Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- implementation



  Does mobile application need architecture design?

Looking back to the history of PC software development a dozen years ago there was no  software architecture design, the consequence of this was that there would be a high cost on software maintainability and scalability. Later, people recognized the importance of software architecture and started to make the concept of software architecture mature. Now almost all software will have architecture design which has been the consensus of the software development companies and developers.Simi...

   Software design,Architecture design,Mobile app     2012-04-12 11:14:37

  Python internals: how callables work

[The Python version described in this article is 3.x, more specifically - the 3.3 alpha release of CPython.] The concept of a callable is fundamental in Python. When thinking about what can be "called", the immediately obvious answer is functions. Whether it’s user defined functions (written by you), or builtin functions (most probably implemented in C inside the CPython interpreter), functions were meant to be called, right? Well, there are also methods, but they’re not very ...

   Python,Callable work,Rationale     2012-03-24 05:20:27

  A turing machine in 133 bytes of javascript

Multiply turing machine The fact it took me 20 lines of javascript to implement a nondeterministic turing machine simulatorlast week kept me up at night. All weekend. Too much code for something so simple and I kept having this gut feeling implementing a basic version shouldn’t take more than 140 bytes. Sunday afternoon I sat down for about an ...

   Turing machine,JavaScript,Simple code     2011-11-28 09:27:28

  Java Cipher encryption/decryption example

In Java, Cipher is the API for doing data encryption/decryption. Many cryptographic algorithms such as AES, DES, RC4 etc can be specified when creating Cipher instance. The Cipher instance calls the underlying algorithm specific implementation to do the actual encryption/decryption.  Before doing the encryption/decryption, a key needs to be created and it will be used to do the encryption/decryption. A sample program for performing all these is : import java.security.Key; import javax.cryp...

   Java, Java Security, Cipher, Example, Sample     2015-08-14 07:07:10

  What’s Custom Software Development in 2021?

Each year, custom software development shows us its new angles — those shaped by the technology trends and changes in customer behavior and preferences. Considering the highly impactful nature of 2020 with the outbreak of COVID-19, 2021 custom software development was formed around the technologies that have contributed to the minimization of the pandemic’s harmful impact. So what are these technologies? In this article, you will find out info about the top trends in software develop...

   CLOUD,SOFTWARE DEVELOPMENT     2021-11-04 01:22:37

  Future of Healthcare Application Development Goes Beyond Your Expectations

Healthcare application development sector is still progressing and growing with changing needs of medial sector. While healthcare apps are hot now, the future of healthcare app development sector lies in technology implementation and consultation. In this article, we will discuss majorly on four facts – Which healthcare apps are hot now? What is the future of medical health? Which medical apps you can trust? What to look for in medical health apps? Let us discuss on all of these fa...

   HEALTHCARE APPLICATION DEVELOPMENT,HEALTHCARE SOFTWARE SERVICES,HEALTHCARE SOLUTION DEVELOPMENT     2015-10-16 07:41:09

  Password-less login

Most websites need user login in order to provide personalized content to visitors. The usual way is to request user to register an user account. Actually, this is not so appealing since if we need to remember one password for each website, it's troublesome, while for developers, it's their responsibility to protect password, once password is leaked, then it's a big headache to a website's business and reputation. So long time ago people started thinking about password-less login, this is a big ...

   Password-lesslogin,Authentication     2012-11-05 12:29:55

  Why are column oriented databases so much faster than row oriented databases?

I have been playing around with Hybrid Word Aligned Bitmaps for a few weeks now, and they turn out to be a rather remarkable data structure.  I believe that they are utilized extensively in modern column oriented databases such as Vertica and MonetDB. Essentially HWABs are a data structure that allows you to represent a sparse bitmap (series of 0's and 1's) really efficiently in memory.  The key trick here is the use of run length encoding to compress the bitmap into fe...

   Database,Column oriented,Speed analysis,Vertica     2012-01-29 04:27:05

  Redis Cluster and Common Partition Techniques in Distributed Cache

In this post, I will discuss a few common partition techniques in distributed cache. Especially, I will elaborate on my understanding on the use of Redis Cluster. Please understand that at the time of writing, the latest version of Redis is 4.0.10. Many articles on the same topic have a different idea from this post. This is mainly because, those articles are probably outdated. In particular, they may refer to the Redis Cluster implementation in Redis 3. Redis Cluster has been improved...

   REDIS,DISTRIBUTED CACHE,CLOUD COMPUTING     2019-01-17 08:10:37

  Node.js: Five Things Every PHP Developer Should Know

I recently started working on a few Node.js applications. Coming most recently from PHP (and Drupal in particular), I found the transition to Node.js to be surprisingly easy. Pleasurable, in fact. But I had to learn to think differently about a few things. Below I list the five things I think every PHP developer should know about Node.js. 1. Node.js Is Built On Chrome's JavaScript Engine Google's browser, Chrome, has a notoriously fast JavaScript engine called V8. And this JavaScript engine ...

   PHP,Node.js,Developer,Feature     2012-02-09 07:37:48