Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Side project



  Why Memorizing is Ineffective

The information-age has burst into life, creating a wake of social change. Young people are growing up faster and more sophisticated, as raw information, tailored-entertainment, and branded-marketing are streamed into their rooms. But this technological exposure has not necessarily made them savvier or more capable of handling tomorrow’s challenges.The debates in public education over “school-choice” and standardized testing have missed the far more important issue. The real c...

   Memory,Memorization,Ineffective,Career     2011-11-19 02:13:41

  Top 15+ Best Practices for Writing Super Readable Code

Twice a month, we revisit some of our readers’ favorite posts from throughout the history of Nettuts+.Code readability is a universal subject in the world of computer programming. It’s one of the first things we learn as developers. This article will detail the fifteen most important best practices when writing readable code.1 - Commenting & DocumentationIDE’s (Integrated Development Environment) have come a long way in the past few years. This made commenting your ...

   Readable,Source Code,Refactor,Comment.OO     2011-04-11 02:20:08

  10 New Year’s resolutions for designers

Get the new year off to a positive start with these design resolutions Wake up. I hope you enjoyed your holiday because it’s a new year and it’s time to get back to work. We did pretty good last year. We started standing up for ourselves. We stopped working for free. We started getting our financial house in order. (Please don’t make me do the contract thing again this year.) We rediscovered typography ...

   Designer,Chanllenge,2012,New UI     2012-01-18 09:11:02

  Cleansing data with Pig and storing JSON format to HBase with Pig UDF

Introduction This post will explain you the way to clean data and store JSON format to HBase. Hadoop architect experts also explain Apache Pig and its advantages in Hadoop in this post. Read more and find out how they do it. This post contains steps to do some basic clean the duplication data and convert the data to JSON format to store to HBase. Actually, we have some built-in lib to parse JSON in Pig but it is important to manipulate the JSON data in Java code before store to HBase. Apache Pig...

   JSON,HADOOP ARCHITECT,APACHE HBASE,PIG UDF     2016-06-10 01:13:41

  Touching and Gesturing on iPhone, Android, and More

One of the most important parts of creating an effective and intuitive user interface on touch-enabled smartphones has nothing to do with visual appearance—instead, it has to do with creating an interface that properly responds to user input based on touch. For Web applications, this means replacing mouse events with touch events. In Dojo 1.7, new touch APIs help make this process easy. This is an updated version of the post Touching and Gesturing on the iPhone, published in 2008. I...

   Touch,Gesture,iPhone,Android     2012-04-12 11:21:42

  Why PHP Was a Ghetto

Note: I wrote this over a month ago, but decided not to publish it until now.I was talking with the Co-founder of a pretty cool start-up in DUMBO the other day about why the non-PHP development world generally has such disdain for PHP and the community surrounding it. He brought up an interesting point that stuck with me, largely because I hadn’t heard it before.If you’re unaware of the usual beef most developers have with PHP, it tends to revolve around:Ug...

   PHP,Framework,MVC     2011-05-06 00:35:37

  FUCK PASSWORDS

I'm so tired of passwords. So, so, so tired. Most people don't understand this. Most people use the same password everywhere. Most people can just mechanically type out password3 in every password box, smirking to themselves at how clever they are, because who would ever guess 3 instead of 1? I don't do that. Let me tell you what i do. I generate a different password for every service, based on a convoluted master password and the name of the thing. I do this because it's what you're...

   Security,Password,Random generation,Hard to remember     2011-12-05 11:32:45

  How do Silicon Valley companies recruit

There are a lot of friends asking me about the basic flow of how Silicon Valley companies recruit engineers. As a candidate, I tried Facebook, Google, Yahoo, Oracle, and I received offer from all these companies. As an interviewer, I have interviewed no less than 300 people and I know about the process of recruitment. I write this article with the hope of inspiring people who want to go to Silicon Valley or who are preparing for interviews or who are in the design of the recruiting process...

   Facebook,Interview,Experience,Silicon Valley     2012-05-15 06:36:52

  ICO Checklist: How to Launch a Successful Initial Coin Offering

Amongst the many important things that took place in Blockchain industry in 2017, Initial Coin Offerings (ICO) may be considered as the most important of all. ICO helps business/idea owners to pre-sell access to their services or products and in a way to fund the development of those services or products. To help founders/ startups define an effective launch process and provide perspective on everything that they will need on their ICO journey, we have jotted down few points which will serve as...

   INITIAL COIN OFFERING,ICO CHECKLIST,INITIAL COIN OFFERINGS (ICO)     2018-05-28 07:32:53

  Preprocessor magic:Default Arguments in C

This post is for programmers who like C or for one reason or another can't use anything else but C in one of their projects. The advantages of having default arguments is not something that needs convincing. It's just very nice and convenient to have them. C++ offers the ability to define them but C under the C99 standard has no way to allow it. In this post I will detail two ways I know of implementing default arguments in C. If a reader happens to know additional ways please share in ...

   C,Preprocessor,Default arguments     2012-02-19 06:17:04