Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Weak reference



  9 useful jQuery code snippets

jQuery is one of the most popular JS library among front end developers because of its functionality and usability. Here we share with you some useful jQuery code snippets which can be used in our daily front end development. 1. Smoothly return to page top $(document).ready(function() { $("a.topLink").click(function() { $("html, body").animate({ scrollTop: $($(this).attr("href")).offset().top + "px" }, { duration: 500, easing: "swing" ...

   jQuery,Code snippet     2013-07-13 00:11:10

  10 Easy Things to Do to Enhance Your Online Security Today

If you think you don’t need to take extra steps to increase your cyber security, you are wrong. Statistics on cybercrime are shocking and clearly prove that you can’t have ‘too much security’ while using the Internet today. For example, did you know that by 2023 cybercriminals will have stolen over 33 billion private records or that 15 million Americans became victims of digital identity theft in 2017 (Norton)? That’s not even mentioning millions of monetary losses ...

   DATA SECURITY,SECUIRITY     2019-01-21 07:01:37

  Google upgrades its built in calculator

Google search engine is more and more intelligent.It has been a long time since Google integrated a built in calculator in its search engine. Today, Google upgraded its built in calculator function in its search engine, a new calculator interface with 34 buttons is added.Before upgrading, if you type 6+7 in the search field, Google will only show the answer 13. But now, if you enter this formula again, in addition to the answer, it will display one calculator interface with 34 buttons. See follo...

   Google,built in,Calculator,Upgrade     2012-07-25 11:07:33

  How Can Your Data Be Stolen Online?

In 2019, according to Statista, nearly 165 million sensitive records were exposed in the US due to data breaches. Unfortunately, data theft is not going anywhere. Hackers are using increasingly sophisticated methods to steal information, but thankfully there are measures you can take to ensure your data stays safe. Here are some of the most common ways people get their data stolen online and how you can take precautions against the methods cybercriminals use. Human Error Hacking is one of the m...

   DATA SECURITY,PROTECTION KID     2021-01-27 19:46:05

  So, just what IS the problem with Windows Phone?

Charlie Kindel (who left Microsoft earlier this year after 21 years, most recently as a Windows Phone General Manager), posted today on an “impedance mismatch” between carriers and device manufacturers, and Windows Phone, where those carriers and OEMs are “reluctant” to push Windows Phone, while Google’s Android has taken an approach that “reduces friction with carriers & device manufacturers at the expense of end users”. Kindel seems to be imply...

   Windows Phone,Trend,Weak market,Analysis     2011-12-27 09:11:19

  People working with computers seem to have a lot of spare time

People working with computers are a group of people who spend much time on communicating with PCs, Handsets and other programmed hardware devices. Usually, these people are thought as a group of busy people. When we see them, they are often sleepy and seem not caring about anything else. They often work day and night, spend many hours on finding and fixing an unknown bug or trying to meet the project deadline  Are they really so busy?  Lets see what some people think about them? Just f...

   Programming,Busy,Spare time,Fun     2012-05-01 07:06:51

  Use Java ThreadLocal with caution

According to Oracle documentation, ThreadLocal is a class provides thread-local variables. These variables differ from their normal counterparts in that each thread that accesses one (via its get or set method) has its own, independently initialized copy of the variable. ThreadLocal instances are typically private static fields in classes that wish to associate state with a thread. In short, ThreadLocal variables are variables belong to a thread, not a class or an instance of a class. One common...

   JAVA,MEMORY LEAK, THREADLOCAL     2015-11-03 07:31:57

  The evolving history of asynchronous operation in JavaScript

JavaScript is single threaded, it means there would be only one task running at any point of time. But this would slow down the overall program execution if there is long running task, hence asynchronous task execution is desired in complex cases. To achieve asynchronous task execution, there are a few options introduced in JavaScript. setTimeout/setInterval Event Promise Async/Await setTimeout/setInterval is one of the first mechanisms introduced in JavaScript to simulate asynchronous operati...

   JAVASCRIPT,ASYNC,PROMISE,AWAIT     2019-11-09 08:21:56

  Chrome overtakes IE as the No.1 browser

According to data from market research company StartCounter, by May 2012, Chrome has overtakes IE as the No. 1 web browser globally. Firefox and Safari is following IE to be 3rd and 4th most popular web browser.In May, market share of Chrome is 33%, while IE only gets 32%. Firefox is slowly dropping, which has a share of 25%.  However, with release date of Windows 8 approaching, IE 10 will also be shipped with Win8, at that time, the number of users who use IE may increase because according...

   Chrome,No.1,IE,StatCounter     2012-05-21 06:03:04

  Microsoft is to release Office for iPad and Android

Microsoft plans to release Office series software on iPad and Android based tablets this November. This application's loading screen shows "Office for iOS" on iPad, this may indicate that it may also be compatible with iPhone and iPod Touch. The Office series software will also be available on Android at the same time. Some details about this application are still unknown, such as price and features. Last November there was news showed that Microsoft was developing Office for iOS. Micr...

   Microsoft,iPad,Office,Android,iOS     2012-05-24 03:33:28