SEARCH KEYWORD -- customer relationship management services



  Why I Won’t Hire You

I will be very honest with you in this post. Most interview articles only show obvious mistakes, as if most people don’t know showing up late is bad form. I will tell you the things I didn’t really know about until I was the one interviewing, and interviewing for a variety of positions and person-types. No interview prep article ever prepared me in the right way for how interviewers really think. That is what I will be sharing with you today. When you first walk in...

   Career,Hire,Preparartion,CV,Resume     2012-01-11 04:38:19

  JSON unmarshal in GoLang

In almost all mainstream programming languages, there is either built-in or third-party library to support parse JSON data because it is so popular for organizing and transferring data among different services. In GoLang, the built in json package also provides functions for marshalling and unmarshalling JSON data. Marshalling GoLang struct to a JSON string is relatively simple, just need to call json.Marshal(), it's a bit complicated to unmarshal an arbitrary JSON string into a GoLang struct ob...

   GOLANG,JSON,UNMARSHAL,EMPTY INTERFACE     2019-11-09 21:57:30

  Set up Superset on ubuntu 16.04 LTS

Apache Superset (incubating) is a modern, enterprise-ready business intelligence web application. Compared with business-focused BI tool like Tableau, superset is more technology-navy. It supports more types of visualization and able to work in distributed manner to boost the query performance. Most importantly, it is free of charge! An example dashboard: Let’s go and set it up. Create a virtualenv Assume Anaconda is installed for python management. # create a virtualenv with python 3.6 co...

   TUTORIAL,UBUNTU,SUPERSET     2019-10-19 21:34:55

  Email Modular Design – An Overview

Email is one of the most prevalent forms of business communication. Businesses all over the world send hundreds of email every day to communicate with their customers in a personalized, intimate way, providing useful information, special offers, records of business transactions, official news or messages and much more. Right from one or two-man projects to large Fortune 500 companies, every business entity uses emails on a daily basis to stay in touch with their base of customers. As a company g...

   email     2014-08-14 08:22:03

  Difference Engine: Luddite legacy

AN APOCRYPHAL tale is told about Henry Ford II showing Walter Reuther, the veteran leader of the United Automobile Workers, around a newly automated car plant. “Walter, how are you going to get those robots to pay your union dues,” gibed the boss of Ford Motor Company. Without skipping a beat, Reuther replied, “Henry, how are you going to get them to buy your cars?”Whether the exchange was true or not is irrelevant. The point was that any increase in productivity required...

   Artificial intelligence,Engine,Difference,Human,Computer     2011-11-07 08:33:16

  10 modern technologies we will still use in 2030

Although there is rapid revolution for new technology, some technologies can survive with the passage of time. Here are 10 modern technologies which may continue to exist in 2030. 1. QWERTY keyboard Speech recognition, handwriting recognition and gesture control input will become the trend for the next two decades. Nonetheless QWERTY keyboard input is still one of the most accurate way - although not necessarily the most convenient. Although physical keyboard disappear on phones and tablet PCs, ...

   New technology,Trend     2012-11-12 11:02:02

  Introduction to OAuth (in Plain English)

Last week we talked about giving away your passwords and how you should never do it.  When a website wants to use the services of another—such as Bitly posting to your Twitter stream—instead of asking you to share your password, they should use OAuth instead. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password. This is a quick guide to illustrate, as simply as possibl...

   Security,OAuth,Permission,Partial access     2012-04-05 11:39:54

  A Solution to CPU-intensive Tasks in IO Loops

Back in October 2011, Ted Dziuba infamously said that Node.js is Cancer.  A provocative title to a provocative article.  The only thing it didn’t really provoke in the commentary was much thought ;)  Zing. My interpretation of the article is that Ted holds up the classic blocking-IO process-per-request (or  thread per request; same difference) model as superior.  Yet we all remember where the blocking-IO forking model got Apache in the early days.  ...

   CPU,Intensive IO loops,Solution,C++     2012-02-06 07:42:40

  What I learned from a month of blogging and 250k visits

Roughly a month ago, I decided to give blogging another try, in earnest. I put out an article most days and up to 3 per day when I was experimenting with new channels.It has been fascinating.That being said, this is not a post about blogging tactics. It’s about what the experience has taught me about startups.Find the customers first, then build for themIt took me a long time to understand YC’s motto that you should:Make something people want.The first time I heard that, ...

   SEO,Promote,Website,Advice,Traffic     2011-11-10 10:58:40

  Vim: revisited

I’ve had an off/on relationship with Vim for the past many years. Before, I never felt like we understood each other properly. Vim is almost useless without plugins and some essential settings in .vimrc, but fiddling with all the knobs and installing all the plugins that I thought I needed was a process that in the end stretched out from few hours to weeks, months even; and it the end it just caused frustration instead of making me a happier coder. Recently, I decided to give Vim ano...

   Linux,Editor,Vim,Setup,Quick guideline     2011-12-12 07:55:27