SEARCH KEYWORD -- GOOGLE API
Social network website homepage design analysis
This article is to discuss outstanding design principles to enhance the social networking site registration conversion rate by comparative analysis of the social web site home page .In general, the user registration conversion process generally consists of the following components: Attractive home page contents. Simple and fast registration process. The effectiveness of friends search and invite mechanisms. User ...
Social netwrok,Homepage design,Analysis 2012-04-16 14:27:06
Scala feels like EJB 2, and other thoughts
At Devoxx last week I used the phrase "Scala feels like EJB 2 to me". What was on my mind?ScalaFor a number of years on this blog I've been mentioning a desire to write a post about Scala. Writing such a post is not easy, because anyone who has been paying attention to anti-Scala blog posts will know that writing one is a sure fire way of getting flamed. The Scala community is not tolerant of dissent.But ultimately, I felt that it was important for me to speak out and express my opinions. As I s...
Scala,Module,EJB,Concurrency,Feature 2011-11-22 08:29:44
What is Deep Web- all you need to know about it?
Deep web is the most nefarious out of sight underground area that exists and not accessible to the public domain. The deep web sites cannot be accessed through standard search engines. Many experts believe to have compared this part of the internet hidden from paywalls and forms. The truth is that deep web is a hidden iceberg while the usual internet available to the public domain is just the tip of the iceberg. That part of what is available from search engines such as Bing or Google ...
Hacking Vs. Programming
What is the difference between Hacking and programming? One opinion I have heard expressed is that a hacker can put a lot of code together in a hurry but if a change is needed the code has to be completely rewritten. A programmer may take a little longer but if changes are needed they are more quickly and easily installed without the need for a complete rewrite. One source I heard attributed an observation like this to Maggie Johnson of Google. It rings true to me though. Hacking is usual...
Hacking,Programming,Coding style 2012-04-23 06:09:24
TIOBE : Where is that next big programming language?
TIOBE has released the Programming Community Index for May 2012 a bit late. The top 3 languages do not change compared to last Month TIOBE : C overtakes Java as the No.1 programming language, they are still C,Java and C++. However, the share of Java is continuing dropping, Objective-C is steadily rising Other languages which have rising trend are Visual Basic.NET,PL/SQL and Logo.The last 8 years not much has changed in the top 10 of the TIOBE index except for Objective-C (in) and Del...
A Baseline for Front-End Developers
I wrote a README the other day for a project that I’m hoping other developers will look at and learn from, and as I was writing it, I realized that it was the sort of thing that might have intimidated the hell out of me a couple of years ago, what with its casual mentions of Node, npm, Homebrew, git, tests, and development and production builds. Once upon a time, editing files, testing them locally (as best as we could, anyway), and then FTPing them to the server was the essential ...
Front-end,JavaScript,Baseline 2012-04-18 07:13:49
Python Patterns - An Optimization Anecdote
The other day, a friend asked me a seemingly simple question: what's the best way to convert a list of integers into a string, presuming that the integers are ASCII values. For instance, the list [97, 98, 99] should be converted to the string 'abc'. Let's assume we want to write a function to do this. The first version I came up with was totally straightforward: def f1(list): string = "" for item in list: string = string + chr(item) return string ...
Python,Optimization,Anecdote,Loopup,ASCII 2011-12-18 10:52:49
Today on history : Twitter cofounder Evan Williams was born
Evan Williams, born March 31, 1972. American entrepreneurs, has created a number of Internet companies, including Pyra Labs, (operational blog, Blogger) and Twitter. He was Twitter, CEO from October 2008 to October 2010. Twitter former CEO Evan WilliamsEvan Williams grew up on a farm in Nebraska Clark Village. At the University of Nebraska, he studied a year and a half, then he started to work. He did different technologies work in some tech start-ups in Key West, Dallas, Austin, Texas. In 1996...
Twitter,Cofounder,Evan Williams,Introduction 2012-03-31 08:49:18
Efficiency of code execution
If you want to optimize your program codes, you need to find their Hotspot, i.e, the codes which are executed most frequently. If you can optimize this portion of codes a bit, you may gain much improvement of your code efficiency. Here I give you three examples about efficiency of code execution.1. PHP's Getter and Setter (From Reddit)This example a quite simple, you can skip it if you want.Consider the code below, we can find it's slower when we use Getter/Setter method to read a member variabl...
Code, Efficiency,Analysis,Trick 2012-07-13 10:59:21
Esmerelda's Imagination
An actress acquaintance of mine—let's call her Esmerelda—once said, "I can't imagine being anything except an actress." To which the retort was given, "You can't be much of an actress then, can you?"I was reminded of this exchange when someone said to me about Go, "I can't imagine programming in a language that doesn't have generics." My retort, unspoken this time, was, "You can't be much of a programmer, then, can you?"This is not an essay about generics (which are a fine...
Programmer,Go,Immagination,Complaint 2011-12-31 23:38:13
RECENT
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- more>>