
Beaconpush - push service for creating real-time web apps using HTML5 WebSockets and Comet Efficient substring searching There are many times when programmers need to search for a substring, for example when parsing text. This is commonly referred to as searching for a needle (substring) in a haystack (the string to search in). The most straightforward way to do this is by using search functions that your language provides: C: strchr()/memchr(), strstr()/memmem()C++: string::find()Ruby: String#index or regular expressionsPython: string.find() or regular expressions However those functions are usually implemented in a naive way. In this article we’ll examine smarter algorithms, in particular Boyer-Moore and its variants. Before we move on, it should be noted that Python’s string.find(), Ruby regular expressions and glibc’s implementation of memmem() actually can use smarter algorithms when conditions are right, but that is besides the main point of this article. Demonstration of a naive substring search algorithm Smarter algorithms Are there faster algorithms for searching needles? More on Boyer-Moore The code
WebSync Comet Server, HTTP Push/Reverse Ajax Streaming for ASP.NET and IIS - Frozen Mountain Supported Browsers HTTP Pushfor .NET Servers Your servers. HTTP Pushin the Cloud Our servers. This is live data streaming from our SQL Server. Fast Deliver hundreds of thousands updates per second with every instance of WebSync. Flexible WebSync runs on IIS with .NET, Apache with Mono, or as an embedded server. Easy WebSync just works; no complicated setup procedures and no firewall issues. Leading Edge Proper port-80 WebSockets are automatic for all client platforms when using IIS 8. Broad Platform Support WebSync includes client libraries for JavaScript, Android, iOS, Java, Mac, Mono, .NET, .NET Compact, Silverlight, Unity, Windows 8, Windows Phone, Xamarin.Android, and Xamarin.iOS, as well as server support for Mono, .NET, and PHP. What is WebSync? Push data to web clients with zero configuration. WebSync is a highly scalable HTTP streaming (comet) server built for the Microsoft stack (.NET/IIS) using the Bayeux protocol. Bypass firewalls and deliver tens of thousands of messages per second. With Comet
Real-time Messaging - Push Real Time Data to Mobile, Tablet, Web | PubNub Create UML diagrams online in seconds, no special tools needed. Actor Actor and Use Case Notes Many Use Cases Actor Inheritance Multiple Actors And Inheritance <<Extends>> <<Includes>> <img src=" Registration)" > Meaty Example Create Your Own >> Khan Academy API · Khan/khan-api Wiki The Khan Academy API gives developers access to nearly all types of Khan Academy data via a RESTful API that outputs easy-to-parse JSON. Overview At the highest levels, the API will give you information about Every Playlist. You can use the titles of each playlist to discover the videos within individual playlists (i.e. Algebra, Banking and Money, Biology, etc). Exercises and Videos are related, so you can ask make a specific api call to find out about a video like Absolute Value or you can ask for that video's related exercises. Similarly, you can ask about the Absolute Value Exercise and in much the same way as in the video example above, find the exercise's related videos. You can use these unauthenticated api calls to get information about nearly all of the Khan Academy's library organized in Playlists, or as individual videos or exercises. Getting Started Just point your browser at and you've already made your first API call. Methods Examples
Software Development AntiPatterns Good software structure is essential for system extension and maintenance. Software development is a chaotic activity, therefore the implemented structure of systems tends to stray from the planned structure as determined by architecture, analysis, and design. Software refactoring is an effective approach for improving software structure. The resulting structure does not have to resemble the original planned structure. The structure changes because programmers learn constraints and approaches that alter the context of the coded solutions. When used properly, refactoring is a natural activity in the programming process. For example, the solution for the Spaghetti Code AntiPattern defines a software development process that incorporates refactoring. Development AntiPatterns utilize various formal and informal refactoring approaches. Read next This article is taken from our book AntiPatterns: The Survival Guide. All of the AntiPatterns are compiled there. Learn more
Clever | Developer Docs Authentication All Clever API calls must be authenticated using API tokens. Specifically, OAuth 2.0 bearer tokens. API Tokens Clever uses token-based authentication because it offers numerous benefits over key-based authentication. A token represents the authorization that a district has given to access its data. This approach offers a number of benefits: Security: A compromised token represents a much smaller risk than a compromised API key.Simplicity: With tokens, scoping API calls to be within a single district is trivial.Embedded applications: The content of a token is shared between you and a single district, so it's safe to embed or expose the token to the district that granted it to you. Acquiring a token Every time a district authorizes your application, a token is created that stores the details of this authorization. 7f76343d50b9e956138169e8cbb4630bb887b18 You can acquire this token in one of two ways: Manually. Automatically via OAuth 2.0. Authenticating with a token API Keys Security
Sample Source Code Sample source code to find LBS parameters Find LBS Information - To find a location of the mobile device without GPS, you only need the following four parameters from your mobile device MCC - Mobile Country Code MNC - Mobile Network Code LAC - Locale Area Code Cell ID - Value of the Cell ID Your mobile application can easily obtain this information from the mobile device using well-documented APIs published by respective device manufacturers. Below are code snippets for the commonly used mobile device platforms. Invoke Loc8 APIs - Once you obtain the LBS parameters, invoke the Loc8 APIs to retrieve the location, lat/long and other information as documented here Code Snippets Following are code snippets to retrieve LBS parameters for the commonly used mobile device platforms. SymbianLBS parameters can be retrieved by using the CTelephony class of Symbian SDK. BlackberryHere is a code snippet to retrieve LBS parameters. Windows MobileHere is how to retrieve LBS parameters in Windows Mobile
Business Intelligence Reporting & Software | GoodData | Home