Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Record



  How small should a function be?

"The well-designed functions are often relatively small, large function design is often a mess or there is a lot of room for optimization."Maybe you think there is no need to discuss the size of functions, because the nature of the function design is cohesive, its size is only its manifestations. But it is necessary to discuss about the size of function because the statement above .First let's understand the concept of minimum code processing unit : a basic operation (assignment, comparison, etc...

   Function size,Optimization     2012-12-18 13:58:07

  How To Make The Most of Your Least Productive Time

Everybody talks about mastering the art of staying productive. Not many people willingly accept that such efforts are futile. It’s impossible to stay productive 100% of the time, and this will never change. Something that I believe to be just as important, if not more so, is what we make of our least productive time. We all have the capacity to be extremely productive for some part of the day. Even the world’s grandest underachievers. But I believe that to be successful runni...

   Productive time,Limit time,Effort     2012-02-06 07:49:47

  Use of log in programming

Usually, The purposes of log are for troubleshooting and displaying program running status. Good log will help us locate the error easier. Many programmers think log in programs is very simple, but it's not an easy task to write log codes to efficiently locate the error. Here we discuss about program log in three aspects: Where to log What to log Log styles to be avoided Where to log 1. When calling external functions When your program is calling some external functions which are not written b...

   Log, Programming,Debug     2012-11-28 11:42:23

  Guide on recovering data in MySQL

In our daily work, there might be mistakes made which got some data or even databases deleted in MySQL. If this happens on production, it would be a nightmare. In case this happens, normally DBA would jump in to save the world. And they would try to recover the data from the backup if there is any. But if there is no backup, then the show stops. Hence database backup is necessary on production environments to avoid such awkward situation. Also normally in MySQL, binlog should be enabled as well ...

   MYSQL,DATABASE,BACKUP,BINLOG,EXAMPLE     2020-08-26 07:50:30

  Inside Google's recruiting machine

FORTUNE -- In the hot war for talent being fought in Silicon Valley, no company has an arsenal quite like Google's. Named Fortune's Best Company to Work For in 2012, the search giant made a record 8,067 hires last year -- boosting total headcount by a third. The thirteen-year-old firm's recruiting has an almost mythical quality about it, particularly for the two million candidates applying to work there each year. In terms of elite American institutions, getting a job at Google ranks with b...

   Google,Recruiter,Contract,Recruit machine     2012-02-25 04:50:01

  Inspiration vs. Imitation

Every now and then I get a really lovely email from an aspiring letterer that is about to publish a passion project of his or her own. They tell me my work was an inspiration and that they can’t wait to share their creation with the world. I feel all warm and fuzzy inside for a moment…until I click on their link and realize that much of what they intend to publish is nearly a direct tracing of my work. A lot of established illustrators and designers deal with the same ...

   Designer,Copy,Divisify,Classification,Judgement,History     2011-12-05 12:26:38

  The Death Of The Spec

Earlier today, my colleague Matt Burns wrote a post noting that most tablet makers may be largely failing because they’ve sold their soul to Android and are now just in the middle of a spec war, which no one can win. I’m gonna go one step further in that line of thinking: the spec is dead.There have been a few key stories from the past couple of weeks that highlight this new reality. Barnes & Noble unveiled the new Nook Tablet. Consumer Reports looked at the...

   Specification,Android,Platform,Software design     2011-11-15 08:20:22

  3 Most Popular Ways Hackers Steal Your Phone Data – Stay Safe

Our mobile devices store personal information, including passwords, usernames, birthdates, financial information, social security numbers, PIN, etc. Hence, this makes hacking a mobile phone an attractive option for hackers and scammers. There are various techniques that hackers use to spy on a mobile phone for personal information. Also, stalkers can make use of spy apps and malicious software to spy on unsuspecting people. Mobile phones are not secure because these devices connect to other net...

   TECH     2019-11-29 00:29:40

  The Greatest Hacks of All Time

Reader's advisory: Wired News has been unable to confirm some sources for a number of stories written by this author. If you have any information about sources cited in this article, please send an e-mail to sourceinfo[AT]wired.com. In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company. With another noi...

   Hack,Greatest,All time     2012-02-29 05:05:42

  Understanding JavaScript closure and where it can be used

Closure The official definition of closure is: an expression (usually a function) that has many variables and is bound to an environment that includes those variables. In JavaScript, closure refers to the ability of a function to access the lexical scope in which it was defined, even after the function has been executed and left that scope. This ability is due to the fact that when a function is created, it generates a closure that includes a reference to the definition environment of the curr...

   CLOSURE,JAVASCRIPT,USAGE     2023-03-05 02:17:08