SEARCH KEYWORD -- Not work
Remove duplicated elements in JavaScript array
During interviews, one frequent question asked would be something like how to remove duplicated elements in a JavaScript array and how many different ways you can think of. The interviewee would also be asked to write the code down. In real applications, normally front end would not need to handle this case since normally it would be done by backend, but still it's necessary for front end developers to know different ways of doing this. This post will share some of the common ways to remove dupl...
JAVASCRIPT,ARRAY,DUPLICATED ELEMENT 2018-09-21 22:32:10
Top 5 Reasons Not to Use Hadoop for Analytics
As a former diehard fan of Hadoop, I LOVED the fact that you can work on up to Petabytes of data. I loved the ability to scale to thousands of nodes to process a large computation job. I loved the ability to store and load data in a very flexible format. In many ways, I loved Hadoop, until I tried to deploy it for analytics. That’s when I became disillusioned with Hadoop (it just "ain't all that"). At Quantivo, we’ve explored many ways to deploy H...
Cloud computing,Hadoop,Analytics 2012-04-17 13:43:26
A simple example of git bisect command
git bisect is a very powerful command for finding out which commit is a bad commit when bug occurs. The rationale behind this command is that it pin locates the bad commit by divide and conquer. It divides the commit history into two equal parts, then determines whether the bad commit is at the first half or at the other half. This process will continue until the bad commit is located. Here is a really good example created by bradleyboy, this is a simple git repository which demonstr...
GITHUB,GIT,GIT BISECT 2019-07-12 10:31:51
How to secure an Ubuntu Apache web server
Securing server software is not a straightforward task. Not all of our operating environments are the same, leading to a variety of potential security vulnerabilities. However, using a few basic configuration and security options, you can stay a little ahead of where you want to be. 1. Fail2ban Fail2ban is a Python-based intrusion prevention software that detects and blocks malicious IP addresses from multiple unsuccessful attempts at software logins. In other words, if someone is attempt...
Unix server security,Log,.htaccess,Cache 2011-12-27 09:25:32
Static Code Analysis
The most important thing I have done as a programmer in recent years is to aggressively pursue static code analysis. Even more valuable than the hundreds of serious bugs I have prevented with it is the change in mindset about the way I view software reliability and code quality.It is important to say right up front that quality isn’t everything, and acknowledging it isn’t some sort of moral failing. Value is what you are trying to produce, and quality is only one a...
Static code,Analysis,Quality,Microsoft 360,Value 2011-12-24 06:50:18
What else is new in C# 5?
The big new feature in C# 5 is asynchronous programming support, which I wrote about last week. However, the C# folks have also slipped in a couple of smaller features and I thought I’d round things out by mentioning those. Method caller information There’s a complete style guide to be written on Writing Enterprisey Code, but one of my favourite “enterprisey†tells, after the use of Visual Basic, is obsessively logging every function you pass through: Function Ad...
C# 5,New feature,Analysis 2012-03-20 07:45:11
Top Digital Transformation Trends To Lookout For in 2018
While Innovation was rife in 2017, it is expected that 2018 will bring the cherry on the cake. While businesses are shifting continually towards making things work with Technology in view, organizations have had to embrace the Tech wave for good. A paradigm change in the way businesses operate is the consequence of the trends in Digital Transformation. From Artificial Intelligence to Blockchain, to Machine Learning, to Data Analytics, 2017 saw the onset and the growth of numerous new Technologie...
CUSTOM SOFTWARE SOLUTIONS,SOFTWARE DEVELOPMENT,OFFSHORE SOFTWARE DEVELOPMENT,OUTSOURCING SOFTWARE DE 2018-01-10 00:37:38
Wow: Intel unveils 1 teraflop chip with 50-plus cores
I thought the prospect of quad-core tablet computers was exciting.Then I saw Intel's latest -- a 1 teraflop chip, with more than 50 cores, that Intel unveiled today, running it on a test machine at the SC11 supercomputing conference in Seattle.That means my kids may take a teraflop laptop to college -- if their grades don't suffer too much having access to 50-core video game consoles.It wasn't that long ago that Intel was boasting about the first supercomputer with sustained 1 teraflop performan...
Intel,Chip,Multi-core,teraflop 2011-11-16 08:15:39
Want to Expand Your Customer Base Globally? A Global Phone Number Is Your First Step
If you want your establishment to connect to the world, you’re in luck. Thanks to technology development, it’s much easier to do this now more than ever. But with this global expansion, you should have a few assets to help you with your success. To maintain your business reachability no matter where your customer is, you can start with a global phone number provided by companies like Telnum. If you’re not sure if it’s the right move, we’ll help you decide whether i...
Why I Hate Android
Why do I hate Android? It’s definitely one of the questions I get asked most often these days. And most of those that don’t ask probably assume it’s because I’m an iPhone guy. People see negative take after negative take about the operating system and label me as “unreasonable†or “biased†or worse. I should probably explain. Believe it or not, I actually don’t hate Android. That is to say, I don’t hate the concept of Androi...
RECENT
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- more>>