SEARCH KEYWORD -- Case sensitivity
Remove duplicated elements in JavaScript array
During interviews, one frequent question asked would be something like how to remove duplicated elements in a JavaScript array and how many different ways you can think of. The interviewee would also be asked to write the code down. In real applications, normally front end would not need to handle this case since normally it would be done by backend, but still it's necessary for front end developers to know different ways of doing this. This post will share some of the common ways to remove dupl...
JAVASCRIPT,ARRAY,DUPLICATED ELEMENT 2018-09-21 22:32:10
Multi-master,NoSQL and MySQL
The MySQL family has been innovating rapidly. New features need names and sometimes those names are confusing. Describing something as multi-master or a NoSQL solution has confused me.Multi-master requires one of conflict prevention, conflict resolution or faith. MySQL Cluster provides both conflict prevention and resolution as described in these great posts. Regular MySQL has minimal support for conflict prevention (auto-increment-offset can prevent insert conflict...
MySQL,NoSQL,Comparison,RANT,Master 2011-10-17 11:30:42
Top 5 Reasons Not to Use Hadoop for Analytics
As a former diehard fan of Hadoop, I LOVED the fact that you can work on up to Petabytes of data. I loved the ability to scale to thousands of nodes to process a large computation job. I loved the ability to store and load data in a very flexible format. In many ways, I loved Hadoop, until I tried to deploy it for analytics. That’s when I became disillusioned with Hadoop (it just "ain't all that"). At Quantivo, we’ve explored many ways to deploy H...
Cloud computing,Hadoop,Analytics 2012-04-17 13:43:26
People, processes and tools
Some years ago, one of my managers used to repeat this "Accenture truism" (or so he designated it): to fix or improve something, first you need the right people, then you need the right processes to help those people work together, then finally you need the right tools to support those processes. People, processes, and tools - in that order.This is even more true for tech startups than for corporations. As geeks, whenever we face a problem, we often start by looking for a tool to fix it. "Our te...
Work,People,Process,Tool,Importance,Priority 2011-10-24 11:36:14
A Hello, World Servlet
Servlets are the pure Java solution to handle web requests. Many application will use servlets instead of JSP and others will use servlets in conjunction with JSP. Experienced JSP programmers use servlets in conjunction with JSP to create clearer and simpler applications. The servlets handle Java processing: form handing, calculation and database queries. JSP formats the results. Servlets belong in WEB-INF/classes. On this machine, the source is in Java source in /var/www/hosts/www.caucho.com/we...
10 rules of PHP-masters
1. Use PHP only when it is necessary – Rasmus Lerdorf There is no better source than the creator of PHP, to learn what he can do. Rasmus Lerdorf created PHP in 1995. Since then, the language has spread like a wildfire rate in the developer community, incidentally changing the face of the Internet. However, Rasmus did not create PHP with these intentions. PHP was created for the needs of web development. As is the case with many other projects wi...
PHP,Master,Experience,Advice 2011-12-16 09:38:07
Five-minute Multimethods in Python
So what are multimethods? I'll give you my own definition, as I've come to understand them: a function that has multiple versions, distinguished by the type of the arguments. (Some people go beyond this and also allow versions distinguished by the value of the arguments; I'm not addressing this here.) As a very simple example, let's suppose we have a function that we want to define for two ints, two floats, or two strings. Of course, we could define it as follows: def foo(a, b): if...
Python,Multimethod,Argument list,Version,Overloadding 2011-12-07 08:41:03
Essential Rules To Protect Your Credit Card When Shopping Online
You have to protect yourself and your credit card online while shopping. There are a number of ways to do this, but some prove more technical than others. Your basic best defense includes sensible use and layers of protection. The best way to do this is to pick and choose which stores at which you charge purchases. You can reduce the chance of losing your card details to a thief by declining to allow the retailer to store your credit card. Use a password manager to save your passwords and make a...
SECURITY,CREDIT CARD,MASTERCARD 2019-10-09 08:40:07
8 Optimization Rules To Improve Visibility Of your Ecommerce Store
The success of an Ecommerce store depends on its page rank. If your store pops up in first page then there are higher chances of getting noticed. But getting a spot in page 1 is no mean task as web crawlers are very smart in identifying a quality content. These crawlers follow a specific pattern in setting up a yardstick for a quality content. You need to understand what does a quality content mean from a search engine perspective. Here are the rules to be followed. #1 Unique content is ...
marketplace apptha, multi vendor marketplace, magento marketplace 2015-03-09 07:16:16
Breaking Barriers: How 3D Printing is Democratizing Product Development
Innovation has always been the cornerstone of progress, driving societies forward and shaping our future. However, for many years, the realm of product development and manufacturing was largely restricted to big corporations with hefty budgets and access to specialized resources. This created a barrier for individuals and small businesses aspiring to bring their ideas to life. Fortunately, the advent of 3D printing technology has shattered these barriers, democratizing product development and op...
UV PRINTING,3D PRINTING 2024-03-05 08:15:32
RECENT
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- more>>