A programmer started to cuss Because getting to sleep was a fuss As he lay...– QDB: Quote #845468 (via tedchoward)
At 16x16, you’re not limited. You’re empowered.– Inner Voice Jakub ‘jimmac’ Steiner via Icons by Jimmac
Set a duration of how long you think it should take to solve a problem– C’mon, admit it! I’m just as guilty as the next programmer. I’ve seen programmers sit in front of a monitor for eight hours at a time trying to solve a particular problem. Set a time table for yourself of 1 hour, 30 minutes, or even 15 minutes. If you can’t figure out a...
Minimize Code, Maximize Data– The Database Programmer: Minimize Code, Maximize Data
The No Twinkie Database! →
Even great games can include design errors. Here’s a list of things not to do.
3 shell scripts to improve your writing, or "My... →
nonzen: In particular, I’ve created shell scripts for catching three problems: the passive voice, weasel words, and lexical illusions. And, I’ve integrated these into the build system of our LaTeX documents. The point of these scripts is not to ban all use of the passive voice or even all weasel words. The point is to make sure that my students and I make aconscious choice to use these...
The Four Polymorphisms in C++ - good coders code,... →
These polymorphisms also go by different names in C++, Subtype polymorphism is also known as runtime polymorphism. Parametric polymorphism is also known as compile-time polymorphism. Ad-hoc polymorphism is also known as overloading. Coercion is also known as (implicit or explicit) casting.
In computing, the second-system effect or sometimes the second-system syndrome...– Second-system effect - Wikipedia, the free encyclopedia
Any sufficiently advanced technology is indistinguishable from magic.– Arthur C. Clarke (via @johannal) (via quote-book)
efene programming language: efene 0.7 - a language... →
Always implement things when you actually need them, never when you just foresee...– You Arent Gonna Need It
Programming Is the New Literacy →
thoughtexploratorium: I’m a big proponent of programming being accessible to everybody. I’ve linked to this article in the past and quote Marc Prensky in my talks sometimes. To me this is obvious, but I don’t think it’s a view shared by too many. As programming becomes more important, it will leave the back room and become a key skill and attribute of our top intellectual and social classes,...
As programming becomes more important, it will leave the back room and become a...– Marc Prensky
SXSW Talk on WebHooks and the Evented Web « Web Hooks P84: Imagination Compiler Computing is the ultimate sandbox for our mind, allowing us to explore, model and even execute whatever systems we can *imagine*, as long as we can ﬁgure out how to express them. This is programming. P100: Why should we all learn to program? “Program or be programmed.” The world is becoming increasingly...
Parsers are invoked upon an input stream. They will consume a certain number of...– Conceptually, a Parser represents a very simple idea. The Magic Behind Parser Combinators - Code Commit
7 Personality Types of Developers Today →
streakmachine: (via moapp) Just brilliant!
Most programmers code up FETCH operations all over the place and do not ever...– The Database Programmer: Denormalization Patterns
Anyone who has lost track of time when using a computer knows the propensity to...– Tim Berners-Lee - Wikiquote
Hacker News | Show HN: HackerNewsers,com, find... →
There’s been lots of discussion recently about finding other HNers to talk to / bounce ideas off / work with, some Google spreadsheets were set up to share details but they were soon vandalised. I had a spare afternoon yesterday (which turned into a long day) and here’s the result: http://www.hackernewsers.com/
Dudes, this videos are so epic. Harold Abelson talks about Structure and Interpretation of Computer Programs (Money-Quote: This book is dedicated, in respect and admiration, to the spirit that lives in the computer.) using Lisp 24 years ago. Nearly 20 hours of video lecture.
Perl - The only language that looks the same before and after RSA encryption.– Keith Bostic via vroom
Among other functions, pivot-table tools can automatically sort, count, and...– Pivot table - Wikipedia, the free encyclopedia
Wanna start a Tumblr Oauth App?
Then check out this code: http://github.com/fooyeahcode/tumblroauth It’s a fork of Twitteroauth and written in PHP, just small modifications were needed to add support for tumblr. You need: a FQDN ( e.g. app.example.com) PHP with curl enabled ( see php-info or install php5-curl package) To Start: create a new application callback is something like...
fuckyeahcomputerscience: Shotgun Programming It is a programming style where the developer tries random shots at the code. “Well, this method call is failing…. I’ll try changing this parameter from false to true!” Then of course it doesn’t work and the developer goes: “Well, maybe I could just comment out the whole method call!” and so on. It can go on forever until it works by pure...
A kata is an exercise in karate where you repeat a form many, many times, making...– CodeKata: Code Kata
MapReduce – The Fanfiction →
MapReduce is really cool, useful, and powerful, but a lot of people find it hard to wrap their heads around. This post is a fairly silly, non-technical explanation using Star Trek.
result = a > b ? x : y;– In computer science a ternary operator (sometimes incorrectly called a tertiary operator) is an operator that takes three arguments. The arguments and result can be of different types. Ternary operation - Wikipedia, the free encyclopedia
Liebestraume: Project Euler 1 →
http://projecteuler.net/index.php?section=problems&id=1 IZ __name__ KINDA LIKE “__main__”? N CAN HAS 999 I CAN HAS CHEEZBURGER ME CAN HAS 0 WHILE I CUTE? IZ I ATE MORE CHEEZBURGER THAN N? KTHXBYE Q CAN HAS I SMASHES NICELY INTO 3 RTRI CAN HAS I TAKE AWAY Q OF THOSE 3 Q CAN HAS I SMASHES NICELY INTO 5 RFIV CAN HAS I TAKE AWAY...
How to Design a Good API and Why it Matters
Naushil: Haskell #2 - Privacy →
In many OOP languages you have access modifiers such as private and public to set visibility of your class content. These modifiers help to hide information and create a clean interface. In Haskell, however, there are no equivalent reserved words. What you have instead is module declaration. ...
In programming, everything we do is a special case of something more general—and...– Alan J. Perlis (via mwyrobek)
_sam_hochberg's_blog_: A Brief, Incomplete, and... →
1801 - Joseph Marie Jacquard uses punch cards to instruct a loom to weave “hello, world” into a tapestry. Redditers of the time are not impressed due to the lack of tail call recursion, concurrency, or proper capitalization. 1842 - Ada Lovelace writes the first program. She is hampered…
“…poor skills in schema-kido shall lead to crushing defeat” SQL Query Tuning: The Legend of Drunken Query Master
prefer-method is used for disambiguating in case of multiple matches where neither dominates the other. You can just declare, per multimethod, that one dispatch value is preferred over another. via Clojure - multimethods