Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Record



  Removing duplicates in sql

In modern web development, it’s standard practice to make use of a database abstraction layer, typically an Object-Relational Mapper based on either the Active Record pattern or the Data Mapper pattern. There are several pros and cons to this which are fairly well established, so I’ll spare us all from enumerating them all right now. One established pro worth mentioning is that these systems typically provide a high level interface for fetching data, often removing the need to ...

   SQL,Duplicate,Remove,Web design     2012-01-05 08:20:13

  Is 99.8% Secure Secure?

A group of researchers (Arjen Lenstra and collaborators  from EPFL Lausanne and James Hughes from Palo Alto) published a study, Ron was wrong Whit is right, of new vulnerabilities of cryptosystems. The New York Times picked up the story. Although Lenstra et al discuss several cryptosystems, their results are particularly relevant to those based on RSA. The title mirrors their conviction that cryptosystems based on a single random element have fewe...

   Security,Percentage,Security index     2012-02-27 04:48:06

  Google launches Google Keep

According to Tencent Tech, Google announced the launch of Google Keep on Wednesday This is a note application similar to Evernote, its philosophy is to help you save everything you want to remember, including text and images and other notes, they can be instantly synchronized among different devices so that users can get the information they want at any time. This is a free service, it provides support for Web and Android 4.0 or later devices, users can navigate to Drive.Google.com/Keep or downl...

   Google Keep,Evernote,Synchronization     2013-03-21 13:00:02

  Database Testing – Practical Tips and Insight on How to Test Database

Database is one of the inevitable parts of a software application these days. It does not matter at all whether it is web or desktop, client server or peer to peer, enterprise or individual business, database is working at backend. Similarly, whether it is healthcare of finance, leasing or retail, mailing application or controlling spaceship, behind the scene a database is always in action. Moreover, as the complexity of application increases the need of stronger and secure database emerge...

   Database,Tips,Practice     2011-06-29 08:47:40

  JavaScript's New Features: Exploring the Latest Additions to the Language

As the web continues to evolve, so too does the JavaScript ecosystem. With the release of ECMAScript 2023 (ES2023), JavaScript developers can now leverage a range of new features that promise to improve code quality, readability, and maintainability. In this blog post, we'll dive into some of ES2023's most exciting additions and provide practical examples of how they can be used in your projects. 1. Private Fields and Methods in Classes One of the most anticipated features in ES2023 is the intro...

   JAVASCRIPT,ES2023     2023-04-16 01:41:58

  What's on your Learning List?

How do you track and decide what topics you want to spend time learning? For a while, I didn’t have a real good solution. Something would trigger me to remember “Oh yeah! I really wanted to learn more about that”. I would spend the evening doing busy learning - it seemed like I was learning but I really wasn’t. Instead of trying to do Deliberate Practice, I’d fool myself into thinking I was investing my time wisely by reading blog posts and examples but no...

   Learning list,Conscious,Study,Programming     2011-12-05 12:44:39

  How key-based cache expiration works

There are only two hard things in Computer Science: cache invalidation and naming things — Phil Karlton Doing cache invalidation by hand is an incredibly frustrating and error-prone process. You’re very likely to forget a spot and let stale data get served. That’s enough to turn most people off russian-doll caching structures, like the one we’re using for Basecamp Next. Thankfully there’s a better way. A much better way. It’s called key-based cac...

   Cache,Expiration,Key-base cache,Work     2012-02-20 05:32:40

  How many programmers does it take to screw in a lightbulb?

There seem to be a lot of “How many programmers does it take to screw in a lightbulb?” jokes floating around the Internet, but none aimed specifically for us SQA folk.  I have decided (perhaps mistakenly) that this is no longer acceptable.  If this decision is a mistake, I'm sure that someone else in QA will report it up as a bug and assign it to me.  For better or worse, there is now an SQA set of these jokes, thanks to me.  Now, without further ado, let the pun...

       2016-05-08 12:43:34

  How Computers Boot Up

The previous post described motherboards and the memory map in Intel computers to set the scene for the initial phases of boot. Booting is an involved, hacky, multi-stage affair – fun stuff. Here’s an outline of the process: An outline of the boot sequence Things start rolling when you press the power button on the computer (no! do tell!). Once the motherboard is powered up it initializes its own firmware – the chipset and other tidbits – and tries to ...

   Computer,Boot-up,Rationale     2012-04-11 13:43:02

  Samsung Overtakes Apple as World’s Biggest Smartphone Seller

Oct. 28 (Bloomberg) -- Samsung Electronics Co. overtook Apple Inc. in the last quarter to become the world’s largest smartphone vendor amid a widening technology and legal battle between the two companies.Samsung shipped 27.8 million smartphones in the last quarter, taking 23.8 percent of the market, Milton Keynes, U.K.- based Strategy Analytics said in an e-mailed statement today. Apple’s 17.1 million shipments, comprising 14.6 percent of the market, pushed the Cupertino, Californ...

   Samsung,Apple,Samrtphone,Overtake,Samsung No. 1     2011-10-28 10:18:12