SEARCH KEYWORD -- FUNCTIONAL PROGRAMMING



  7 Ways Tablets are Better than Laptops or Smartphones

Imagine a situation of preparing for a short weekend trip to a smaller village or a countryside with beautiful nature, fresh air and breathtaking scenery, where your cousins are eagerly expecting you for their twentieth marriage anniversary; you seem to be almost ready, but one thing is missing!  A considerable amount of work is still ahead of you, and you also want to stay in touch with your friends, which makes it a bit difficult to decide whether it would be more suitable to take your l...

   TABLETS,SMARTPHONE,LAPTOP     2018-07-25 05:32:44

  Do NOT use boolean variable as function parameters

We follow lots of coding styles and coding standards when we do programming, but we may frequently forget one. The forgotten one is that do not use boolean parameter as the function parameters. The reason is it would greatly reduce the readability of the code. Don't believe it? When you read the following code, what does this code mean? widget->repaint(false); Do not repaint? Or what does this mean? After looking at the document, we know that this parameter is whether ...

   CODING STYLE,BOOLEAN,FUNCTION PARAMETER,CODING STANDARD,METHOD PARAMETER     2012-04-22 02:38:45

  Efficiency of code execution

If you want to optimize your program codes, you need to find their Hotspot, i.e, the codes which are executed most frequently. If you can optimize this portion of codes a bit, you may gain much improvement of your code efficiency. Here I give you three examples about efficiency of code execution.1. PHP's Getter and Setter (From Reddit)This example a quite simple, you can skip it if you want.Consider the code below, we can find it's slower when we use Getter/Setter method to read a member variabl...

   Code, Efficiency,Analysis,Trick     2012-07-13 10:59:21

  C vs Java Complete Comparison

Similarities: Java and C have same syntax operators. Difference—thinking Two paradigms: Java: Object oriented language C: Structured language Differences: --Syntax No preprocessor Java does not include a preprocessor and does not define any analogs of the #define, #include, and #ifdef directives. Constant definitions are replaced with static final fields in Java. (See the java.lang.Math.PI field for an example.) Macro definitions are not available in...

   C,Java,Comparison,Difference,Similaritie     2011-10-06 12:46:39

  Top 10 reasons to use a low-code platform

Generally, as the best coding platforms, low code includes low code app development, process development solutions and software development tools. IT users utilize low code solutions as a source of the required building blocks for the building of workflows and applications. The building blocks make it easier to assemble apps and workflows without requiring hand-coding. The growth of low-code platforms therefore levels business grounds by reducing the time spent in coding among other benefits.&nb...

   LOW CODE,PROGRAMMING     2021-02-18 19:43:49

  10 Tools Every Software Developer Should Use in 2018

The main problem I noticed about most programmers is that even though they know about latest software development tools, they never really spend significant time to learn them well. As a programmer, I always try to learn new tools and latest technologies. At the same time, I also look to improve my knowledge of tools which I have been using for many years. Whether you're a front-end developer, full-stack programmer or part of a DevOps team, you should familiarize yourself with the latest develop...

   SOFTWARE DEVELOPMENT, SOFTWARE DEVELOPMENT TOOLS, PROGRAMMING TOOLS     2018-04-28 07:08:00

  How Artificial Intelligence is Changing the Future of Web Design & Development

Artificial intelligence is having a say in how web designs are shaping up nowadays. Many within the industry have even gone on to say that AI is the future of web design and development. The impact of AI on web design and development can be felt by understanding how web design has evolved over the years. Traditionally, all websites were created using HTML. Then, with the advancement of technology, the code structure of websites began to change and became more sophisticated. Now, it has come to a...

   HIRE WEBSITE DESIGNER, OUTSOURCE WEBSITE DESIGN SERVICES     2020-02-13 02:21:26

  Different types of keystore in Java -- Overview

Keystore is a storage facility to store cryptographic keys and certificates. They are most frequently used in SSL communications to prove the identity of servers and clients. A keystore can be a file or a hardware device. Three are three kinds of entries can be stored in a keystore depending on the types of keystores. The three types of entries are: PrivateKey : This is a type of keys which are used in asymmetric cryptography. It is usually protected with password because of its sensitivity. It ...

   JAVA,KEYSTORE,OVERVIEW,JKS,PKCS12,JCEKS,PKCS11,DKS,BKS     2014-08-18 02:09:54

  Deep Dive into Spin Locks in Golang

In concurrent programming, a Mutex is a commonly used synchronization mechanism to protect critical resources and prevent data races. However, in certain specific scenarios, especially when the lock-holding time is short and the number of threads is limited, a more lightweight lock known as a Spin Lock can provide higher performance. What is a Spin Lock A Spin Lock is a form of busy-wait lock. When a thread attempts to acquire a lock held by another thread, it continuously checks the lock's stat...

   SPINLOCK,MUTEX,GOLANG     2024-01-10 05:53:28

  Canonicalize XML in Java

XML canonicalization is often used when there is need to create digital signature to be sent to peers for verification. Since digital signature is created based on XML data, the XML data has to be canonicalized before its signature value can be calculated. Even an extra space may affect the signature value calculated, hence it must follow some rules to canonicalize the XML data so that it has a standard format. This is why W3C created specification Canonical XML Version 1.1. This specificat...

   JAVA,XML,JAVA SECURITY     2016-01-20 01:39:45