. They’ve paid for something between 600-700 hours of development with a firm in India, an...

   Indian programmer,Outsourcing,Poor quality,Low cost     2011-12-05 13:00:04

  Why I Will Never Feel Threatened by Programmers in India

I got a call from a friend of a friend the other night. It was a fellow with whom I’d talked 11 months ago about a project he and his partner were looking to start. We established then that I wasn’t the guy for him, that I was likely too expensive for their big-dreams, small-means budget. Fast forward to present day: their project is still not launched, it’s still not right. They’ve paid for something between 600-700 hours of development with a firm in India, an...

   Indian programmer,Outsourcing,Poor quality,Low cost     2011-12-05 13:00:13

  The worst program I ever worked on

Most contract jobs fade pretty quickly in memory after the work is done, but some you remember for the rest of your life. This is one of the latter variety. This happened long ago, at a (fair sized) company that shall remain nameless. The software was a chunk of code that had been maintained by a single guy that had been fired recently and was a core component of a commercial system. So far nothing unusual, companies tend to find out that they have a piece of critical knowledge in one head all ...

   Program,worst     2011-03-17 13:58:36

  C++ : string beginWith and endWith

C++ is an very powerful programming language. It is efficient and flexible. When writing C++ programs, we may often need to process strings and often we need to check whether a string begin with some substring or end with some substring. We can use following functions to ahieve these:     static bool beginWith(const std::string str,const std::string needle){        return (!str.compare(0,needle.length(),needle));    }    ...

   C++,beginWith,endWith,     2012-08-31 06:53:44

  Redis Cluster and Common Partition Techniques in Distributed Cache

In this post, I will discuss a few common partition techniques in distributed cache. Especially, I will elaborate on my understanding on the use of Redis Cluster. Please understand that at the time of writing, the latest version of Redis is 4.0.10. Many articles on the same topic have a different idea from this post. This is mainly because, those articles are probably outdated. In particular, they may refer to the Redis Cluster implementation in Redis 3. Redis Cluster has been improved...

   REDIS,DISTRIBUTED CACHE,CLOUD COMPUTING     2019-01-17 08:10:37

  How Chinese tech websites survive

As a tech site which aims to share knowledge and experience, content is its core value. To attract readers, it needs to produce valuable content and keep the originality of the content. When an article is published on a site, it should be a copyrighted property of that site or the original author while others should be very careful when considering to copy that article to their own site. They should generally avoid to copying the whole content of the article. However, in reality, this is no...

   WEBSITE,COPYRIGHT,CHINESE     2017-08-08 21:54:32

  Good ways to build communities around a web product

If a product wants to be successful, there are must be a group of loyal users of the product. Though their influence, more and more people get to know and product and start to use the product and again promote the product. The most difficult thing to promote a product after building an excellent product is to find the first bunch of users. For web products, same conditions apply, but the ways to promote the product may be more abundant. Besides the advertisement, there are other ways a web produ...

   Web product,Community,Promotion     2014-03-12 07:37:05

  Additional steps need to implement to setup shadow-boxV2 OPTEE on Raspberry PI

We followed the Shadow-box v2 project from the https://github.com/kkamagui/shadow-box-for-arm to set up the trustZone on Raspberry PI modeB to protect the Linux Kernel. But got a problem when doing the step: [3.6.5. Activate Shadow-Box for ARM and Start Secure Pi!] to create the hash for the memory area. The result is not shown. If you met the same problem, this is what I did to fix the problem on my PI: 1.1  When we do the step [3.5.1. Copy OP-TEE OS with Shadow-Box for ARM and N...

   HARDWARE,RASPBERRY PI     2019-05-20 08:52:55