SEARCH KEYWORD -- Process
Ruby is beautiful (but I’m moving to Python)
The Ruby language is beautiful. And I think it deserves to break free from the Web. I think the future of Ruby is firmly stuck in Web development, though, so I’m going to invest in a new language for data analysis, at least for now. This is a look at the fantastic language I came to from Java and a look at a possible candidate. (Update: I’ve since written a followup.)Java to RubySix years ago, I added Ruby to my technical arsenal. I learned C++ and Java in high school, and I p...
Ruby,Java,Python,Comparison,Advantage,Ruby vs Python 2011-11-01 07:18:11
Create successful Python projects
The ecosystem for open source Python projects is both rich and diverse. This enables you to stand on the shoulders of giants in the production of your next open source project. In addition, it means that there's a set of community norms and best practices. By adhering to these conventions and applying the practices in your project, you may gain wider adoption for your software. This article covers practi...
Python,Project,Open Source,Team Management 2012-02-03 08:09:27
Why I love everything you hate about Java
If you’re one of those hipster programmers who loves Clojure, Ruby, Scala, Erlang, or whatever, you probably deeply loathe Java and all of its giant configuration files and bloated APIs of AbstractFactoryFactoryInterfaces. I used to hate all that stuff too. But you know what? After working for all these months on these huge pieces of Twitter infrastructure I’ve started to love the AbstractFactoryFactories. Let me explain why. Consider this little Scala program. It uses â€...
Java,Comparison,Modularity,API 2011-11-29 08:48:15
Java development company briefs about Lazy and Eager fetch in JPA/Hibernate
Normal
0
false
false
false
EN-IN
X-NONE
X-NONE
JAVA,JAVA DEVELOPMENT COMPANY,LAZY FETCH,EAGER FETCH,JPA,HIBERNET 2016-07-08 06:08:28
Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java
Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...
JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION 2023-04-28 21:22:10
Don't. Waste. Time.
Stuff we startups do that doesn't delight users:Office spaceLaunch partiesHealth insurance plansSalary negotiationsFounder equity splitsSeries F stockOffice Food Team-building activitiesCRM systemsBookkeepingHead countWorking in SOMAConvertible debt capsValuationsTechCrunchKarma scoresISOsPowerpointBusiness CardsBanksLawyersDesks1099sBug TrackersAgile ProcessesAdvisory BoardsHiringCap TablesPayrollMeetupsMeetingsOf course, much of this stuff still needs to get done. At some point.&nbs...
Time management,Work,Startup,How to 2011-11-21 09:55:06
I am a programmer
Admitting that may be career suicide, or possibly it will cost me dearly because 'software engineers' are raking in the big bucks these days, but the fact of the matter is that I'm a programmer. It's what I do best and it is the job title that I associate with most because it feels as though the biggest chunk of me will always be most likely to blurt that out when people ask me what my job is. That I like to program definitely helps.So instead of choosing some fancy title for what it is that I d...
Programmer,Skill,Future,Requirements,Software engineer 2011-11-01 07:08:11
Touching and Gesturing on iPhone, Android, and More
One of the most important parts of creating an effective and intuitive user interface on touch-enabled smartphones has nothing to do with visual appearance—instead, it has to do with creating an interface that properly responds to user input based on touch. For Web applications, this means replacing mouse events with touch events. In Dojo 1.7, new touch APIs help make this process easy. This is an updated version of the post Touching and Gesturing on the iPhone, published in 2008. I...
How Query Optimizer Works in RDBMS
In a previous post, we discussed how the various relational operators are implemented in relational database systems. If you have read that post, you probably still remember that there are a few alternative implementations for every operator. Thus, how should RDBMS determine which algorithm (or implementation) to use? Obviously, to optimize the performance for any query, RDBMS has to select the correct the algorithm based on the query. It would not be desirable to always use the same algori...
DATABASE,DATABASE DESIGN,DATABASE OPTIMIZATION 2019-04-20 07:26:32
Taking C Seriously
Dennis Ritchie, a co-creator of Unix and C, passed away a few weeks ago, and was honored with many online tributes this weekend for a Dennis Ritchie Day advocated by Tim O’Reilly.It should hardly be necessary to state the importance of Ritchie’s work. C is the #2 language in use today according to the TIOBE rankings (which, while criticized in some quarters, are at least the best system we currently have for gauging such things). In fact, TIOBE’s pre...
C,Efficiency,Memorization,Dennis Ritchie 2011-11-03 13:42:14
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>