SEARCH KEYWORD -- Magento development service



  Supercolliding a PHP array

Did you know that inserting 2^16 = 65536 specially crafted values into a normal PHP array can take 30 seconds? Normally this would take only 0.01 seconds. This is the code to reproduce it: <?php echo '<pre>'; $size = pow(2, 16); // 16 is just an example, could also be 15 or 17 $startTime = microtime(true); $array = array(); for ($key = 0, $maxKey = ($size - 1) * $size; $key <= $maxKey; $key += $size) { $array[$key] = 0; } $endTime = microtime(true); echo 'Inserting...

   PHP,Array,hashtable,Slow,Colliding     2011-12-29 09:02:01

  Removing duplicates in sql

In modern web development, it’s standard practice to make use of a database abstraction layer, typically an Object-Relational Mapper based on either the Active Record pattern or the Data Mapper pattern. There are several pros and cons to this which are fairly well established, so I’ll spare us all from enumerating them all right now. One established pro worth mentioning is that these systems typically provide a high level interface for fetching data, often removing the need to ...

   SQL,Duplicate,Remove,Web design     2012-01-05 08:20:13

  How to monitor user behavior in webpage

Sometimes there is a need for website owners to monitor user behavior on the site so that they can know what pages are mostly visited and which parts are more popular so that they can provide better service to their users. These behavior usually contain user clicks, user mouse over events etc. These data can be sent back to server when triggered with some meta data. In this post, we will cover a few ways to monitor user behavior on a web portal and send data back to backend sever. 1. Synchronous...

   HTML,BEACON API,PING,USER BEHAVIOR     2019-06-29 06:06:59

  Performance comparison of string concatenation in Go language

In Go language, string concatenation is an inevitable operation during development, and efficient string concatenation is crucial for improving application performance. This article will delve into several common ways of string concatenation, provide performance comparisons, and offer optimization suggestions aimed at helping developers write more efficient code. Common ways of string concatenation In Go language, common ways of string concatenation include the following: Using the + operator fo...

   COMPARISON,PERFORMANCE,STRING CONCATENATION     2024-05-13 00:33:20

  The Long Grind Before You Become an Overnight Success

“So, what do you do?”Ugh. I hated that question.The truth was that we were trying to start a new venture but we hadn’t really made any progress.But, instead of just muttering something, I would force myself to enthusiastically pitch our current struggling idea. They would nod along but the skepticism on their face was hard to ignore.And, when I was done, they would sometimes hit me with: “So, is that your full-time thing?” Ugh. What that really meant was: youâ€...

   Startup,process,Waiting,Hardtime,Working     2011-09-29 10:42:54

  Microsoft forms a new subsidiary focused on open source called Microsoft Open Technologies

Microsoft once again changes its attitude and intends to set up an open technology subsidiaries in order to promote the formulation of open-source projects and standards.The new company name is Microsoft Open Technologies and Jean Paoli, Microsoft executives will be the president of the new company. The company will also form interoperability strategy team in the future. The newly established company will have about 50-75 employees.Over the years, Microsoft has been considered to be the rival of...

   Microsft,Open source,Microsoft Open Technologies     2012-04-13 06:10:45

  4 ways to obtain access token in OAuth 2.0

OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...

   OAUTH2,ACCESS TOKEN,REFRESH TOKEN     2019-06-29 07:12:03

  Disgusting programming language list

To avoid arguments among different programming languages, this ranking only covers the opinions from programmers with multi-language experience. Also it doesn't mean the language is not good if the language is on the list, it just means those developers don't like some features of the language. Below ranking is summarized from Quora、Stack Overflow and Hacker News. 10. Python Reason : It uses code indent to define block level scope, why not use curly braces? It also uses massive colons and ...

   Programming language rank     2013-09-27 09:53:39

  Fix WampServer offline issue

WampServer is a web server on Windows which provides easy to use features for PHP developers. You can easily setup a web server by installing WampSserver without much hard to understand configurations. After installing it and with a simple configuration, you just need to double click it and start all services and your server is gonna up.  If the server starts up normally, you will see a green icon which indicates the working status at the taskbar. But if you don't see the green icon shown u...

   APACHE,PHP,WAMPSERVER     2015-09-13 01:59:38

  Is Java the platform of the future?

I've mentioned before, but I think we are living in a period of time where a bigger explosion of programming languages is occurring than at any time in the past four decades. Having lived through a number of the classic languages such as BASIC, Simula, Pascal, Lisp, Prolog, C, C++ and Java, I can understand why people are fascinated with developing new ones: whether it's compiled versus interpreted, procedural versus functional, languages optimised for web development or embedded devices,...

   Java,Platform,Future     2012-04-03 12:59:52