Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Real time



  Google.com is considered as partially dangerous by Google

Google has a service called Transparency Report which is to examine billions of URLs per day to identify dangerous pages which may trigger downloading of malicious software.  When you search a site, it will give the status of the site and also the safety details of the site if there are potential dangerous pages on the site.  These details will help the site owners to identify the potential issues and fix them as early as possible, Embarrassingly when searching for Google.com, it is c...

   GOOGLE,GOOGLE.COM     2016-04-20 00:38:15

  Bytes Matter

I love to profile applications, because I always learn something that surprises me. Initial Profiler Surprise: Client Side Case in point, I was recently profiling our Android application, the Famigo Sandbox. This app sends a lot of data back and forth with our API, as we try to determine which of the apps on your phone are safe for your kids. I always assumed that, if app performance suffered during some of the ...

   Byte,Low level,Operation,Importance     2012-02-28 08:07:22

  Telecom elements in WeChat

As an engineer who spends much time on focusing on WeChat like applications(Skype, Fring, Viber, Kik Messenger, WhatsApp, Talkbox, LINE, Kakao Talk) , I would like to share with you the telecom element in WeChat to show the inheritance and integration of traditional telecom services in the Internet service and applications.First, WeChat is an application to send messages, the fully IP-based messaging capabilities may replace the traditional telecom services such as SMS, MMS and VMS ,This is ver...

   WeChat,Telecom operator     2013-04-13 20:29:46

  Leaving comments in real life

As a programmer I like to write comments because I know that some future person (often me) is going to need to know something about my code that won't be immediately obvious from reading it. Here's a recent example from my homebrew display's code:// protocol_init: Set up a newly powered-on string of lights.  The lights are arranged// in an array wired diagonally starting from the bottom left.  For ease of programming// it's better if they are given numbers which correspond to coor...

   Comment,Programming,Style,Format,Coding standard     2011-11-15 11:42:19

  When will Google be back to China?

There will be news about Google returning back to China every now and then since the search giant left China in 2010. Every sign of change about Google in China will give people big hope on its return. But Chinese are still waiting for the dream to become true though nothing real happen until now. On Thursday, it seems there is "proof" again that Google is going back to China. In the morning, many Chinese noticed that the official Google China weibo(China's Twitter) account uploaded a photo with...

   GOOGLE,CHINA,SEARCH ENGINE,BAIDU     2017-03-02 09:39:51

  The "C is Efficient" Language Fallacy

I came across an article yesterday about programming languages, which hit on one of my major peeves, so I can't resist responding. The article is at greythumb.org, and it's called Programmer's rant: what should and should not be added to C/C++. It's a variation on the extremely common belief that C and C++ are the best languages to use when you need code to run fast. They're not. They're good at things that need to get very close to the hardware - not in the efficiency sense, but in the...

   C,GCC,Fallacy,Evolvement     2012-01-09 08:54:46

  Building Security onto Your Mobile Application

Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...

   Web Application Development Company, iPhone App Development Company     2015-08-21 07:22:32

  How NOT to teach a computer language

For the past year or so my wife has been taking online classes to get a computer science degree. For most of her classes she’s done great, she’s been flying through HTML and SQL, even up to the point where she can handle multilevel joins and optimizing through indexes. That was until she hit her vb.net class. I had no idea why she was having problems with a language has easy as vb.net so I started helping her out and find out why she was having so many problems. I’ve also ad...

   Programming,Teach,Book,Grade,Method,Computer     2011-11-06 14:52:13

  Building a Modern Web Stack for the Real-time Web

The web is evolving. After a few years of iteration the WebSockets spec is finally here (RFC 6455), and as of late 2011 both Chrome and Firefox are SPDY capable. These additions are much more than just "enhancing AJAX", as we now have true real-time communication in the browser: stream multiplexing, flow control, framing, and significant latency and performance improvements. Now, we just need to drag our "back office" - our web frontends, app servers, and everything in between into this cen...

   Web design,Real-time web,web stack     2012-02-15 05:54:41

  9 quotes that stayed with me as a developer

I find quotes inspiring, motivating or sometimes just thought provoking, so here's some of my favourites from over the years. Sometimes reading a book can have a real influence on how you write code, or how you approach a problem. Sometimes a simple quote  is enough to make me question the way I look at the code I'm writing. Or often I sit in awe about someone's so well distilled what I've known internally for ages but have never been able to enunciate.   "Design is finding t...

   Quote,programmer,programming     2011-05-27 03:34:49