Skip to main content

Blog - Page 23

Architecture can directly impact costs per feature. Let's compare Tight-coupling MVC, Cocoa MVC, MVP, MVVM, and VIPER in three dimensions: balanced distribution of responsibility among feature actors, testability and ease of use and maintainability.

Read more →

The key-value cache is used to reduce the latency of data access. What are read-through, write-through, write-behind, write-back, write-behind, and cache-aside patterns?

Read more →

Traditional NFS based design has metadata bottleneck: large metadata size limits the metadata hit ratio. Facebook photo storage eliminates the metadata by aggregating hundreds of thousands of images in a single haystack store file.

Read more →

Disclaimer: All things below are collected from public sources or purely original. No Uber-confidential stuff here.

Read more →

Names are a very important weapon. Researchers at Syracuse University found that when people use derogatory terms to refer to a certain social group, the suicide rate among that group tends to be higher. Names can also unite people; experimental results show that the name of a game influences people's ability to cooperate. When people cheer for themselves during a competition, they often achieve their best performance.

Read more →

A blockchain is an incorruptible distributed ledger that is hosted by multiple parties, secured by crypto algorithms and immutable and verifiable in data storage. The blockchain technology is applied in a wide range of industries.

Read more →

The cycle system enables people to follow through. It suggests every day should start with your to-do list, hours needed and plans. The secrets also lie in writing down goals and scheduling things with the calendar, instead of your brain.

Read more →

Different auth systems solve the problem with different needs. For a new start-up who does not want to build their own auth systems, the most suitable solution is auth0. Meanwhile, the best solution for a company that needs integrations of enterprise services is OneLogin.

Read more →

People cannot dominate an industry solely with superior technical skills, as the replicability and update rate of technology are extremely high. Maintaining a curious mind and deliberately exploring the world is another necessary condition for enhancing one's competitiveness. Allen Gannett interviewed numerous creative individuals and concluded that we must spend 20% of our waking time each day absorbing knowledge in our respective fields.

Read more →

The persuasive techniques used by the Greeks let you appear clever when speaking. Other schemes include figures of speech, twisting clichés, Yoda speaking, dialysis, antithesis, saying both yes and no and inventing new words.

Read more →