Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- number



  Go vs C benchmark. Could Go be faster than C?

During last semester I was attending Multiprocessor Architectures course, given at Facultad de Informática where I study my Computer Science degree. As part of the assignments due to pass the course, we had to do several programs written in C to benchmark matrix multiplication by testing different techniques and technologies. First of all we had to do a secuential program in three different versions: A normal one where the result matrix is ordered by rows and the loops range the matrix by ...

   Gp,C,Benchmark,Faster,Speed,Comparison     2012-02-08 10:09:07

  HTTP Server development resource summary

This article summarizes some materials, articles and books I used when learning HTTP Server development. Hope this will help you. RFC and standard documents RFC2616 – Hypertext Transfer Protocol — HTTP/1.1 HTTP protocol standard document, it's an essential reference document for all personnel engaged in the development of the HTTP-related projects, careful study is recommended. RFC793 – TRANSMISSION CONTROL PROTOCOL TCP Protocol standard document The WWW Common Gateway Interfac...

   HTTP Server,Book,Article     2012-09-25 22:46:56

  Python Performance Tips, Part 1

To read the Zen of Python, type import this in your Python interpreter. A sharp reader new to Python will notice the word “interpreter”, and realize that Python is another scripting language. “It must be slow!” No question about it: Python program does not run as fast or efficiently as compiled languages. Even Python advocates will tell you performance is the area that Python is not good for. However, YouTube has proven Python is capable of serving 40 million videos...

   Python,Performance,Efficiency,Tips     2012-02-14 10:50:22

  Different types of keystore in Java -- Windows-MY

Windows-MY is a type of keystore on Windows which is managed by the Windows operating system. It stores the user keys and certificates which can be used to perform cryptographic operations such as signature verification, data encryption etc. Since it's a kind of native keystore, Java doesn't have a general API to access it. To help Java applications access the keys and certificates stored in Windows-MY keystore, Java provides a separate API -- SunMSCAPI. The SunMSCAPI provider is ...

   JAVA,KEYSTORE,WINDOWS-MY,SUNMSCAPI     2016-01-09 05:45:59

  We’re working our young people too hard

Yesterday, I shared an anecdote involving a school I once attended with a list. This anecdote eventually became the basis for a blog post. Traffic was fairly normal for the first few hours until it found its way onto hackernews.Then it exploded.The comments on both the original blog post and the post on hackernews filled almost immediately with opinionated hackers, teachers and students sharing similar experiences, discussing the problem and figuring out what should be done about it.Repeate...

   Education,Science,Teacher,Student,Exam     2011-11-17 08:38:01

  Pay Your Programmers $200/hour

If you are hiring programmers, you should pay them $200/hr. This breaks through otherwise impenetrable psychological barriers, helps solve the agency problem, and ensures you are only hiring programmers when you really need them. Expectations $200/hr is an open declaration of your expectations. It states that you are expecting to hire both a professional and an expert in the field. As a programmer, I treat contracts that pay me $200/hr differently from jobs/contracts that pay me $65/hr eq...

   Salary,Programmer,Responsibility,Urgency,Value     2011-12-31 15:34:57

  Javascript Frameworks Are Too Small

A while back I stumbled upon a great post by Jean-Baptiste Queru. It describes the incredible depth of the modern technology stack. Layers upon layers of complex science, hardware, and software, each layer creating a simpler abstraction around the previous. This ultimately enables our paltry human brains to create amazing things that would otherwise be impossible (or really difficult). This is, in my opinion, the lifeblood of modern software development. For some reason, however, when i...

   JavaScript,Framework,Size,Small,jQuery     2012-01-10 07:20:59

  Taking Precautions to Avoid Shady VPN Providers

VPNs or virtual private networks are virtual tunnels that obscure your IP address, routing your internet traffic through a server located in a country of your choice, in an encrypted and anonymous way. Using a VPN allows you to: secure your sensitive data from hackers obscure the IP address so you can see content not available in your country avoid websites you routinely surf (e.g., Facebook) noticing a different IP address when you are traveling, and asking you to verify your identity bypass t...

   VPN,NETWORKING     2019-02-19 07:26:26

  What Makes A Successful Cryptocurrency?

The cryptocurrency landscape today is a little bit of a maze. There seem to be countless cryptos available — thousands of them, by some estimates — and unless you’re particularly well versed in this technology, it can be difficult to tell what differentiates them. To cut through some of the confusion, we decided to take a closer look at cryptocurrencies. We won’t simply list the most prominent ones, the way so many sites already have. Instead, we’re going to look i...

   BITCOIN,CRYPTOCURRENCY     2020-08-25 05:13:22

  mysql – connection example

Mysql is a database, and to gain access to the data within C++ you will need to be able to “talk” to the database via queries (just like on the mysql command line interface e.g. select * from tablename), the connection process is very similar to the command line interface you will need to supply connection details as in hostname (localhost normally), username, password, database to use and also there are other details that you can pass e.g port number more information can be gained f...

   C++,Database,MySQL,Connection,Example     2011-10-29 00:42:10