Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Weak reference



  JavaScript efficiency catch up

JavaScript is a very flexible language, we can write JavaScript code freely with various styles, different kinds of codes will have different execution efficiency. Here we summarize some tips we get from our development. Efficiency of JavaScript itself JavaScript has execution context chain, closures, prototype inheritance, eval etc. It brings us some magic features, but it also introduces the performance issue, if we don't use them properly, it will affect the codes execution efficiency. 1. Glo...

   JavaScript,efficiency,event delegation,eval     2013-04-02 04:08:46

  Erlang Style Concurrency

Introduction On an evolutionary scale of innovation from one to ten (one being Bloomberg and Citi Group, eight being Google and Cirque Du Soleil, and ten being the company you couldn't imagine in your wildest dreams), the company I work for is about a three1. Being employed by this bastion of ingenuity affords me certain opportunities I can't get elsewhere. For example, every developer gets to interview potential...

   Erlang,Concurrency,Lock,Message,Innovation     2012-01-03 10:44:44

  All Programming is Web Programming

Michael Braude decries the popularity of web programming:The reason most people want to program for the web is that they're not smart enough to do anything else. They don't understand compilers, concurrency, 3D or class inheritance. They haven't got a clue why I'd use an interface or an abstract class. They don't understand: virtual methods, pointers, references, garbage collection, finalizers, pass-by-reference vs. pass-by-value, virtual C++ destructors, or the differences between C# struc...

   Programming,Web programming,Opposite,Views,Web app     2011-11-12 10:38:00

  Who Uses PhoneGap/Apache Cordova?

The HTML5 Microzone is presented by DZone and Microsoft to bring you the most interesting and relevant content on emerging web standards.  Experience all that the HTML5 Microzone has to offer on our homepage and check out the cutting edge web development tutorials on Script Junkie, Build My Pinned Site, and the HTML5 DevCenter. I see questions and comments all the time with the general sentiment “it looks nice, but who really uses PhoneGap/Apach...

   PhoneGap,Apache,App,HTML5     2012-03-30 06:30:33

  Communicating Between Widgets in a Rich Internet Application

As a part of our October Free Dojo Support initiative, we received the following question from Manu Subramanian about how to manage communication between distinct components in a rich internet application: We are building an application with dojo. It does have many inter connected interface parts. For example it does have a top bar with drop down buttons. The menu items opens tabs in a tab controller. In general we need to call functions from different widgets or there are many interconne...

   Internet application,Rick internet,Widget,comminucation     2012-03-16 10:49:36

  8 most successful open source products

Open source itself is a successful product. It is not only liked by many personals, many famous enterprises like itAlthough there are numerous open source projects and open source products, which is the most successful among them? "Success" is defined as the widely used + well known here. In many successful open source products, only a minority leaders. Here we share 8 most successful open source products we think they deserve to be.LinuxReason: Linux + GNU = GNU / Linux. It has been almost 2...

   Open source,MySQL,Linux,BIND,BSD     2012-04-19 08:29:00

  Some measures for improving Linux server security

The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...

   Linux server,Server security     2012-08-21 05:08:50

  In College, Working Hard to Learn High School Material

In June, Desiree Smith was graduated from Murry Bergtraum High. Her grades were in the 90s, she said, and she had passed the four state Regents exams. Since enrolling last month at LaGuardia Community College in Queens, Ms. Smith, 19, has come to realize that graduating from a New York City public high school is not the same as learning. She failed all three placement tests for LaGuardia and is now taking remediation in reading, writing and math. So are Nikita Thomas, ofBedford Stuyves...

   Education,College,High school,Material,Knowledge transfer     2011-10-24 11:51:39

  Tricks with Direct Memory Access in Java

Java was initially designed as a safe managed environment. Nevertheless, Java HotSpot VM contains a “backdoor” that provides a number of low-level operations to manipulate memory and threads directly. This backdoor – sun.misc.Unsafe â€“ is widely used by JDK itself in packages like java.nio or java.util.concurrent. It is hard to imagine a Java developer that uses this backdoor in any regular development because this API is extremely dangerous...

   Java,Directly memory access,Tricks,JVM     2012-02-13 05:31:19

  Oracle CEO Mark Hurd : IBM PureSystem is far behind Oracle

Oracle CEO Mark Hurd had an interview with Chinese media in San Francisco on 19th April. Mark Hurd first introduced different levels of Oracle's overall strategy: 1) the product must achieve best among similar products; 2) system open, vertical integration to provide customers with maximum performance; 3) Industry specific solutions; 4) give users the right to choose and the integration of the cloud environment (private cloud, public cloud, mixed cloud). In addition, Mark Hurd share his own...

   Oracle,IBM,Pureystem,Hardware/Software     2012-04-19 07:17:24