Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Pattern match



  Live in Beijing and Thinking about Starting a Tech Company? Read. This. Post. Now.

The Disrupt Beijing Hackathon starts in a little more than 24 hours, and we’ve been working hard over the last few days to make it even more of a no-brainer for local Beijing developers to attend.In addition to the chance to be the next GroupMeor win valuable prizes, we have decided to give all Hackathon attendees who complete a hack and present in the 24-hour period free tickets to the Disrupt conference Monday and Tuesday. That’s a $1,000-plus value for s...

   Startup,Beijing,TechCrunch,Disrupt,2011     2011-10-28 12:41:43

  How Google Utilizes Big Data for SERP

Google is an expert when it comes to big data. This is evident in their development of various techniques and open source tools which are used by the big data industry professionals. These tools and technique allow Google to sift through millions of different websites and enormous amounts of data in order to provide users with correct answers in a matter of milliseconds. But how does Google accomplish that with such precision? To answer that, we need to focus on the complex activities that go o...

   GOOGLE,BIG DATA     2017-05-31 16:13:03

  Optimization Tricks used by the Lockless Memory Allocator

With the releasing of the Lockless Memory Allocator under the GPL version 3.0 license, we can now discuss more of the optimization tricks used inside it. Many of these are things you wouldn't want to use in normal code. However, when speed is the ultimate goal, sometimes we need to break a few rules and use code that is a little sneaky.The SlabA slab is a well-known technique for allocating fixed size objects. For a given object size, a chunk of memory is divided up into smaller regions of that ...

   Optimization,Memory allocation     2011-11-16 08:02:16

  What Level Programmer Are You?

Everybody's talking about how programming is the skill that we all are going to need. [Except those folks who might feel that most programming could be turned into wizard-like tools. Insert long discussion about Strong AI.] But what's a programmer? Is the guy who set up his own Apache Web Server a programmer? How about the guy who created a complex Excel spreadsheet? The guy who made his own RPG level? Minecraft players? When we say "Everybody is going to have to know programming" what, e...

   Programmer,Skill,Level,Criteria     2012-02-08 10:07:41

  Kubernetes Authentication & Authorization 101

If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αὐθεντικÏŒς authentikos, “real, genuine”, from αὐθέντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...

   RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES     2021-06-05 23:19:18

  Five Reasons Why Microsoft's Windows Phone Will Make A Big Splash In The Smartphone Market

The rave reviews for the latest iteration of Microsoft’s Windows Phone aren’t the only reason Microsoft will do better in the smart phone industry than it did in the MP3 player market. Whereas the Zune never really offered anything substantially different from the iPod and never pushed any real boundaries, Microsoft’s latest push into the mobile operating system business is much more bold. Microsoft isn’t rushing it this time – and it shows. So far, tech ...

   WP7,Windows Phone,Zune,2012,Nokia Lumia 900     2012-01-09 08:52:52

  Transparency in Cloud Services

37signals recently launched public “Uptime Reports” for their applications (announcement). The reaction on Hacker News was rather tepid, but I think it’s a positive development, and I applaud 37signals for stepping forward. Reliability of cloud applications is a real concern, and there’s not nearly enough hard data out there. Not all products are equally reliable; even within 37signals, the new reports show a 3:1 variation in downtime across apps. That said, ...

   Cloud,Transapency,37signals,Announcement     2012-01-10 07:24:02

  The Failure of Passive Recruiting: Recruiters

This is an actual conversation I had with a recruiter:Phone rings and I pick it upHim: Hi, is Paul there?Aaron: May I ask who is calling?Him: I have a technical question. Aaron: Ok, what is it?Him: Are you technical?Aaron: Yes. Who is this?Him: Who are you?Aaron: Are you a recruiter?Him: Yes and…Aaron: Great, send us your resumes, if we like what you send over, we’ll let you know if we want to meet with the candidates, other tha...

   Recruiter,HR,Recruitment,Failure,Hire     2011-10-26 06:59:33

  Obviously Correct

What do automatic memory management, static types and purity have in common? They are methods which take advantage of the fact that we can make programs obviously correct (for some partial definition of correctness) upon visual inspection. Code using automatic memory management is obviously correct for a class of memory bugs. Code using static types is obviously correct for a class of type bugs. Code using purity (no mutable references or side effects) isobviously c...

   Memory management,Code,Static,Purity     2011-11-07 08:13:05

  Paradigms of Iteration in JavaScript

One of the joys of programming is that no matter how simple a problem may seem there are always tons of ways to solve it. It can be good practice to go back and revisit fundamentals by solving simple problems with as many implementations as you can think of. In this post we'll explore approaches to basic iteration in JavaScript. This style of exercise is a good interviewing technique, too, because it's open ended and leads to good discussions. The focus isn't a tricky, wacky problem you're...

   JavaScript,Iteration,Wrap,Recursive,For,Loop     2012-01-08 10:11:15