SEARCH KEYWORD -- Random generation
5 Modern Strategies to Improve Your Hiring Process
Without even a pinch of doubt, the labor market across the globe has turned highly competitive. So, there goes a rat race where the best recruiters vie to hire the most potential candidates. Let's say you need to hire Java developers. Certainly, your hiring challenge would be to find applicants with niche skills. Sadly enough, the traditional hiring methods are detrimental to getting the creme of the talent pool. It's time-consuming and involves a lot of manual and paperwork, wherein there are c...
HIRE,JAVA,DEVELOPERS 2017-06-28 00:15:48
File System vs Core Data: the image cache test
Code for this project is on GitHub While doing a full re-write of Droplr's iOS app for the 2.0 launch, I couldn't find any good file/image caches out there had a particular feature I really wanted: extending item expiration whenever it's touched. I set out to write my own — which wasn't that much of a challenge — but somewhere along the process I had this crazy idea that perhaps (SQLite-backed) Core Data would be a much better tool for the job: No mismatch between cache index ...
File system.Image cache,Multimedia 2012-02-01 08:52:02
A turing machine in 133 bytes of javascript
Multiply turing machine The fact it took me 20 lines of javascript to implement a nondeterministic turing machine simulatorlast week kept me up at night. All weekend. Too much code for something so simple and I kept having this gut feeling implementing a basic version shouldn’t take more than 140 bytes. Sunday afternoon I sat down for about an ...
Turing machine,JavaScript,Simple code 2011-11-28 09:27:28
Java Cipher encryption/decryption example
In Java, Cipher is the API for doing data encryption/decryption. Many cryptographic algorithms such as AES, DES, RC4 etc can be specified when creating Cipher instance. The Cipher instance calls the underlying algorithm specific implementation to do the actual encryption/decryption. Before doing the encryption/decryption, a key needs to be created and it will be used to do the encryption/decryption. A sample program for performing all these is : import java.security.Key; import javax.cryp...
Java, Java Security, Cipher, Example, Sample 2015-08-14 07:07:10
About short URL and its implementation
IntroductionURL shortening is a kind of technique to convert a long URL to a short URL. There are many companies now providing this kind of service, we now take Google's URL shortener service http://goo.gl/ as an example.First we navigate to http://goo.gl/, then we enter a random URL into the text field, here we use http://www.url-to-be-shortened.com as the input, it will return us an shortened URL : http://goo.gl/ZSVMM. URL ParsingWhen we type http://goo.gl/ZSVMM in browser address bar, the DNS...
Redis Cluster and Common Partition Techniques in Distributed Cache
In this post, I will discuss a few common partition techniques in distributed cache. Especially, I will elaborate on my understanding on the use of Redis Cluster. Please understand that at the time of writing, the latest version of Redis is 4.0.10. Many articles on the same topic have a different idea from this post. This is mainly because, those articles are probably outdated. In particular, they may refer to the Redis Cluster implementation in Redis 3. Redis Cluster has been improved...
REDIS,DISTRIBUTED CACHE,CLOUD COMPUTING 2019-01-17 08:10:37
The Book That Every Programmer Should Read
No, it’s not Knuth’s “The Art of Programmingâ€. I’m talking about quite an easy-to-read (compared to TAoP) book, which, in fact, does not require any engineering or mathematical background from the reader.I am talking about C. Petzold’s “CODEâ€. It is a truly remarkable book about how computers work. Let me explain why I think this book is so awesome.The book starts from the very beginning, from explaining what code is, bringi...
Programmer,Book,Must read,CODE,C. Petzold 2011-10-31 10:43:58
The biggest iOS 5 bug you've never heard of
There is a huge bug when Group Messaging is disabled in iOS 5. I'm shocked Apple hasn't fixed this yet. Today a friend sent out a text message blast, announcing they got a new phone number. Shortly after, I got text messages from three random people I don't know. I was confused how these people got my number, but then I realized they were replies intended for my friend who sent out the text blast. If you've ever used the Group Messaging feature,...
iOS5,Bug,Group Messaging 2011-12-10 06:04:39
Why do people hate Windows?
Windows brought us into PC era, it becomes the most widely used OS in the past 20 or so years. But unfortunately there are still many people hate Windows. Is it because we may encounter the notorious blue screen issue now and then? People hate Microsoft Windows for the same reason they hate Comcast, United Airlines, or Paypal.Once Microsoft gained a dominant market position, it completely and utterly took its customers for granted. It became arrogant and complacent, causing customers to fe...
Silicon Valley won’t dominate the tech world forever
Yesterday I published a piece about Newry in Northern Ireland, which is looking to help boost its economy by encouraging a startup ecosystem. A little later, a post entitled ‘You will not be the next Silicon Valley, please stop trying‘ appeared over on Pando Daily, in which the author decided pull a bunch of Irish stereotypes out of the bag to attack the idea. Now, I could detail everything that’s wrong with the article, but the comments there do a perfect job of rippi...
Silicon Valley,Domination,Technology,Startup,Trend 2012-02-13 05:21:57
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>