Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Real time



  Hologres vs AWS Redshift

Hologres and Redshift are both data warehousing solutions, but they have some differences in terms of features, architecture, and target use cases. Underlying Infrastructure Hologres: Built on Alibaba Cloud's Apsara distributed computing platform, Hologres leverages the underlying infrastructure for storage, computation, and management. It benefits from Alibaba's expertise in cloud-native architecture and real-time data processing. Redshift: Amazon Redshift is based on a Massively Parallel Pro...

   HOLOGRES,REDSHIFT,ALIBABA,AWS,BIG DATA,REAL-TIME     2024-03-23 01:36:41

  First Chinese app on Google Glass : PM25.in

PM25.in is an open source PM2.5 project developed by BestApp. It retrieves PM2.5 data of different cities in China through a crawler and then processes the data retrieved. They also created an API which enables third parties to access these data. Now the team has built something new, they moved this project to Google Glass and developed the world's first Chinese Google Glass application -- PM25.in. Now users with Google Glass can check PM2.5 of different cities in China. The final effect on Goog...

   Google Glass,China,PM25.in,BestApp     2013-06-23 10:17:40

  Chrome’s WebRTC roadmap

Last January, Chrome was the first major browser to preview WebRTC, HTML5's new real time audio and video stack. Since then, we've been hard at work keeping up with the evolving specification, fixing bugs and listening to the web community’s feedback. The main parts of the WebRTC specification are now stable and are coming soon to all 200M+ Chrome users. With this blog post, we want to help developers plan for what will be introduced in this first stable release later this year. ...

   WebRTC,Google,Open source,Roadmap     2012-04-12 10:27:51

  What’s the waiter doing with the computer screen?

When Richard Gatarski and a few friends wanted to dine in the Swedish city of Norrköping a few weeks ago, they booked a table at a downtown Italian restaurant that seemed nice. When they arrived, they were greeted by the headwaiter, who asked if they had a reservation. Richard confirmed, and the headwaiter looked at his computer screen. ”Gatarski? Hm, let’s see .. yes, there’s your reservation. Welcome!” The headwaiter then picked up what Richard first thought m...

   Waiter,Computer screen,Touch     2012-03-12 11:07:01

  Perl Documentation in Terms of Tasks

The core Perl community—if you care to draw lines around a group of people who use Perl seriously and call that a community—is like many other core F/OSS communities. Real work happens on mailing lists and IRC. I unsubscribed from several mailing lists and deliberately spent as little time on IRC as possible this year, for various uninteresting reasons. (I haven't even made it to the Portland Perl Monger...

   Perl,Documentation,Process     2011-12-27 09:40:09

  Google search engine algorithm change history

Recently, Google had a major adjustment on its search algorithm: Users can directly see answers to the searched question on the top of the page.There are billion of search requests each day on Google. There is no doubt that the algorithm will become the subject of discussion. Last year, Google did an adjustment to its search algorithm every 17.5 hours in average. We all experience the change of the algorithm. Following information chart summarizes the major changes of Google search algorit...

   Google,Search engine,History,Google+     2012-04-07 12:41:10

  Hacking Vs. Programming

What is the difference between Hacking and programming? One opinion I have heard expressed is that a hacker can put a lot of code together in a hurry but if a change is needed the code has to be completely rewritten. A programmer may take a little longer but if changes are needed they are more quickly and easily installed without the need for a complete rewrite. One source I heard attributed an observation like this to Maggie Johnson of Google. It rings true to me though. Hacking is usual...

   Hacking,Programming,Coding style     2012-04-23 06:09:24

  JavaScript Is Not A Language

Recently people presented arguments for and against using CoffeeScript. I felt the argument against was pointless and obviously wrong, but I couldn't figure out why, and I thought the counterargument for was kind of toothless and irrelevant. I've figured out the real issue.The real argument for CoffeeScript is that JavaScript is not really a language.Years ago I read something which explained, in my opinion, why Lisp has never achieved the mainstream adoption its passionate advocates belie...

   JavaScript,Not a language,CoffeeScript,Model     2011-12-29 08:46:15

  Penrose Tiling in Obfuscated Python

Here’s a Python script which renders some Penrose tiling. Yes, this is valid Python code: _ =\ """if! 1:"e,V=100 0,(0j-1)**-.2; v,S=.5/ V.real, [(0,0,4 *e,4*e* V)];w=1 -v"def! E(T,A, B,C):P ,Q,R=B*w+ A*v,B*w+C ...

   Python,Disorder,Code,Writing,Style     2011-09-14 11:57:34

  Call of Duty Elite Has Amazing Security

I had tried to register for Elite yesterday, and the servers were being funny, so I wasn't sure if I'd registered. I just now tried to reset my password, and I got the following:Hello JoshForgot your password? These things happen. Access your account with the password below:{Actual Unencrypted Password}Really? They're storing hundreds of thousands of passwords in plain text??EDIT: Not sure what the downvotes are for, surely it's not because huge companies like Steam and Sony never get hacked, an...

   Game,Elite,Call of duty,Defect     2011-11-15 12:42:50