SEARCH KEYWORD -- WIKIPEDIA
TIOBE : Objective-C overtakes C++
TIOBE recently released the programming community index for July. From the index,we can find that the biggest change is that Objective-C overtakes C++ as the 3rd most popular language among programmers. Because of the popularity of iPhone and iPad, Objective-C is used by more and more mobile developers who want to develop apps for Apple products. Also, many developers are willing to develop apps for Apple since they can gain more profit on Apple platform than on Android platform.C++ is mainly us...
TIOBE,July,C++,Objective-C,overtake 2012-07-05 22:49:49
TIOBE : C overtakes Java as the No.1 programming language
TIOBE has released the Programming Community Index for April 2012. The highlight of this month is that C overtakes Java as the No.1 programming language again. C language is liked by more and more developers of all ages. Due to the growing popularity of the Android platform, Java decline will not be obvious. Previously Java took a very long time to overtake C, now C once again returns to the throne. The battle between these two languages will continue.The top three are respectively, C, Jav...
Do you really understand Geolocation?
LBS(Location based service) services continue to emerge, it seems that every product has some relationship with maps. But to be honest, do you really understand what is Geolocation? Not necessarily. Although lots of products have LBS service, they can be categorized as sign, search, navigation and information display, these are functional features of the map as a software should have. However, Geolocation is not software, it is just a functional feature, a functional feature of all LBS applicat...
geolocation,app,significance 2012-10-22 12:11:41
Permutation implementation in Java
Permutation is a very basic and important mathematic concept we learned in school. It has very practical applications in real world. For example, in football. In simple, permutation describes all possible ways of doing something. For example, there are six permutations of the set {1,2,3}, namely: (1,2,3), (1,3,2), (2,1,3), (2,3,1), (3,1,2), and (3,2,1). In general, for n items, there are n! number of permutations to arrange these items. How can we implement this algorithm in programming programm...
Permutation,Implementation,Java,Sample 2015-03-26 02:18:14
Using public key authentication in SSH
SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc. To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...
LINUX,DEBUG,SSH,PUBLIC KEY 2016-09-10 05:55:46
What is cache penetration, cache breakdown and cache avalanche?
When designing and developing highly available system, cache is an very important consideration. It is useful to cache some frequently accessed data so that they can be accessed quickly and also cache can protect the downstream system like DB from being hit too often. To provide better cache design in large systems, some problems may need to be considered first. In this post, we will talk about some frequently discussed cache problems and mitigation plans. Cache penetration Cache penetrati...
SYSTEM DESIGN,CACHE PENETRATION,CACHE BREAKDOWN,CACHE AVALANCHE 2020-04-10 08:43:00
Be cautious before deciding to use ReactJS in your product
ReactJS is an open source JavaScript library used for writing user interfaces. It revamps the way developers write web applications. More and more front end developers start to use this Facebook crafted library in their products or projects nowadays. However, although ReactJS is an open source library under BSD license, it doesn't mean there is no risk to freely adopts it in your products. If you are building or plain to build some products which may compete with Facebook or its subsid...
JAVASCRIPT,FACEBOOK,REACTJS,VUE 2016-07-16 20:43:16
Jack Ma : Where are you going during the weekends?
Jack Ma, the Chinese e-commerce giant Alibaba founder and executive chairman, was reported to show up in a night club named Dragon-i in Hong Kong on 17th August night (Beijing Time). It became the headline in China soon after this news was reported as many people thought it was quite unusual that a successful and super rich business man like him would show up in night clubs. Jack Ma explained on his Weibo(China's Twitter) on this and he posted a question to people as well which ...
Alibaba, Jack Ma, Night club, Bar, Hong Kong 2015-08-23 02:42:59
How deep should unit test go?
There is a question on Stackoverflow which says "How deep are your unit tests?". It is asked by a guy named John Nolan. The question is not too new, but what catches me is the Best Answer given by Kent Beck, who is the creator of Extreme programming(XP) and Test Driven Development(TDD). Let's look at the question first. The thing I've found about TDD is that its takes time to get your tests set up and being naturally lazy I always want to write as little code as possible. The first thing I seem ...
How does GoLang know how many CPUs to use?
When running lscpu command on Linux, it will list the CPU info on the machine. Take one example where there is one CPU with 2 cores and each core has two threads which indicates there are 4 cores available. Now let's see how many cores GoLang program would identify. From output, NumCPU and GOMAXPROCS both output 4 which is expected. How does go runtime get this info, does it get it through similar command like lscpu or /proc/cpuinfo? Let's dig more in GoLang's source code. In runtim...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>