SEARCH KEYWORD -- HTTP



  4 types of programmers

Not every one who writes code is a programmer. Programmers are people who live with programming. There are 4 types of programmers: scientist, coder, expert and artisan.Scientist, they are more like mathematicians rather than programmers. They invented various theories, algorithms and terminologies. Proofs and calculations in textbooks are all from these people. Moreover other programmers more or less benefit from their work. Sometimes one paper published by them can change the way of thinking of...

   Programmer,Coder,Expert     2013-07-13 09:19:03

  The biggest change ever of iOS--iOS 7

In this year's WWDC, Apple unveils its new iOS--iOS 7. The new iOS has the most significant change since it first came to the public. But many people may be disappointed about this. I am not one of them. In WWDC, Tim Cook said iOS 7 is more flatter than before and it has a completely new user interface design, new slide to unlock feature, official share and weather apps are redesigned. The weather apple now has almost the same feature as the newly updated Yahoo weather application. Ive said the...

   iOS 7,new design,Apple     2013-06-10 22:39:45

  XMLHttpRequest Level 2 user guide

XMLHttpRequest is a web browser interface, it makes it possible for JavaScript doing HTTP(s) communication. Microsoft's IE5 first introduced XMLHttpRequest, because it's so useful that many other browsers also adopted this. AJAX came to the front since. However, this interface is not standardized, implementation among different browsers is different, with the emerging of HTML5, W3C is considering to standardize this interface. In February 2008, they proposed a XMLHttpRequest Level 2 draft. This ...

   XMLHttpRequest, progress, upload, binary data     2012-09-19 11:51:50

  Foursquare : 20 million users and 2 billion check-ins

Yesterday was the Foursquare third annual 4sqDay celebration (Four - squared open four square, ie April 16), this mobile phone service site which is based on user location information confirmed that their users reached 20 million and there were two billion check-ins.Foursquare was founded in 2009 and it is a mobile phone service website based on the user location information .It encourages mobile phone users to share their current geographic location and other information with others. In co...

   Fpoursquare,Check-in,4sqDay     2012-04-17 13:39:14

  4 asynchronous programming methods in JavaScript

You may know the execution environment of JavaScript is single threaded. The so called single thread means only one task can be running at any time, if there are many tasks, they need to be in a queue and wait for the previous task to be completed. The advantage of this mode is it's easy to implement and the execution environment is relative simple; the disadvantage is that if one task takes long time, the tasks following it must wait in the queue and this will delay other tasks consequently. Th...

   JAVASCRIPT,ASYNCHRONOUS PROGRAMMING, EVENT MODEL,PROMISE     2012-12-25 00:55:47

  Remote form submission

Remote form submission is way of submitting HTML forms from local to a particular remote server. This is used by many advertisers, spammers or even hackers to submit bad data to other websites in order to get what they want. They can write some automation scripts to help them do spamming. How can people do remote form submission and how to prevent this kind of attacks? Since a website can be accessed by almost every one, so one can save a local copy of a HTML form of a website through File->S...

   PHP,Security,Remote form submission     2013-07-14 01:04:49

  Binary tree iterator algorithm

Binary tree pre-order,in-order and post-order traversal are basics in algorithm and data structure.And the recursive binary tree traversal is a classical application of recursion. We define a binary tree node as : // C++ struct Node { int value; Node *left; Node *right; } In order binary tree traversal can be: // C++ void inorder_traverse(Node *node) { if (NULL != node->left) { inorder_traverse(node->left); } do_something(node); if (NULL != node->righ...

   Binary tree,Iterator,Traversal     2013-07-14 21:51:09

  How to fire an employee who is not good enough?

It's always a tough decision to make to fire an employee. No matter he/she performs how bad, it's hard for the boss to say one person is fired. How to fire an employee who is not good enough? On Quora, there is one such question asked and we think one answer is very attractive and useful. The answer is given by Michael O. Church who is a New York functional programmer. The best employees are multipliers who make others more productive, and next are the adders (workhorses). Subtracters are the g...

   Fire,Career,Talent     2012-09-13 20:04:34

  Mount DD image on Linux

Yesterday, my Raspberry Pi running Arch Linux was not able to boot with error: Kernel Panic, not syncing: no init found. I spent a night on it, but could not find a working solution. The last option is easy: reinstall the system. That is really the last resort, for I do not want to re-setup everything I have done: samba server, Time Machine server, Xunlei Offline Downloader… Unable to mount the SD card The system does not boot, so I need to find a way to get into the file system to identi...

   LINUX,DD IMAGE     2014-06-24 07:49:14

  Twitter prosecuted five companies

Recently Twitter sought help from law enforcement agencies because they can not stand spam emails. On Thursday, Twitter prosecuted five separate companies which provide tools so that spam on Twitter can be spread easier.Twitter said in a statement, Twitter now has 140 million active users, and the number of users are still increasing quickly, as Twitter continues to grow, spam also began looking to come to. Although the content of the spam on Twitter is not the proportion, it still gave rise to ...

   Twitter,Spam,Prosecution     2012-04-06 01:58:37