background preloader

PubNub ★ Push Real-time Data to Mobile, Tablet, Web

PubNub ★ Push Real-time Data to Mobile, Tablet, Web
The PubNub Realtime Network powers thousands of apps, streaming more than 3 million messages a second to over 200 million devices a month. Watch it in action Financial Stream equity: 'ORCL', price: 32.45, change: -.04 Collaboration message: 'Doc looks great', approval: true, approver: 23432

http://www.pubnub.com/

CAP theorem In theoretical computer science, the CAP theorem, also known as Brewer's theorem, states that it is impossible for a distributed computer system to simultaneously provide all three of the following guarantees:[1][2][3] In 2012 Brewer clarified some of his positions, including why the oft-used "two out of three" concept can be misleading or misapplied, and the different definition of consistency used in CAP relative to the one used in ACID.[4] History[edit] The proof of the CAP theorem by Gilbert and Lynch is a bit narrower than that which Brewer had in mind. The theorem sets up a scenario in which a replicated service is presented with two conflicting requests arriving at distinct locations at a time when a link between them is failed. The obligation to provide availability despite partitioning failures leads the services to respond; at least one of these responses shall necessarily be inconsistent with what a service implementing a true one-copy replication semantic would have done.

Social Media Management Platform Multiple Users and User Roles MediaFunnel supports administrator, publisher and contributor roles. For each social media channel, set a user for no access or a specific level of access. Prevent potentially harmful content from being published. Implement approval processes. Khan Academy API · Khan/khan-api Wiki The Khan Academy API gives developers access to nearly all types of Khan Academy data via a RESTful API that outputs easy-to-parse JSON. Overview At the highest levels, the API will give you information about Every Playlist. You can use the titles of each playlist to discover the videos within individual playlists (i.e. Algebra, Banking and Money, Biology, etc). Walmart Goes Mobile With New Apps For iPhone & iPad (Sarah Perez/TechCrunch) At this moment, the must-read stories in technology are scattered across hundreds of news sites and blogs. That's far too much for any reader to follow. Fortunately, Techmeme arranges all of these links into a single, easy-to-scan page.

Secure Content Sharing and Online Workspaces Back to the top Upload files quickly and easily. We constantly strive to make getting files in and out of the service as fast as humanly possible. Developer Docs Authentication All Clever API calls must be authenticated using API tokens. Specifically, OAuth 2.0 bearer tokens. API Tokens Clever uses token-based authentication because it offers numerous benefits over key-based authentication. A token represents the authorization that a district has given to access its data.

Our brains make the social graph real Brilliant web essayist Maciej Cegłowski of Two Steaks and Pinboard fame has focused his considerable insight on the area of web standards I've been involved with for the past few years. You should go and read his The Social Graph is Neither now. Maciej is spot on in his criticisms: This obsession with modeling has led us into a social version of the Uncanny Valley, that weird phenomenon from computer graphics where the more faithfully you try to represent something human, the creepier it becomes. As the model becomes more expressive, we really start to notice the places where it fails.Personally, I think finding an adequate data model for the totality of interpersonal connections is an AI-hard problem. But even if you disagree, it's clear that a plain old graph is not going to cut it.

Sample Source Code Sample source code to find LBS parameters Find LBS Information - To find a location of the mobile device without GPS, you only need the following four parameters from your mobile device MCC - Mobile Country Code MNC - Mobile Network Code LAC - Locale Area Code Cell ID - Value of the Cell ID Your mobile application can easily obtain this information from the mobile device using well-documented APIs published by respective device manufacturers. Below are code snippets for the commonly used mobile device platforms. Leadership lessons from the ancient Greeks – Part I of II I am a huge fan of the novelist Steven Pressfield. His novels bring the people and events of Ancient Greece to life in a way few others have. He has a particular talent for capturing the essence of war and military life, both its leaders and foot soldiers. His two best novels are , which tells the story of 300 Spartan warriors sent to defend the pass of Thermopylae, knowing full well they will all perish fighting the Persian invaders, and , chronicling the battle between Athens and Sparta during the Peloponnesian War.

Psychology Constructs the Female Psychology Constructs the Female by Naomi Weisstein. Transcribed for digital reproduction by John Burke (Editors Note: Naomi Weisstein was a founder of the CWLU. She rocked the psychology establishment when this article was first presented as a paper in 1968. It was widely distributed in the women's liberation movement.) It is an implicit assumption that the area of psychology which concerns itself with personality has the onerous but necessary task of describing the limits of human possibility. GSM The GSM logo is used to identify compatible handsets and equipment. The dots symbolize three clients in the home network and one roaming client.[1] GSM (Global System for Mobile Communications, originally Groupe Spécial Mobile), is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe protocols for second generation (2G) digital cellular networks used by mobile phones. It is the de facto global standard for mobile communications with over 90% market share, and is available in over 219 countries and territories.[2] Subsequently, the 3GPP developed third generation (3G) UMTS standards followed by fourth generation (4G) LTE Advanced standards, which are not part of the ETSI GSM standard. "GSM" is a trademark owned by the GSM Association.

Cloud to Service Endpoints – The Missing Link - Linux By Paul Anderson I remember as a kid I was fascinated with phones. The idea that you could pick up the phone, dial it, and talk to someone on the other end was pretty neat. And… at the time, a phone was an elegantly designed electro-mechanical work of art, and it was fun to take them apart to try and figure out how they worked. I could understand how the phone itself worked, but as a kid, what happened after those two wires headed off to the pole was somewhat of a mystery to me.

Related: