Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- University



  The iFOREX Trading App is First Class

If you have searched the web for trading application reviews, you are bound to hear terms like ‘state of the art’ and ‘lightning fast execution’. The real question you should ask is - Can you trust the broker who will facilitate your trading to provide you with a robust platform that has several tools that will allow you to successfully trade. You want to make sure that the platform is intuitive and does not take weeks to learn how to use.   The iFOREX trading platfo...

   APP,TRADING,IFOREX     2018-12-20 08:07:35

  Find max subarray of an array

In computer science, the maximum subarray problem is the task of finding the contiguous subarray within a one-dimensional array of numbers (containing at least one positive number) which has the largest sum. For example, for the sequence of values −2, 1, −3, 4, −1, 2, 1, −5, 4; the contiguous subarray with the largest sum is 4, −1, 2, 1, with sum 6. The problem was first posed by Ulf Grenander of Brown University in 1977,...

   Max Subarray, Divide and conquer,Kadane     2013-04-22 11:50:35

  I am a great programmer, but horrible algorithmist

I am a great programmer, but a horrible algorithmist. It is a thought that has been weighing on me heavily recently, and I'd like to gather other developers feelings on the subject as well. I started what can be called my professional development career back in 1999. I was still in middle school, but my father hired me at his software company. My official duty was to make updates to our websites, but I mostly ended up bugging the other developers to help me learn. From there I picked up ...

   Programmer,Algorithmist,Diffference     2012-02-12 04:55:28

  When a CA becomes untrustable

Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...

   APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN     2016-10-01 23:03:44

  Before Python

This morning I had a chat with the students at Google's CAPE program. Since I wrote up what I wanted to say I figured I might as well blog it here. Warning: this is pretty unedited (or else it would never be published :-). I'm posting it in my "personal" blog instead of the "Python history" blog because it mostly touches on my career before Python. Here goes.Have you ever written a computer program? Using which language?HTMLJavascriptJavaPythonC++COther - which?[It turned out the students ha...

   Python,History,Programming language,B     2012-01-18 08:08:53

  Permutation algorithm with JavaScript

In secondary school, we have learned permutation. Basically, for n numbers, the number of permutations for these n numbers can be calculated to n! which is called 'n factorial'. But to display all the permutations on the screen, we need to use a recursive function. The problem is how to write this function.  Next I write a program to display the permutations for n numbers with JavaScript. First, we need to understand that from these n numbers, we can first take any one number from it, and t...

   JavaScript,Permutation,Algorithm,Impleme     2011-09-21 12:02:35

  The Story of W&L: China’s Great Internet Divide

Here’s an introductory quote from The Story of W&L, a tale of China’s great internet divide: China does not have one so-called “national internet,” instead there’s a great divide. It encompasses the elite with ThinkPad laptops and also the grassroots with MTK Shanzhai mobile phones. Our elites are on par with America, while our grassroots are on par with Vietnam. This is the story of W&L, two representatives of China’s great internet divide. T...

   China,Internet divide,Elite,Grassroot,Laptop,Mobile phone     2011-12-05 12:23:56

  The significance of coding competition to actual work

Some friends asked this question: In secondary schools we participate in the NOI, in university we participate in ACM/ICPC, TopCoder.What's the significance of coding competition to actual work? I participated in the NOI from 1994 to 1996, ACM/ICPC from 1999 to 2000 and TopCoder in 2002 for six months. Later I paid little attention to coding competition, so I may not understand the changes in recent years and race mode . The capabilities we can get by participating the competition can be summari...

   ACM,Programming,Facebook,TopCoder     2013-02-28 20:38:23

  Jackie the smart quadcopter to launch at Robotics Week

Flying security camera synced to smartphone kicks off Kickstarter campaign Entrepreneurs and robotics graduate students Jackie Wu and Ritwik Ummalaneni, in Northwestern University’s Master’s in Robotics program, are launching their new product, Jackie, during the National Robotics Week. The flying security camera quadcopter syncs straight to a smartphone, and is the next evolution in home security platforms that consumers have been waiting for. Jackie’s intuitive and easy co...

   Startup,Quadcopter,Security camera,Jackie Wu     2015-04-05 20:56:11

  17 Best Practices One Must Follow While Using Mobile Apps

      It is no secret that we use mobile applications everyday but we don't know how to use them optimally. As a result, we face plenty of problems with our mobile phones as well as the installed applications. Here are some best practices you can follow to avoid to any mobile phone and application anomalies.  Over the past several years, smartphones have started to dominate the technology scene.  These phones have installed mobile applications installed that can complete...

   mobile apps, best practices, iphone, android     2015-01-27 20:12:25