Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- SOFTWARE DEVELOPERS



  ICO Checklist: How to Launch a Successful Initial Coin Offering

Amongst the many important things that took place in Blockchain industry in 2017, Initial Coin Offerings (ICO) may be considered as the most important of all. ICO helps business/idea owners to pre-sell access to their services or products and in a way to fund the development of those services or products. To help founders/ startups define an effective launch process and provide perspective on everything that they will need on their ICO journey, we have jotted down few points which will serve as...

   INITIAL COIN OFFERING,ICO CHECKLIST,INITIAL COIN OFFERINGS (ICO)     2018-05-28 07:32:53

  Emacs adventures

I have been using Emacs for over a year now. I actually didn’t learn a lot when I started using it (just the basics to get going and then some relatively common keyboard shortcuts), but lately I have been reading and learning much more about it. I’m so grateful by everything I’ve learned from different people on the net that I wanted to share a couple of things I’ve learned, and a simple major mode for editing AsciiDoc documents. As a long-time VIM user, I f...

   Editor,Linux,Emacx,VIM,Shortcuts     2011-11-30 11:56:49

  Could coding be the next mass profession?

Like farming was in the 17th century, factory work during the industrial revolution, construction during the Great Depression, and manufacturing after World War II. Better, because writing code is a creative act which can be done with or without a traditional (antiquated?) office-based job, and can create enormous personal and economic value. Most young people start in jobs that don’t have much of a future. Most don’t get higher education – only a third get a...

   Coder,Learning,Training,Profession     2012-01-05 08:02:50

  Different types of keystore in Java -- Overview

Keystore is a storage facility to store cryptographic keys and certificates. They are most frequently used in SSL communications to prove the identity of servers and clients. A keystore can be a file or a hardware device. Three are three kinds of entries can be stored in a keystore depending on the types of keystores. The three types of entries are: PrivateKey : This is a type of keys which are used in asymmetric cryptography. It is usually protected with password because of its sensitivity. It ...

   JAVA,KEYSTORE,OVERVIEW,JKS,PKCS12,JCEKS,PKCS11,DKS,BKS     2014-08-18 02:09:54

  Lessons from the Trenches

I believe that making a game is part art and part science, so it's no wonder that managing a game project is also part art and part science. Clearly if it was all science then the industry would get a collective F for not having made any significant progress over the last decade - all one has to do is just glance at the published postmortems to see that the same patterns are repeated over and over.A game has to be fun, engaging, grab users in the first two minutes and also keep their a...

   Game,Trenches,Tips,Game design,pattern     2011-10-10 05:08:50

  Using JavaScript to operate clipboard

Browsers allow JavaScript to read and write data on clipboard. Generally script should not modify user's clipboard to avoid impacting user expectation, but there are cases where this can indeed bring convenience to users. For example, for some code snippet, user can copy it to clipboard with one click instead of select and copy manually. There are three options for clipboard operation provided in JavaScript/browser: document.execCommand() Asynchronous Clipboard API copy and paste events This p...

   JAVASCRIPT,CLIPBOARD,NAVIGATOR.CLIPBOARD     2021-01-23 23:23:34

  Illiterate Programming

Donald Knuth cleverly imprisoned the phrase "Literate Programming" - if you're not documenting your source with his particular methodology then you must be a proponent of "Illiterate Programming," which sounds truly awful. I very much believe in documented code but I think no amount of pontification in English will ever make a piece of code clearer than the code itself (I'm not talking about project or API documentation). I'm also not talking about the super...

   Programming,Illiterate     2012-02-10 06:20:52

  Circumventing browser connection limits for fun and profit

A few days ago, this video hosted by metacafe popped up on digg, explaining how to increase site download times by tweaking your browser settings to increase connection parallelism. To explain why this works, let’s step back a bit to discuss how browsers manage server connections. In building any application, developers are often required to make ‘utilitarian’ choices. Pretentiously paraphrasing Jeremy Bentham, ‘utilitarian’ describes an approach that ââ‚...

   HTTP,Concurrent connection limit,Solution,AJAX     2011-12-14 13:01:02

  Install and setup Kafka on Windows

Kafka has become a very popular distributed message delivery service which decouples different services while making message delivery between service easy, fast and reliable. In this post, we will walk through how to install and set up Kafka on Windows. Pre-requisite Java Apache ZooKeeper Installation Go to Kafka's download link and download the latest stable release, we downloaded 2.2.0 as of this writing. After downloading, copy the installation file to some folder and unzip it.  Sinc...

   KAFKA,STREAM,USER GUIDE     2019-06-01 02:12:07

  Data Scientists and Their Harder Skills than Big Data

The field of data science is often confused with that of big data. Data science is an aid to decision makers in a company with a logical approach.  Who is a Data Scientist?  A Data Scientist reviews a huge collection of data(that may extend to a couple of terabytes of disk space or thousands of excel sheets). This humongous chunk of data is not feasible for being handled, sorted and analyzed by a single person. Here we require the help of data science, and most recently, the field of A...

   BIG DATA     2017-12-13 04:22:55