SEARCH KEYWORD -- Code coverage
“Experience says it allâ€- Pentaho ETL Developers’ Comment on the Use of ETL Tools
Since months Pentaho ETL developers have been juggling with three distinct tools- Pentaho DI, SSIS, and PowerShell. Their experience has provided them new perspective on the cons and pros of every tool. In this post, they are sharing their experience with these tools and explain their significance. Before getting started, they first would like to explain ETL in brief and how the tools suits ETL landscape. ETL is Extract Transform Load. Informatica was the initial ETL tool introduced in the mid n...
Pentaho BI ETL tools 2015-05-13 01:14:57
Hackers vs. Coders
Photo Credit: Pranav MistryBeing a good hacker is an invaluable skill. But is being a coder the same as being a hacker? Is it possible that coders are at a creative disadvantage to hackers who don’t know how to code?Here’s a story that helped me see the difference.I was recently invited to mentor at Startup Weekend. On Friday night, we gathered to eat pizza, pitch ideas, create teams and discuss launch plans. At the end of the day, everyone was feeling great about what theyâ...
Hacker,Coder,Comparison,Innovation 2011-05-11 02:11:09
Programming Language Readability
Lets compare some Python to Haskell for solving the same problem. The problem we’ll pick is Trie data-structure for auto-completions. We are interested not so much in the nitty gritty of the algorithm, but in the language style itself. Auto-complete has been in the programming news a lot recently; both a Python and a Haskell solver have turned up. (I suspect this post got flagged on Hacker News :( It never got on the front-page despite the rapid upvoting on a n...
Programming,Readability,Python,Haskell 2012-02-27 04:52:02
Set file permission in Java
Prior to Java 6, there is no good solution at the Java level to provide file permission management. You need to implement your own native methods or call the Runtime.exec() to invoke the system routine such as chmod in LInux. Since Java 6, Java introduces a set of methods which can be used to set the file permission at Java level. These methods include: File.setReadable(boolean); File.setWritable(boolean); FIle.setExecutable(boolean); File.setReadable(boolean, boolean); File.setWritable(bo...
JAVA, FILE PERMISSION, POSIX,learnjava 2015-08-29 03:37:37
Access control in Java -- Permission check order
Previously we showed you how to turn on SecurityManager in Java. After SecurityManager is turned on, a series of permission checks will be applied on the code you are calling in your application to protect some resources against malicious access such as files, sockets etc. To perform these permission checks, a set of Permissions will be created and checked using the AccessController. The AccessController has three purposes : To decide whether an access to a critical system resource is to be all...
JAVA,SECURITY,ACCESSCONTROLLER 2016-03-07 04:17:40
How I Program Stuff
I love programming. I can truly say that of all the things I enjoy, I enjoy programming the most. There's nothing quite like the feeling you get when you create something. Writing code is a lot like building your own little universe. When you build stuff, you're in complete control, and, no matter how hard you fight it, your code directly reflects yourself. If you write sloppy code, I can almost guarantee you'll be a sloppy person. If you haphazardly throw code around with any ca...
Programming,Steps,Isolate,Eliminate 2012-01-17 11:39:51
How GitHub Works: Be Asynchronous
This is — by far — my favorite aspect of working at GitHub. Everything is asynchronous. Chat GitHub didn’t have an office for the first two years. Chat rooms (in our case, Campfire) is where things got done. Today we’ve moved into our second office, and Campfire is still where we get things done. There’s a reason for that: chat is asynchronous. Asynchronous communication means I can take a step out for lunch and catch up on transcripts when I get back. Async...
GitHub,Work,Style,Asynchronous,Efficienc 2011-08-19 07:44:20
How key-based cache expiration works
There are only two hard things in Computer Science: cache invalidation and naming things — Phil Karlton Doing cache invalidation by hand is an incredibly frustrating and error-prone process. You’re very likely to forget a spot and let stale data get served. That’s enough to turn most people off russian-doll caching structures, like the one we’re using for Basecamp Next. Thankfully there’s a better way. A much better way. It’s called key-based cac...
Cache,Expiration,Key-base cache,Work 2012-02-20 05:32:40
10 Things Beginner Developers Should Know
If you are a novice developer, it might be confusing about where you should start, because the field is broad and provides many options for you. There are so many questions you might ask yourself, such as “What programming language should I learn?†or “Should I also know front-end, or only back-end?†And I am sure there are much more than that. Well, in order for you to be able to start with an advantage against the others, I’ve decided to help you start your ...
Advice,Software developer,Beginner 2011-12-29 01:41:04
The world's first HTML5 SIP client
This is the world's first open source HTML5 SIP client (May 12, 2012) entirely written in javascript for integration in social networks (FaceBook, Twitter, Google+), online games, e-commerce sites... No extension, plugin or gateway is needed. The media stack rely on WebRTC. The client can be used to connect to any SIP or IMS network from your preferred browser to make and receive audio/video calls and instant messages. The protocol parsers (SIP, SDP...) are highly optimized using Ragel loo...
RECENT
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- more>>