Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- java



  Top 15+ Best Practices for Writing Super Readable Code

Twice a month, we revisit some of our readers’ favorite posts from throughout the history of Nettuts+.Code readability is a universal subject in the world of computer programming. It’s one of the first things we learn as developers. This article will detail the fifteen most important best practices when writing readable code.1 - Commenting & DocumentationIDE’s (Integrated Development Environment) have come a long way in the past few years. This made commenting your ...

   Readable,Source Code,Refactor,Comment.OO     2011-04-11 02:20:08

  Signs that you're a bad programmer

1. Inability to reason about codeReasoning about code means being able to follow the execution path ("running the program in your head") while knowing what the goal of the code is.SymptomsThe presence of "voodoo code", or code that has no effect on the goal of the program but is diligently maintained anyway (such as initializing variables that are never used, calling functions that are irrelevant to the goal, producing output that is not used, etc.)Executing idempotent functions multiple times (...

   Sign,Programmer,Characteristics,Knowledge,Skill     2011-10-20 08:56:16

  The four key figures behind the success of JavaScript - Douglas Crockford

JavaScript's success can be attributed to at least four key figures: Brendan Eich, the creator of JavaScript Douglas Crockford, the creator of JSLint and JSON John Resig, the creator of jQuery Ryan Dahl, the creator of Node.js. We are already very familiar with Brendan Eich and the invention process of JavaScript, so let's start with Douglas Crockford, the second in command of JavaScript. Alliance In the 1990s, Microsoft's dominance overshadowed the whole world. At this time, two challengers e...

   JAVASCRIPT,DOUGLAS CROCKFORD,HISTORY     2023-05-07 06:42:30

  Encrypting and decrypting PGP file or text on MacOS

When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...

   PGP,GPG,ENCRYPTION,DECRYPTION,TUTORIAL     2020-10-29 05:06:09