SEARCH KEYWORD -- UNDO CHANGE
4 types of programmers
Not every one who writes code is a programmer. Programmers are people who live with programming. There are 4 types of programmers: scientist, coder, expert and artisan.Scientist, they are more like mathematicians rather than programmers. They invented various theories, algorithms and terminologies. Proofs and calculations in textbooks are all from these people. Moreover other programmers more or less benefit from their work. Sometimes one paper published by them can change the way of thinking of...
Programmer,Coder,Expert 2013-07-13 09:19:03
JavaScript efficiency catch up
JavaScript is a very flexible language, we can write JavaScript code freely with various styles, different kinds of codes will have different execution efficiency. Here we summarize some tips we get from our development. Efficiency of JavaScript itself JavaScript has execution context chain, closures, prototype inheritance, eval etc. It brings us some magic features, but it also introduces the performance issue, if we don't use them properly, it will affect the codes execution efficiency. 1. Glo...
JavaScript,efficiency,event delegation,eval 2013-04-02 04:08:46
HTML Email Guide
Many of us may subscribe to some newsletters to get update about their site or information about a topic such as JavaScript Weekly, we may receive an email every week or every month to know what's happening there. The email we receive is just a simple HTML page but with an Email format called HTML Email. It seems it's simple to write this kind of HTML Email. But the thing is it's not so easy. It takes much effort by just designing an Email template. Whether the HTML Email can be displayed norm...
HTML Email,Guide 2013-06-16 03:38:36
Difference between Beijing and Silicon Valley on innovation
The fundamental difference between Beijing and Silicon Valley is not the sky color, but the fact that on one side the young people are talking about buying a new house, a new car and getting married, while on the other side young people are talking about how to change the world. Now and then we can read from the newspaper or the Internet that a Silicon Valley company is valued over 1 billion US dollars. Also we can see many famous US IT brands on the Internet such as Google, Facebook,Twitter, Am...
China,Silicon Valley,Innovation, Comparison 2013-06-24 03:09:54
<=> operator in MySQL
Have you ever seen "<=>" in a SQL query while using MySQL? Does it mean less and equals to and greater than? Actually if you consider it as the union of <= and =>, great, you are close to it. This is one form of equal operator in MySQL, it has the similar meaning to the = operator with some subtle difference. According to MySQL documentation, <=> is NULL-safe equal. This operator performs an equality comparison like the = operator, but returns 1 rather than NULL if both operand...
Understanding Twitter Bootstrap 3
On 27, July, Twitter Bootstrap 3 RC 1 was released, if there are no major bugs found in this release, then it will be the final released Twitter Bootstrap 3 with some minor changes. What changes does Bootstrap 3 have compared to Bootstrap 2? After checking the documents, we can find that there are mainly 3 changes. Embrace flat design In Bootstrap 3, it begins to embrace flat design. First from the official webpage of Bootstrap 3, we can find elements are flat designed. Also, all buttons have no...
Bootstrap 3,Change,Bootstrap 2 2013-08-05 07:06:22
3 preconditions for Facebook to enter China
It's well known that Mark Zuckerberg has a big interest in the Chinese market. Recently, the founder of Facebook visited China to attend a development forum held by the Chinese government. Along with the trip, he also paid a trip to some famous places in Beijing such as The Great Wall. He even did a morning run in front of the Tian'an men Square, the symbol of China. In past few years, Zuckerberg also learned Chinese and read Chinese books, showed his love to the Chinese culture....
FACEBOOK,CHINA,MARK ZUCKERBERG 2016-03-25 01:32:51
How can you test if your VPN is working properly?
Installing a VPN on your device is one of the essential steps you need to take in order to have a safe and pleasant online experience. It good functioning is in your best interest and this is why you need to make sure that your VPN is working properly. Unfortunately, a lot of problems can occur if it turns out that your VPN is not up to the task and that it has some leaks. Can a leak really occur? To answer you most directly – Yes! Yes, it can! Unfortunately, no system is perfect an...
VPN 2020-09-17 06:53:19
Deep Dive into Spin Locks in Golang
In concurrent programming, a Mutex is a commonly used synchronization mechanism to protect critical resources and prevent data races. However, in certain specific scenarios, especially when the lock-holding time is short and the number of threads is limited, a more lightweight lock known as a Spin Lock can provide higher performance. What is a Spin Lock A Spin Lock is a form of busy-wait lock. When a thread attempts to acquire a lock held by another thread, it continuously checks the lock's stat...
Tencent CEO : Mobile social gaming will be the profit breakthrough point of WeChat
Tencent CEO Ma Huateng said mobile social gaming would be one of the biggest light spot and also the profit profit breakthrough point of WeChat.Mr. Ma thinks that the principle of public accounts of WeChat is very simple, In the early period of QQ, users could also send messages and feedback, the reason why WeChat is so charming is because the phone has audio and video capabilities, this is very different from the text on the PC. Public account service providers can send voice passages to users ...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>