Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Index search



  Fuzzy search algorithm in Sublime Text

Fuzzy string searching is the technique of finding strings that match a pattern approximately (rather than exactly. In many editors, we can easily find the Find menu item to do exact matching. While in Sublime Text and some other editors, we can use fuzzy string searching as well if we just want to have an approximate match. There is some algorithm implemented in Sublime Text to implement achieve this. First the search query is split into characters, join them with a regex wildcard, and then run...

   Sublime Text,Fuzzy search     2013-10-14 22:49:38

  Unicode over 60 percent of the web

Computers store every piece of text using a “character encoding,” which gives a number to each character. For example, the byte 61 stands for ‘a’ and 62 stands for ‘b’ in the ASCII encoding, which was launched in 1963. Before the web, computer systems were siloed, and there were hundreds of different encodings. Depending on the encoding, C1 could mean any of ¡, Ё, Ä„, Ħ, ‘, ”, or parts of thousands of characters, from æ to å...

   Unicode,Encoding,Website,Percentage,Statustic     2012-02-07 06:19:34

  9 fields platform companies need to fight for

If you are person reading technology news much, you will find a large part of the tech news are about a few companies : Apple, Google, Facebook, Amazon and Microsoft, in which the first four are today's "Big Four (platform)" as said by Google Chairman Eric Schmidt. These giants have both competition and cooperation in many areas, and each has its own place in the world, with Schmidt's words, Google dominates search, Apple designs device, Amazon occupies e-commerce and Facebook leads social. Alth...

   Big four, Future,Software and hardware     2012-10-20 09:50:43

  Google will not hold press release in China next week

There is an invitation form spreading around the Chinese internet community which states that Google will hold press release at 1 PM on December 18 (Beijing time). On this press release, Google will announce its return to China and Google China CEO Jony will explain its strategies in China after return. But soon Google China public relation representative said this was a rumor. There is no plan for Google to hold press release next week in China. And there are some apparent suspicious parts ape...

   GOOGLE,CHINA,NEWS,RUMOR     2015-12-13 07:05:39

  Why accessing Java HashMap may cause infinite loop in concurrent environment

HashMap in Java is frequently used to handle key/value pairs. But it is not a good candidate to be used in concurrent environment where ConcurrentHashMap should be used instead. If used in concurrent environment, it may cause lots of unexpected behavior even including make the program getting into an infinite loop situation. To understand how this can happen, let's first discuss how HaspMap works internally. In this post we will use implementation of HashMap before Java 8 as example, Java 8 prov...

   JAVA,HASHMAP,INFINITE LOOP     2020-03-29 01:47:00

  Understanding an interesting JavaScript map function question

With the evolvement of JavaScript, lots of new features have been added this old but robust language.  Among them are lots of functional programming language related functions like map, filter, each etc. In this post, we will cover one function map and its interesting behavior. Before dive into the details, let first take an example, do you know the output of below function call? ['1', '7', '11'].map(parseInt) You may think that it's easy and the output would be [1, 7, 11] Can you try to ru...

   JAVASCRIPT,MAP,FUNCTIONAL PROGRAMMING     2019-06-14 08:34:46

  Easy Ways To Make Sure Your Website Is Ready For Mobile First Users

Websites are no longer a novelty or a useful complement to a brick and mortar store. They are an essential part of everyday life. The average American is spending up to ten hours every day online.   Businesses exist solely online, entrepreneurs with great ideas can start up online with very little help and even the most casual of users know what looks good. Consumers aren’t likely to forgive mistakes. If your website isn’t completely user-friendly, they know they ...

   SEO,MOBILE SEO,MOBILE DEVELOPMENT,MOBILE USABILITY     2018-09-17 03:57:15

  Check out Google Reader substitutes

It's only a few hours left that Google Reader will be shut down Since Google decides to decommission such a good product, many people are disappointed about Google. The gene of Google is completely different from Facebook, The strategy of promoting Google+ everywhere is becoming a bit offensive. As a heavy user of Google Reader, people have to start looking for an alternative, Below we give a comparison of different Google Reader substitutes. And we compare them with following parameters: Lload...

   RSS reader,Google Reader,Feedly     2013-06-30 08:46:42

  Manipulating JavaScript Arrays

Our first tutorial on JavaScript arrays covered the basics: creating arrays, accessing the contents of arrays, array lengths, and looping through arrays. In this tutorial, you explore arrays in more depth, and learn how to use various methods of the Array object to manipulate arrays. Extracting sections of an array with slice() You're not limited to accessing single array elements at a time. Thanks to the slice() method, you can grab a whole section of an array at once. slice() has the follow...

   JavaScript,Array,Manipulate,Join,Splice     2011-08-07 01:56:06

  Severe SSL 3.0 vulnerability to be released

According to The Register, another severe security vulnerability has been found in the widely used SSL v3 protocol. Until now, it's still in patch phase and the details of this vulnerability is expected to be released today. There are a few widely impacted security vulnerabilities revealed this year and they bring people's attention to the long existing security concerns. Previously, we have seen the HeartBleed issue and also the recently ShellShock issue. Both of them occur in popular libraries...

   SSL,Security vulnerability, The Register     2014-10-14 22:22:39