SEARCH KEYWORD -- Function
In defence of Objective-C
An unashamed apologist’s perspective on the loveliest language i’ve worked with.I’ve worked with a lot of programming languages in my time. Not a huge number, mind you, but enough that i can say that i’m open minded and seasoned about it. And, as they say: ‘Don’t feed the trolls’ – well, i’m about to do exactly that: feed the trolls at work who love to rag on about how awful obj-c is! So here i go, foolishly treading where no sensible...
Apple,Objective-C,Syntax,Defense,Memory management 2011-10-17 11:28:39
How AI is Changing Web Development: A New Era of Digital Innovation
Picture this: AI isn't just about robots and sci-fi movies anymore. It's shaking things up in the tech industry, especially web development. So, what's the deal with AI and web development? Let's break it down. In a nutshell, AI refers to machines performing tasks that typically require human intelligence. When we talk about AI in web development, we're talking about smart algorithms and systems that can make websites smarter, faster, and more user-friendly. Why should you care about this?...
AI,WEB DEVELOPMENT 2024-10-21 07:34:22
Why would a developer invest time in your startup’s platform?
The notion of developing a platform is highly addictive for technology founders. It ticks every “this is awesome†box and its drawbacks do not become evident until after you’ve already overcommitted.When you’re sunk deep in your idea, you start seeing the infinite number of directions it might go. It could be used for creativity or education or advertising or television or personal productivity or anything.Possibilities are exciting.You soon realise you can’...
Platform,Invest,Attraction,Sell point,Developer 2011-10-31 10:49:37
Pointers, arrays, and string literals
A recently posted question on Stack Overflow highlighted a common misconception about the role of pointers and arrays held by many programmers learning C.The confusion stems from a misunderstanding concerning the role of pointers and strings in C. A pointer is an address in memory. It often points to an index in an array, such as in the function strtoupper in the following code:void strtoupper(char *str) { if (str) { // null ptr check, courtesy of Michael while (...
char pointer,initialization,literal,cann 2011-09-22 13:29:23
HTML above flash (transparency + z-index)
We have faced this problem many of the times. When we want to display some message on top of all layers on a page or use some feature like jQuery light boxes. Normally the flash file continues to shine through the page. No matter what you do with layering the dom elements using z-index.See the layering flash content problem definition here.Before this, people used to dodge this issue with some fixes like hiding the flash area completely and then showing a static image of...
HTML,Flash,Above,z-index,wmode,transpare 2011-05-01 15:46:34
Why I Still Use Emacs
At school, I’m known as the Emacs guy; when people have questions about configuring Emacs or making it work a certain way, they often come and ask me. Sometimes, some people ask me why use Emacs at all? Isn’t it a really old editor and aren’t Eclipse or Visual Studio much better? I mean, they don’t have weird key bindings and have intellisense, that’s surely better for a programmer, right? I will attempt in this post to explain some of the reasons why I still c...
Build route graph of Hurricane Sandy
Hurricane Sandy swept US east side and landed in New York, it killed 113 persons and incurred 50 billion US dollars economic loss. Sandy is also considered as the most expensive hurricane. We will now use matplotlib and basemap libraries in Python to build a route graph of Sandy. Below is the animated GIF. Shadow is added in the graph to show the time at night, we can see from the graph that Sandy stayed a while in Panama after emerging, then it went through Cuba and became Hurricane-2. Late...
Hurricane Sandy,Route graph,Python 2012-11-17 07:58:13
One thought about JavaScript exception handle
Due to network, browser and cache issues, the JS executed in production may produce different results from the testing environments. Sometimes they may produce exceptions. Front-end developers may encounter this kind of exceptions frequently. But how to log and use them is seldomly considered by them. Actually, exception handling includes two steps : log and use. 1. Log Regarding to log error, this is relatively convenient, since in each browser, there is one interface called window.onerror. win...
JaavScript,Log,Exception,Email 2013-03-18 12:50:21
Kubernetes Authentication & Authorization 101
If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αá½θεντικÏŒς authentikos, “real, genuine”, from αá½θÎντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...
RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES 2021-06-05 23:19:18
Inside Google's recruiting machine
FORTUNE -- In the hot war for talent being fought in Silicon Valley, no company has an arsenal quite like Google's. Named Fortune's Best Company to Work For in 2012, the search giant made a record 8,067 hires last year -- boosting total headcount by a third. The thirteen-year-old firm's recruiting has an almost mythical quality about it, particularly for the two million candidates applying to work there each year. In terms of elite American institutions, getting a job at Google ranks with b...
Google,Recruiter,Contract,Recruit machine 2012-02-25 04:50:01
RECENT
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- Flows.network: Writing an LLM Application in Rust
- more>>