SEARCH KEYWORD -- SOURCE CODE
20 cool jQuery countdown scripts and plugins
Have you ever seen the count down component of Apple before its app downloads reached 50 billion times? It's really cool. On a website, we often need to have a count down function, for example, when a e-commerce site initiates some promotions or some organizations want to start an event. In this post, we introduce some cool jQuery countdown scripts and plugins. Circular Countdown jQuery Plugin MORE INFO / DEMO Coconut – Jquery Countdown Plugin - MORE INFO / DEMO ...
Sending message to Slack Incoming Webhook using PHP
Slack is a popular work collaboration tool and it provides many features which help teams collaborate. It has one function which allows sending messages to channels from external source such as your own web service -- Incoming Webhook. This is extremely useful when want to monitor something and get notified when some event occurs and it doesn't require complicated setup. To send messages using Incoming Webhook, a service URL has to be generated on Slack and then the message can be posted to this...
PHP,CURL,SLACK,INCOMING WEBHOOK 2017-03-11 21:32:28
Permutation algorithm with JavaScript
In secondary school, we have learned permutation. Basically, for n numbers, the number of permutations for these n numbers can be calculated to n! which is called 'n factorial'. But to display all the permutations on the screen, we need to use a recursive function. The problem is how to write this function. Next I write a program to display the permutations for n numbers with JavaScript. First, we need to understand that from these n numbers, we can first take any one number from it, and t...
JavaScript,Permutation,Algorithm,Impleme 2011-09-21 12:02:35
A JS1K competition demo for 2012
JS1K is a website which hosts some competitions to attract geeks from the world to create JS apps which are less than 1K (1024 bytes). The object of this competition is to create a cool JavaScript "application" no larger than 1k. Starting out as a joke, the first version ended with a serious amount of submissions, prizes and quality.Recently, I revised a previous project of mine and compressed it to 1018 bytes and submitted it. It is an analog clock. The code is shown below:w=c.width;h=c...
JS1K,HTML5,Competition,Analog clock,Love 2012-03-13 12:17:40
A tour to Tumblr's office
This week Yahoo has made a deal with Tumblr that Yahoo would acquire Tumblr with $1.1 billion. The reason why Yahoo wants to acquire Tumblr is still not so clear. It may be because they don't want to miss the chance again after they missed the chance to acquire Facebook. But anyway, let's take a tour to the office environment of Tumblr. The big logo after entering the door. The office building in Tumblr has two floors. Most people are working on the first floor. Cute decorations Technical t...
SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
This article will introduce the Data Transmission Latency Log Analysis Dashboard developed for SIEM big data analytics. This is part of the SIEM big data visualization project, if you are interested about other dashboard plug in, you can check below links: SIEM Big Data Visualization [01] : Dashboard for Monitoring Scam Events in Critical Infrastructure SIEM Big Data Visualization [02] : Dashboard for Summarizing SG National Cyber Threats in Critical Infrastructure SIEM Big Data Visualization [...
Algorithm : Delete middle node from singly linked list
Questions about singly linked list are frequently asked during technical interviews. Today we will share with you one algorithm question about singly linked list. Here is the problem description. Assuming the only information you are giving is there is a pointer to a middle node of a singly linked list, no other information about the linked list is given. Please delete this node and don't affect the structure of the linked list. Initially you may think this question is easy if you know the hea...
ALGORITHM,C,LINKED LIST 2015-10-30 05:21:25
CASSANDRA data model
Cassandra is an open source distributed database, it combines dynamic key/value and column oriented feature of Bigtable. Features of Cassandra are: Flexible schema, no need to design schema first, it's very convenient to add or delete strings Support range search on keys High usability, extensible. The single node error will not affect the cluster. We can think Cassandra's data model as a 4 or 5 dimensional Hash. COLUMN Columns is the smallest data unit in Cassandra, it is a 3 dimensional data...
Tencent released Q1 earning report of 2013
Tencent has released the earnings report of Q1 in 2013, the total revenue is $2.1611 billion which increases 11.5% compared to last quarter and increases 40.4% compared to the same time last year. The profit is 649.4 million US dollars which increases 17.3% compared to last quarter and increases 37.4% compared last year.The three main profit generators are:1. Value-added services revenue of 1.7014 billion US dollars with an increase of 13.6% compared to last quarter and an increase o...
Tencent,Earnings report,WeChat 2013-05-15 07:02:45
What happens on the Internet in one minute?
In one minute, 216,000 images are shared on Instagram, $83,000 sales happen on Amazon, 1.8 million Likes are clicked on Facebook, also 72 hours videos are uploaded to YouTube. This image is from Omee and it shows us what happens on the Internet in one minute. For example, how many Tweets are posted, how many pictures are viewed, how many minutes communication through Skype. The data on the graph is from PC Mag, Business Insider and other websites. In one minute, 2 million searches on Google, 70...
Infographic,60 seconds,Internet 2013-08-01 06:47:51
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>