Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- INITIAL COIN OFFERING



  What programming languages should I learn?

Since I started this blog, I have gotten quite a few emails asking me “What programming languages do you recommend for X?” I often finding myself writing something along the lines ofI would honestly recommend python. Something about me being biased because I know and love it.  Usually say something about the competing technology with a back handed insult. Also if they are starting out I would recommend a language that enforces better OO (Object Orientated) practic...

   programming language,Popularity,Java,Tre     2011-09-23 13:11:57

  How Java Application Developers Can Build Secure Internet Based Apps?

There are few compiled solution tested by experts to guide Java application development and maintenance team how they can start safe journey on Internet. Strong encryption, wise passwords, secure hardware are few of the tech tools that should be used by Java app development team to secure their Internet based apps.   The Internet is most amazing yet most risky platform where nobody knows either they are doing safe transaction on Internet or there is some dog watching out for data packets t...

   JAVA APPLICATION MAINTENANCE,JAVA APPLICATION DEVELOPMENT     2015-09-16 02:13:17

  A Programmer’s Greatest Enemy

A programmer’s greatest enemy is getting stuck. A crucial skill in programming—and one that many of my beginning game programming students lack—is the ability to recognize when they’re stuck, to get out of being stuck, and to avoid getting stuck in the first place.Indeed, it’s a skill I’m still learning myself, although the contexts in which I still get stuck are shrinking with time, study, and experience.This morning, as I downloaded crash reports ...

   Programming,Enemy,Stuck,Game design,Crash     2011-10-15 15:06:46

  Create trigger in MySQL

To create trigger in MySQL, the syntax is :CREATE [DEFINER = { user | CURRENT_USER }] TRIGGER trigger_name trigger_time trigger_event ON tbl_name FOR EACH ROW trigger_bodyOne example is :DELIMITER %%DROP TRIGGER IF EXISTS delete_commentCREATE TRIGGER delete_comment AFTER DELETE ON file_generate_infoFOR EACH ROW BEGIN DELETE FROM article_comment WHERE article_id=OLD.article_id;END%%The whole create trigger statement should be complete statement but not many separate com...

   MySQL,Trigger,Dilimiter,phpMyAdmin     2011-04-20 15:35:30

  Android Tutorial: Creating and Using an SD Card in the Emulator

In a previous post, I mentioned how user-friendly Android is for developers. There’s extensive documentation and information on the architecture, the different components and best practices. However, the documentation has a few blind spots. Many of the tools have little documentation and no usage examples. The information is there, it’s just hidden behind a few layers of Android theory.So I’m going to try and document a few of the basic things that you’ll probabl...

   Android,Emulator,SDCard,Load,Create     2011-04-13 12:08:41

  Java is not the new COBOL

If you Google “Java is the new COBOL” you’ll find a glut of articles proliferating this mantra. I don’t know its origins, however I’m inclined to think it’s mostly repeated (and believed) by the Ruby community. Ruby, from a developer’s perspective is a low-friction language. A developer can just sit down at a text editor and start banging out code without really thinking about such superflous things as types. Java on the other hand, well, you h...

   Java,Ruby,Type,COBOL,Comparison     2011-11-10 10:40:56

  Online Branding Tips for Small Businesses

Although an aspect ignored by many people who venture into the business sector, building a brand with a strong online presence may be one of the small details which can improve your performance significantly in the long run. Having said that, in this article, we’ll explore a few different online marketing and branding strategies and tips to help you build a stronger brand online.        #1 Build an identity When people hear about the name of your business, the...

   BRANDING,SOCIAL BUSINESS     2019-05-16 07:38:25

  Why should we drop or reduce use of MD5?

MD5 is a frequently used one-way hash algorithm, it is commonly used in following situations: Check data integrity. We take hash of the data stored in two different places and compare them. If the hash results are the same, then there is no need to check the actual data. This utilizes the collision-resistant feature. Two different data block will have little chance that their hash values will be the same. Many data service providers use such technique to check repeated data to avoild repeating...

   MD5,Vulnerability,attack     2012-09-29 04:47:49

  It’s Not Too Late to Learn How to Code

Coding is sort of like a superpower; with it you can create things that millions of people see. You can change the way people behave, the way they think, and the way they interact with others. This is beyond awesome, but I’ve also met a lot of people that think that this ability is inaccessible to them. I’ve met a lot of “non-technical” people who seem to think that this superpower is only bestowed on those fortunate enough to have it come easily to them at a very early...

   Tips,Coding,Preparation,Interest     2011-10-17 11:26:38

  Find the kth smallest number in an array

This is an classical question, the general solution to this question is first using sorting algorithm to sort the array, then get the kth number in the array, the complexity is O(nlogn), we can also use selective sort or head sort to, the complexity of selective sort is O(kn) and heap sort is O(nlogk). The better solution is to use quick sort to find the kth smallest number, the complexity is O(n), the worst case cost is O(n^2). But today we introduce one more solution which has the worst case c...

   Sort, Quick sort, Search,Smallest     2013-01-09 06:20:54