SEARCH KEYWORD -- HTML to Wordpress
How Google Utilizes Big Data for SERP
Google is an expert when it comes to big data. This is evident in their development of various techniques and open source tools which are used by the big data industry professionals. These tools and technique allow Google to sift through millions of different websites and enormous amounts of data in order to provide users with correct answers in a matter of milliseconds. But how does Google accomplish that with such precision? To answer that, we need to focus on the complex activities that go o...
Is Ubuntu becoming a big name in enterprise Linux servers?
Summary: Mark Shuttleworth says yes, Ubuntu is now competitive with Red Hat Enterprise Linux in the enterprise space. Since last summer, Ubuntu has been more popular than Red Hat as a Web server. When you think of Ubuntu Linux, what do you think of? I would guess you think about the Linux desktop. While Ubuntu is certainly a big player—maybe the biggest—when it comes to the Linux desktop, Mark Shuttleworth, founder of Canonical, the c...
Linux,Ubuntu,Daat center,Server 2012-04-15 01:22:53
Best practices of front end optimization
1. Use DocumentFragment or innerHTML to replace complex elements insertion DOM operation on browser is expensive. Although browser performance is improved much, multiple DOM elements insertion is still expensive and will affect the page load speed. Assume we have an ul element on our page, we now want to retrieve a JSON list using AJAX and then update the ul using JavaScript. Usually we may write it as : var list = document.querySelector('ul'); ajaxResult.items.forEach(function(item) { // ...
JavaScript,Front end,Optimization,Tips 2013-07-06 11:26:27
A HTTPS client and HTTPS server demo in Java
In this post, I will create a HTTPS server and HTTPS client demo which can establish HTTPS communication between a server and a client using Java. This should be very useful when we want to test our understanding about SSL communication. We will use both a detailed SSL client and a simple HttpsURLConnection as the HTTPS client. Before creating the actual HTTPS server and HTTPS client, we first need to generate the keystore and truststore to be used by the server and client. To generate the keyst...
How the Internet Is Ruining Everything
The ongoing argument about whether the Internet is a boon or a bust to civilization usually centers on the Web’s abundance. With so much data and so many voices, we each have knowledge formerly hard-won by decades of specialization. With some new fact or temptation perpetually beckoning, we may be the superficial avatars of an A.D.D. culture.David Weinberger, one of the earliest and most perceptive analysts of the Internet, thinks we are looking at the wrong thing. It is not the co...
Internet,Everything,Market,Shape world 2011-12-06 09:08:27
Erlang Style Concurrency
Introduction On an evolutionary scale of innovation from one to ten (one being Bloomberg and Citi Group, eight being Google and Cirque Du Soleil, and ten being the company you couldn't imagine in your wildest dreams), the company I work for is about a three1. Being employed by this bastion of ingenuity affords me certain opportunities I can't get elsewhere. For example, every developer gets to interview potential...
Erlang,Concurrency,Lock,Message,Innovation 2012-01-03 10:44:44
Android Tutorial: Creating and Using an SD Card in the Emulator
In a previous post, I mentioned how user-friendly Android is for developers. There’s extensive documentation and information on the architecture, the different components and best practices. However, the documentation has a few blind spots. Many of the tools have little documentation and no usage examples. The information is there, it’s just hidden behind a few layers of Android theory.So I’m going to try and document a few of the basic things that you’ll probabl...
Overlap Detection
How does one detect when two strings overlap? In the case below, the four-letter suffix of string 1 matches the four-letter prefix of string 2. 1: "Fire at Will" 2: "William Riker is number one" Sometimes there are several matches; finding the longest is not always straight forward. 1: "Have some CoCo and CoCo" 2: "CoCo and CoCo is here." 2: "CoCo and CoCo is here." 2: "CoCo and CoCo is here." The naïve solution is to take...
String overlap,detection,python,implementation 2012-03-05 05:05:36
Top 9 Most Popular Programming Languages In IT Companies
1.) C LanguageC Language is a general-purpose computer programming language developed between 1969 and 1973by Dennis Ritchie at the Bell Telephone Laboratoriesfor use with the Unix operating system.Although C was designed for implementing system software. it is also widely used for developing portable application software.?0102030405060708091011#include <stdio.h> int main(void) { printf("hello, world!\n");&nbs...
C,Java,C#,C++,Ruby,Popular programming l 2011-04-27 09:21:52
The "C is Efficient" Language Fallacy
I came across an article yesterday about programming languages, which hit on one of my major peeves, so I can't resist responding. The article is at greythumb.org, and it's called Programmer's rant: what should and should not be added to C/C++. It's a variation on the extremely common belief that C and C++ are the best languages to use when you need code to run fast. They're not. They're good at things that need to get very close to the hardware - not in the efficiency sense, but in the...
C,GCC,Fallacy,Evolvement 2012-01-09 08:54:46
RECENT
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- Flows.network: Writing an LLM Application in Rust
- more>>