SEARCH KEYWORD -- CODE SNIPPET
Top rules you can't afford to miss while developing a Magento website
A powerful and attractive website has become a vital necessity of every online entrepreneur. Whether its about boosting the inflow of customers or enhancing the overall profitability of your business, a good website can do all the hardwork. The growing demand and popularity of Magento development services has made online merchants switch to Magento for promoting their business products and services via the internet. As a website creator, it is absolutely essential for you to consider some basic...
Magento development service, offshore Magento development, outsource Magento development, Magento de 2015-06-19 04:21:55
Want to be a Java developer?
Java is one of the top 3 programming languages in the world. It can be used to develop both web applications and desktop applications and more importantly it is cross platform--write once, run everywhere. Also, it's easy to pick up. If you want to be a Java developer, please get to ask yourself whether you know below listed topics. This list is summarized by Vivek Vermani, a Senior Java Developer: For a Core Java Developer , Ffollowing topics should be good. OOPs Concepts Abstract Classes and I...
new expression vs operator new in C++
In C++, there is a new mechanism for memory allocation and management. When we want to initialize an object, we can use new expression to get enough memory for storing an object and also initialize the object. When we want to create a new object, we can use new expression, for example: Obj *obj=new Obj; Basically, what the new expression does is to allocate enough memory for storing the obj object, in addition, it will initialize the object with some intial values. Also, there is an operator new...
C++, new expression, operator new 2012-08-12 11:42:39
Why should we drop or reduce use of MD5?
MD5 is a frequently used one-way hash algorithm, it is commonly used in following situations: Check data integrity. We take hash of the data stored in two different places and compare them. If the hash results are the same, then there is no need to check the actual data. This utilizes the collision-resistant feature. Two different data block will have little chance that their hash values will be the same. Many data service providers use such technique to check repeated data to avoild repeating...
MD5,Vulnerability,attack 2012-09-29 04:47:49
Efficiency of code execution
If you want to optimize your program codes, you need to find their Hotspot, i.e, the codes which are executed most frequently. If you can optimize this portion of codes a bit, you may gain much improvement of your code efficiency. Here I give you three examples about efficiency of code execution.1. PHP's Getter and Setter (From Reddit)This example a quite simple, you can skip it if you want.Consider the code below, we can find it's slower when we use Getter/Setter method to read a member variabl...
Code, Efficiency,Analysis,Trick 2012-07-13 10:59:21
Permutation algorithm with JavaScript
In secondary school, we have learned permutation. Basically, for n numbers, the number of permutations for these n numbers can be calculated to n! which is called 'n factorial'. But to display all the permutations on the screen, we need to use a recursive function. The problem is how to write this function. Next I write a program to display the permutations for n numbers with JavaScript. First, we need to understand that from these n numbers, we can first take any one number from it, and t...
JavaScript,Permutation,Algorithm,Impleme 2011-09-21 12:02:35
A JS1K competition demo for 2012
JS1K is a website which hosts some competitions to attract geeks from the world to create JS apps which are less than 1K (1024 bytes). The object of this competition is to create a cool JavaScript "application" no larger than 1k. Starting out as a joke, the first version ended with a serious amount of submissions, prizes and quality.Recently, I revised a previous project of mine and compressed it to 1018 bytes and submitted it. It is an analog clock. The code is shown below:w=c.width;h=c...
JS1K,HTML5,Competition,Analog clock,Love 2012-03-13 12:17:40
Three ways to define class in JavaScript
In object oriented programming, class is the template of object, it defines the properties and methods of a group of objects. Unfortunately, JavaScript doesn't support class, but we can have some workarounds to simulate class.1. Constructor functionThis is the classical approach, it is also the approach mentioned in many text books. It uses the constructor function to simulate class and it uses the keyword this to represent the object internally.function Cat() {  this.name = "Kelly...
JavaScript,Class,Method,Private,Inheritance 2012-07-09 11:59:51
How AI is Changing Web Development: A New Era of Digital Innovation
Picture this: AI isn't just about robots and sci-fi movies anymore. It's shaking things up in the tech industry, especially web development. So, what's the deal with AI and web development? Let's break it down. In a nutshell, AI refers to machines performing tasks that typically require human intelligence. When we talk about AI in web development, we're talking about smart algorithms and systems that can make websites smarter, faster, and more user-friendly. Why should you care about this?...
AI,WEB DEVELOPMENT 2024-10-21 07:34:22
9 reasons to use Zsh
Like majority *nix users, I have been using bash for many years. Sometimes I feel uncomfortable with bash. I tried use some other shells as well such as ksh, tcsh and zsh which I am going to talk about. A few days ago, I found an open source project ranking in the 6th named oh-my-zsh on Github, I downloaded it and had a try with it. It's amazing. We should use zsh to replace bash now. Why do we need to use zsh? Here is a 4 minutes YouTube video which shows many reasons why we should switch from ...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>