Skip to main content

Home/ Coders/ Group items tagged coding computing

Rss Feed Group items tagged

fspore

Values, Types, and Operators :: Eloquent JavaScript - 0 views

  • Not all operators are symbols. Some are written as words. One example is the typeof operator, which produces a string value naming the type of the value you give it.
  • Having such numbers is useful for storing strings inside a computer because it makes it possible to represent them as a sequence of numbers. When comparing strings, JavaScript goes over them from left to right, comparing the numeric codes of the characters one by one.
  • There is only one value in JavaScript that is not equal to itself, and that is NaN, which stands for “not a number”.
  • ...16 more annotations...
  • In practice, you can usually get by with knowing that of the operators we have seen so far, || has the lowest precedence, then comes &&, then the comparison operators (>, ==, and so on), and then the rest. This order has been chosen such that, in typical expressions like the following one, as few parentheses as possible are necessary:
  • The difference in meaning between undefined and null is an accident of JavaScript’s design, and it doesn’t matter most of the time. In the cases where you actually have to concern yourself with these values, I recommend treating them as interchangeable (more on that in a moment).
  • . Yet in the third expression, + tries string concatenation before numeric addition
  • When something that doesn’t map to a number in an obvious way (such as "five" or undefined) is converted to a number, the value NaN is produced.
  • Further arithmetic operations on NaN keep producing NaN, so if you find yourself getting one of those in an unexpected place, look for accidental type conversions.
  • g ==, the outcome is easy to predict: you should get true when both values are the same, except in the case of NaN.
  • But when the types differ, JavaScript uses a complicated and confusing set of rules to determine what to do. In most cases, it just tries to convert one of the values to the other value’s type. However, when null or undefined occurs on either side of the operator, it produces true only if both sides are one of null or undefined.
  • That last piece of behavior is often useful. When you want to test whether a value has a real value instead of null or undefined, you can simply compare it to null with the == (or !=) operator.
  • The rules for converting strings and numbers to Boolean values state that 0, NaN, and the empty string ("") count as false, while all the other values count as true.
  • where you do not want any automatic type conversions to happen, there are two extra operators: === and !==. The first tests whether a value is precisely equal to the other, and the second tests whether it is not precisely equal. So "" === false is false as expected.
  • The logical operators && and || handle values of different types in a peculiar way. They will convert the value on their left side to Boolean type in order to decide what to do, but depending on the operator and the result of that conversion, they return either the original left-hand value or the right-hand value.
  • The || operator, for example, will return the value to its left when that can be converted to true and will return the value on its right otherwise. This conversion works as you’d expect for Boolean values and should do something analogous for values of other types.
  • This functionality allows the || operator to be used as a way to fall back on a default value. If you give it an expression that might produce an empty value on the left, the value on the right will be used as a replacement in that case.
  • The && operator works similarly, but the other way around. When the value to its left is something that converts to false, it returns that value, and otherwise it returns the value on its right.
  • Another important property of these two operators is that the expression to their right is evaluated only when necessary. In the case of true || X, no matter what X is—even if it’s an expression that does something terrible—the result will be true, and X is never evaluated. The same goes for false && X, which is false and will ignore X. This is called short-circuit evaluation.
  • - to negate a number
Andrey Karpov

Checking OpenCV with PVS-Studio - 0 views

  •  
    OpenCV is a library of computer vision algorithms, picture processing algorithms, and general-purpose numerical algorithms. The library is written in C/C++ and is free both for academic and commercial use, as it is distributed under the BSD license. The time has come to check this library with the PVS-Studio code analyzer. OpenCV is a large library. It contains more than 2500 optimized algorithms and consists of more than 1 million code lines. Cyclomatic complexity of the most complex function cv::cvtColor() is 415. It is no wonder that we have found quite many errors and questionable fragments in its code. However, the size of the source code taken into account, we may call this library a high quality one.
alex gross

5 Great IDEs to Start Coding in the Cloud | Web.AppStorm - 5 views

  •  
    Cloud computing has started proceeding beyond the hype stage and into the beginning of mainstream adoption. Gartner had included cloud computing in their list of Top 10 Strategic Technologies for 2009. In this roundup, we will review some online Integrated Development Environments (IDEs) which are great examples of cloud programming. These solutions can [nearly] replace your desktop IDEs and code editors.
Fabien Cadet

book: Exercises in programming styles, by Chritina Videira Lopes - 10 views

  •  
    "In the 1940s, the French writer Raymond Queneau wrote a jewel of a book called Exercises in Style, featuring 99 renditions of the exact same story, each written in a different style. The story being fairly trivial and always the same, the book highlights form, rather than content; it illustrates how the decisions we make in telling a story affect the perception of that story. Inspired by Queneau, I decided to embark on the project of writing the exact same computational task in as many styles as I have come across over the years. Exercises in Programming Style (#EPSBook) features 33 renditions of a simple computational task -- counting the frequency of words in a given file. All renditions are written in Python. This book is a companion text for code that is publicly available in Github. Software developers with many years of experience may enjoy revisiting familiar programming styles in the broad context of this book and learning about styles that may not be part of their normal repertoire. This book can be used as a textbook for advanced programming courses in Computer Science and Software Engineering programs. Additional teaching materials, such as lecture slides and implementations of each style in other languages, are also available."
  •  
    indianescorts4 pakistaniescortsdubai escortsdubaiescorts dubaiescorts9 indianescorts90 nightescort uaegirls uaescorts69 uaegirls344 dubai-elite-model uaegirls69 escortsportfolio dubaiescorts50 indianescorts dubaiescorts pakistani escorts in dubai indianescorts dubai kissing escorts fleshandhide flatleather
Fabien Cadet

CodeMirror : In-browser code editing made bearable - 9 views

  •  
    « CodeMirror is a JavaScript library that can be used to create a relatively pleasant editor interface for code-like content ― computer programs, HTML markup, and similar. »
john popu

free ebooks | ebooks free download - ebooksgalaxy - 0 views

  •  
    Computer science is the scientific and practical approach to computation and its applications. Free download computer science eBooks to broaden your knowledge and skills in different programming languages. Our computer science department will keep you up to date regarding latest eBooks, projects, assignments, presentations, notes, lectures etc. of computer science subjects. Time to face your future!
David Corking

Gizmodo - Computing Classic: The 1954 SAGE Protected the US From Invasions That Never C... - 0 views

  • many of the fighters carried nuclear tipped air-to-air missiles, so it would have been a bit of a turkey shoot. Until, that is, all of the EMP from the exploding missiles and bombs rendered SAGE unusable.
  •  
    The design, build, and coding for this 1954 vacuum tube computer system is an utterly remarkable feat.
vikramsjn

Code of Ethics - Association for Computing Machinery - 0 views

  •  
    "Contents & Guidelines 1. General Moral Imperatives. 2. More Specific Professional Responsibilities. 3. Organizational Leadership Imperatives. 4. Compliance with the Code. 5. Acknowledgments."
  •  
    must read for every coder - for his work and career
vikramsjn

Programming Proverbs - Computer Science Teacher - Thoughts and Information from Alfred ... - 0 views

  • Interesting comment about IntelliSense encouraging a bottom-up approach. I think that is true if you start with programming and not with design. What I mean by that is that some people create their design in code rather than working out the full design before starting to code. I think that if you create a design using a top down approach it takes longer to get to the building blocks. that is frustrating to many, especially students, but in the long run results in a much better design. With a complete design in place one does know what the little blocks of code will be at least from the standpoint of names and interfaces. Creating those little blocks early on in the programming is fine as long as the design is complete
  •  
    very good and useful list of properly arranged proverbs
omouse

Software Engineering Code of Ethics and Professional Practice - Association for Computi... - 0 views

  • Approve software only if they have a well-founded belief that it is safe, meets specifications, passes appropriate tests, and does not diminish quality of life, diminish privacy or harm the environment. The ultimate effect of the work should be to the public good.
  • Not knowingly use software that is obtained or retained either illegally or unethically.
  • Ensure proper and achievable goals and objectives for any project on which they work or propose.
  • ...2 more annotations...
  • Ensure adequate testing, debugging, and review of software and related documents on which they work.
  • Ensure adequate documentation, including significant problems discovered and solutions adopted, for any project on which they work.
Fabien Cadet

Twitter to open source Hadoop-like tool - Cloud Computing News, 2011-08-04 by Stacey Hi... - 2 views

  •  
    « Attention webscale aficionados, Twitter says it is planning to open source Storm, its Hadoop-like real-time data processing tool. In a blog post Thursday, the microblogging network said it plans to release the Storm code on Sept. 19 at the Strange Loop event in St. Louis, Mo. »
Joel Bennett

Gibraltar monitors errors and usage so you can build rock solid .NET software - 1 views

  •  
    The bottom line is that with Gibraltar you go from just logging on the user's computer to sending those logs via a web-service (or email), to reporting on errors and usage to graphing usage patterns, performance trends and feature use... Get real insight into what happens when your customers meet your code.
liza cainz

Fast, Reliable and Accurate Microsoft Support XP Tech Service - 1 views

I was amazed that after reformatting my hard drive to switch from Vista to XP, Help Gurus allowed me to use the same code I had already purchased on my new operating system! I held my breath as I t...

support service Desktop computer technical services PC tech

started by liza cainz on 04 Jan 11 no follow-up yet
crackysoft

CopyTrans Crack With Activation Code Latest Version Free Download - 0 views

  •  
    CopyTrans Crack gives you the ability transfer data between Apple devices and Windows computers. Using it, you can easily share files. Share crackysofts with others because sharing is caring.
  •  
    Share crackysofts with others because sharing is caring.
jackmcmahon4

Buy Verified Coinbase Account - 100% USA UK Coinbase - 0 views

  •  
    Buy Verified Coinbase Account Introduction Coinbase is a popular digital currency exchange and wallet service. It allows you to buy, sell and trade Bitcoin (BTC), Ethereum (ETH), Litecoin (LTC) and other digital currencies. Coinbase also provides trading services for several other cryptocurrencies, including Binance Coin (BIB) and ex protocol tokens (ZR). What is Coinbase? Coinbase is a cryptocurrency exchange. Founded in 2012, it's one of the most popular platforms for buying, selling and transferring digital currency. Buy Verified Coinbase Account With over 16 million users worldwide and over $20 billion in transactions processed each year (as of 2019), you can rest assured that your funds are safe with Coinbase. The company also boasts an 18-month history of standing behind its customers' accounts - something many other exchanges don't offer at all! Verified Coinbase Accounts for Sale Verified Coinbase Accounts for Sale Verified Coinbase Accounts are available for purchase. These accounts have been verified by the company, which means that they've passed rigorous checks and have achieved a high level of security. Buy Verified Coinbase Account The account holder can use the wallet to make transactions with other users, but also has access to some extra features such as buying/selling cryptocurrencies and sending money abroad via bank transfer or wire transfer. Why Should You Buy Verified Coinbase Account For Your Business? Buying a verified CoinBase account is actually beneficial for your business in many ways: firstly, it shows potential clients that you're legit; secondly it makes them feel safe when doing business with you; thirdly it protects any funds stored on their platform from hackers who may try stealing information from inside phishing attacks - these people would need several years worth of time spent training criminals just so they could hack into an unsuspecting user's computer system before stealing anything valuable therefrom! Bu
  •  
    Buy Verified Coinbase Account Introduction Coinbase is a popular digital currency exchange and wallet service. It allows you to buy, sell and trade Bitcoin (BTC), Ethereum (ETH), Litecoin (LTC) and other digital currencies. Coinbase also provides trading services for several other cryptocurrencies, including Binance Coin (BIB) and ex protocol tokens (ZR). What is Coinbase? Coinbase is a cryptocurrency exchange. Founded in 2012, it's one of the most popular platforms for buying, selling and transferring digital currency. Buy Verified Coinbase Account With over 16 million users worldwide and over $20 billion in transactions processed each year (as of 2019), you can rest assured that your funds are safe with Coinbase. The company also boasts an 18-month history of standing behind its customers' accounts - something many other exchanges don't offer at all! Verified Coinbase Accounts for Sale Verified Coinbase Accounts for Sale Verified Coinbase Accounts are available for purchase. These accounts have been verified by the company, which means that they've passed rigorous checks and have achieved a high level of security. Buy Verified Coinbase Account The account holder can use the wallet to make transactions with other users, but also has access to some extra features such as buying/selling cryptocurrencies and sending money abroad via bank transfer or wire transfer. Why Should You Buy Verified Coinbase Account For Your Business? Buying a verified CoinBase account is actually beneficial for your business in many ways: firstly, it shows potential clients that you're legit; secondly it makes them feel safe when doing business with you; thirdly it protects any funds stored on their platform from hackers who may try stealing information from inside phishing attacks - these people would need several years worth of time spent training criminals just so they could hack into an unsuspecting user's computer system before stealing anything valuable therefrom! Bu
omouse

Shedding Bikes: Common Programmer Health Problems - 0 views

  • Overall the general cause of all of these problems can be summarized as treating programming as an obsession. You may want to be very good at it, like I did, so you exclude everything else in your life in order to master it. You don't go to the bathroom, you have macho 10 hour coding sessions, you don't eat right, and all manner of mythological beliefs about "real programmers".
  • try to not start at a computer screen for at least 2 hours a whole day
  • Frequently programmers will think that the lighting in a room is what gives them headaches from using a computer, but really it's bad posture, shitty fonts, not drinking enough water, and just using the computer for too long at a stretch
    • omouse
       
      very very true
  • ...3 more annotations...
  • I feel more awake and rested during the day. If I stay up late and sleep in I feel like I have a hangover and I can get headaches.
  • If you constantly feel "stiff" or unable to move well, then you probably need to stretch regularly
  • I'm not sure why this is, but a relaxed mind is crucial to spontaneous creativity and idea generation
  •  
    Programming is a deceptively damaging field to be in, partly because it doesn't seem like you're doing much, and also because of the attitude many programmers have toward their body. You should care about keeping yourself healthy because, when your body is in good shape, that removes "friction" from your mental capacity so that it can focus on important things rather than annoying little problems with your physical wellness.
wolf hesse

The life of a computer programmer blog - Code Justin - Programmer Career - 0 views

shared by wolf hesse on 29 Jun 09 - Cached
  •  
    A blog about everything dealing with my journey into computer programming. Outlining all the details of my programmer career, projects, and life.
Michael Collins

Top 10 Ways to Teach Yourself to Code - 0 views

  •  
    Very interesting article from lonekat. I have been teaching myself how to program for a while now.
Fabien Cadet

MIT's Introduction to Algorithms, Lectures 22 and 23: Cache Oblivious Algorithms - good... - 0 views

  • Cache-oblivious algorithms should not be confused with cache-aware algorithms. Cache-aware algorithms and data structures explicitly depend on various hardware configuration parameters, such as the cache size. Cache-oblivious algorithms do not depend on any hardware parameters.
  • An example of cache-aware (not cache-oblivious) data structure is a B-Tree that has the explicit parameter B, the size of a node. The main disadvantage of cache-aware algorithms is that they are based on the knowledge of the memory structure and size, which makes it difficult to move implementations from one architecture to another.
  •  
    « Cache-oblivious algorithms take into account something that has been ignored in all the lectures so far, particularly, the multilevel memory hierarchy of modern computers. Retrieving items from various levels of memory and cache make up a dominant factor of running time, so for speed it is crucial to minimize these costs. The main idea of cache-oblivious algorithms is to achieve optimal use of caches on all levels of a memory hierarchy without knowledge of their size. »
1 - 20 of 31 Next ›
Showing 20 items per page