Wednesday, December 16, 2009
Sunday, December 6, 2009
Saturday, November 28, 2009
Google Wave
http://wave.google.com/
Currently new accounts are allowed with invitations.
Sunday, October 18, 2009
Singletons are Global state: Use wisely
We should really use it only when its required. The following article forces that.
Refer:
http://www.ibm.com/developerworks/webservices/library/co-single.html
Google has singleton detector for sometime now, that can be very useful if you need to analyze the code base without source code.
Refer:
http://code.google.com/p/google-singleton-detector/
Law of Demeter and violations.
An object should avoid invoking methods of a member object returned by another method. In Java,the law can be stated simply as "use only one dot". That is, the code "a.b.Method()" breaks the law where "a.Method()" does not.
Violations:
With the SOA applications rising up these days, its very difficult to draw a line to what extend one can violate this law.
One way to create appropriate facades to wrap the internal extensions, however it just looks like for the sack of the (LoD) Law of Demeter and in fact slows one down on development.
Lot of third party libraries does not seem to care about the principle at all.Everyday we use these libraries,needless to say with lot of dots,and when we get "NullPointerException", the deguggin goes crazy.
We should realize the value of LoD, at least from unit testing perspective and its very hard to test the piece of the code that violates the LoD to larger extend.
Strongly feel, developers or API Architects should take LoD into account when they design plugin/libraries.
Saturday, October 3, 2009
Challenge your Math Skill
Happy solving!
Are you ready to prove your programming expertise?
Code Golf
When: Ongoing, new challenges posted sporadically
Languages: Perl, PHP, Python, Ruby
How it works: Based on the original perl golf, Code Golf allows you to show off your code-fu by solving coding problems using the least number of keystrokes. The challenges cover a nice mix of topics; example challenges are 99 Bottles of Beer, Tower of Hanoi, The Game of Life, and converting Roman numerals to base 10 integers.
How to win: Submit your code, and if it passes the challenge test cases, your entry is scored according to the number of characters. Win bragging rights by appearing on the overall leader board or the leader board for each problem.
UVa
When: New contests every month
Languages: C, Java, C++, Pascal
How it works: Each contest consists of anywhere between 3 and 10 problems. The problem sets demand quick thinking and a good computer science background with solid knowledge of algorithms, data structures, and mathematics. Common themes are palindromes, primes, and graphs. Check out the extensive contest archives for practice.
How to win: Contests are timed and usually last several hours, so have some coffee and brain food nearby. Submit code for each problem to the automatic tester when it’s finished. Contestants are ranked by the number of correct solutions and ties broken by the time taken to complete the challenge.
Mindcipher
When: Ongoing
Languages: Logic
How it works: Mindcipher is a social repository of the world’s greatest brain teasers, logical puzzles and mental challenges. No programming required, just logic and common sense. Some of the problems are taken from Google and Microsoft interviews so brush up your interview skills while having some fun. Categories of brain teasers are mathematics, physics, at the campfire, logical, riddles, lateral thinking, optical illusions, and general. Each puzzle is ranked according to difficulty and members can vote up favorite puzzles.
How to win: Answers are provided for each brain teaser, so there isn’t really any winning involved.
Project Euler
When: Ongoing
Languages: All languages
How it works: Each problem is designed to be solved by some combination of mathematical insight and algorithm design. Problems build on one another, getting progressively harder, so its a great way to keep your math skills fresh. After solving a problem you are given access to the forum containing algorithm discussion and solutions in a wide variety of languages, so Project Euler is a nice way to learn a new language.
How to win: Submit correct answers to the most recent 25 problems to earn a spot on the venerable Eulerians list. Or solve more than 200 puzzles to reach level 5.
TopCoder
When: Weekly rated competitions, and practice rooms that are always open
Languages: Java, C++, C#, Visual Basic
How it works: In TopCoder’s algorithm competitions, you have a set amount of time to complete the problem set (usually an hour). Code is normally developed inside TopCoder; there are multiple plugins that provide an IDE within your browser.
TC also holds “competitions” in bug fixing and component design, development, and assembly. These competitions are actually work developed on a speculative basis for companies who have outsourced development to TC, with “prizes” given to work with the best ratings.
How to win: For the algorithm competitions, develop, test, and submit solutions to the 3 problems in the set during the submission widow. After a 5 minute intermission you can view competitors’ code and challenge it by giving a test case that you believe will break the submission. Scoring is based on problem difficulty, time to complete the problem, results of the challenge round, and results of automated testing.
The International Obfuscated C Code Contest
When: Yearly (but currently on hiatus after 19 competitions)
Languages: C
How it works: Submit your most obfuscated ANSI C code. Each contest has a list of rules concerning code size, the build process, compile dependencies, etc. However, legal abuse of the rules is somewhat encouraged. Winners from previous years have all used nefariously tricky obfuscation.
How to win: Submissions are judged by a panel of judges based on how obfuscated the code is. Originality is important in both the type of obfuscation used and the purpose of the code.
Enjoy Programming!!!
Wednesday, September 30, 2009
Enchanting Tamilnadu -
revamped their services to improve tourism in the state.
Next time before planning any vacation, visit http://www.tamilnadutourism.org/
அறிய பொக்கிஷங்கள் அடங்கிய களைஞ்சியம் நம் தமிழகம் என்பதை நினைவூட்டும் வகையில், பயனுள்ள தகவல்களை இத்தளத்தில் காணலாம்.
TTDC-இன் பணி சிறக்க வாழ்த்துக்கள்.
Sunday, September 27, 2009
Browserscope - Browser Profiler
Backed by Google,this is very helpful on profiling your browser and application.
More @ www.browserscope.org
Tuesday, September 22, 2009
How to develop iPhone apps?
The applications are developed on Apple OS [OS 10.5 or later] using iPhone Sofware Development Kit.
One has to register as 'iPhone' app developer through enrolling iPhone Developer Program [Standard Program $99 and Enterprise Program $299 as on today] in order to get the iPhone/iPod Touch - SDK.
Successful applications can be sent to Apple for approval and there by getting into Apple Store before reaching out to the customers.
Few people hack these steps to develop iPhone app using windows, however that cannot get through via App Store and will never be legal.
Lot of rources to guide through step by step creation of iPhone app can be found at developer central at Apple site.
http://developer.apple.com/iphone
Wednesday, September 16, 2009
Tuesday, September 1, 2009
Windows command prompt Tips
- F1 retypes the previous command one character at a time
- F2 brings up a dialog and asks "Enter the char to copy up to:"
- F3 retypes the last command in full
- F4 brings up a dialog and asks "Enter char to delete up to:"
- F5 as for F3
- F6 Print EOF character (Ctrl+Z)
- F7 brings up a dialog of all the recent command history
- F8 brings up each of the most recent commands, one at a time
- F9 brings up a dialog and asks "Enter command number:"
Monday, August 31, 2009
Saturday, August 29, 2009
Friday, August 28, 2009
முன்னணி கல்வி நிறுவனங்களின் இலவச பாடசாலை.
http://www.academicearth.org/
Friday, July 31, 2009
Change Column from Varchar2 to CLOB
SQL>alter table test_table add clob_column CLOB;
Table altered.
SQL> update test_table set clob_column = current_varchar_column;
xx rows updated.
SQL> alter table test_table drop column current_varchar_column;
Table altered.
SQL> alter table test_table rename column clob_column to current_varchar_column;
Table altered.
Thursday, July 30, 2009
Monday, July 6, 2009
Product Intro - List2Shop - Manage your shopping checklist!
Tuesday, June 30, 2009
Monday, June 29, 2009
JavaScript - Higher-Order Functions - First Class Functions
Conversely, in functional code, the output value of a function depends only on the arguments that are input to the function, so calling a function f twice with the same value for an argument x will produce the same result f(x) both times.
Functions are higher-order when they can take other functions as arguments, and return them as results. (Operators in mathematics, such as the differential operator d / dx that produces the derivative in calculus when applied to a function f, are examples of this.)
Higher-order functions enable currying, a technique in which a function is applied to its arguments one at a time, with each application returning a new function that accepts the next argument.
Higher order functions in Java script.
sayHello = function(f1){
alert(f1('Power Of JS')('Easy Higher Order Functions!'));
};
sayHello(function(prefix){
getPrefix = function(){
return prefix;
};
return function(a){
return getPrefix()+' - ' +a;
}; } );
Sunday, June 28, 2009
Thoughts on Keyboard Design
At least customized laptops can be provided with options of keyboards. You have lots of choices on other aspects of laptop, then why not we have to bear with same-old fashined keyboard alone?
If the designer really run out of any changes....here my two pennies..
* CAPS LOCK - Its carried from typewriter design. How many people require ALL CAPS typing on a laptop?? We have sophisticated word processors these days which can easily do the job. Why the hell we still need this?
* NUM LOCK - I really forget when either me or my friends [ppl with computers for 20 hrs a day] last time use this key?
Monday, June 22, 2009
நம் பணி!
கணினியை என்னை போன்று தொழிலுக்காகவோ, அல்லது பொது-சுய உதவிக்காகவோ பயன்படுத்தும் எல்லா கைகளுக்கும் வணக்கம்.
ஒருநாள் ஆய்வகங்களிலும், பணம் புரளும் அலுவகங்களிலும் மட்டுமே ஆராதிக்கப்பட்டவள், இன்று நம்மூர் மருந்து கடை தொட்டு, பீடி சிகரட் கடை வரை வலை விரித்திருப்பது நிதர்சனம்.
இவ்வளவு அரிய வளர்ச்சியை சீரமைக்க, மேம்படுத்த, கண்காணிக்க, பரவலாக்க, எத்துணையோ கைகள் உழைக்கின்றன.
கணினி தொழிலும், கட்டிட வேலை போன்று பரவலானதலும், ஆங்கில அறிவை பெற்ற ஒரு சிலரே செய்ய முடியும் என்கிற ஆணவத்தாலும், இத் துறையை நாடும் பல போலிகள் பெருகிவிட்டன.
எதோ ஒரு, டுடோரியல் சென்டெரில் ஆறு மாதம் படித்துவிட்டு, ஒன்றோ இரண்டோ சான்றிதழ்களை பெற்று கொண்டு , தானும் ஒரு Sofware Engineer என்று சொல்லிக்கொண்டு எத்துணையோ வேடதாரிகள் பிழைத்துக்கொண்டு இருக்கிறார்கள்.
இத்துறையின் பொறுப்பு, நான்கு வரி code, கூகிள்-இருந்து சுட்டு, copy paste செய்துவிட்டு QA வை கையில் போட்டுகொண்டு - Defects free Delivery - செய்வதோடு மட்டும் முடிந்துவிடுவதில்லை.
இதையும் தாண்டி, இதன் அடிப்படையை புரிந்து, இவள் அழகை, பெருமையை உண்மையாய் ரசித்து, இன்னும் ஒரு படி மேல் கொண்டு செல்ல துடிக்கும் ஒரு சில நெஞ்சங்களும் இருக்கத்தான் செய்கின்றன.
இத்துறையின் பொறுப்பு ஒரு நல்லாசிரியரை போன்றது. ஒரு ஆசானின் தவறால் எப்படி ஒரு இளம் சமுதாயமே பாதிக்கபடுகிறதோ, அங்ஙனம் பெருகிவரும் சாப்ட்வேர் கருப்பு ஆடுகளால், கணினியின் நலன் மட்டுமின்றி, நம் நாட்டின் நாளைய வளர்ச்சியும் கூட பாதிக்கபடலாம்.
ஆகையால், ஒவ்வொரு கணினி வல்லுனரும் - குறிப்பாக இந்திய கணினி வல்லுனர்கள்-
தமது பொறுப்புணர்ந்து, எவ்வழியில் இத்துறையில் நுழைந்திருந்தாலும், இனிமேலாவது ,இதன் அருமை உணர்ந்து, செம்மையான வளர்ச்சிக்கான வழிகளை சிந்தித்து செயல் ஆற்றுவோமாக.
இப் பொறுப்பே இப்பதிவை தொடங்குவதற்கான உந்து சக்தி. பின்வரும் நோக்கங்களுக்கான நமது சிந்தனைகளை இங்கே பகிர்வோமாக.
* கலையாக பயிலுதல் & பயிற்றுவித்தல்
* நுணுக்கங்கள்
* திட்ட மேலாண்மை & செய்முறை
* நம்ம ஊர் பயன்படிற்கான கருவிகள்
இப்பதிவு, கணினியையும் அதன் பயன்பாட்டையும், அதன் வளர்ச்சியையும் ஆராதிப்பவர்களுக்கு காணிக்கை.
Sunday, June 21, 2009
Dependency Injection with Guice
It uses power of Java 5 Annotations to replace
new
with @Inject
.Before delving into the new framework, lets recapture "Dependency Injection"
Before starting a surgery, the surgeon makes sure, whatever required to complete the surgery procedure are readily available.
The surgery assistant does the prep work and manages everything available before calling the surgeon to start. Imagine how horrible it would be for a surgeon to do the prep work during the surgery itself. It would leave enormous amount of risk on critical operation.
Similarly for a TransactionMananger to act on a transaction,it may depend on - Source Account, Receiver Account, Transaction modes etc.
If the transaction manager works on gathering the dependencies during the transaction, it will not only affect the transaction time , but can also impact on quality which can lead to errors.
If an assistant makes sure, TransactionManager gets everything it requires before starting the transaction, the TM can just focus and ensure smoother transaction. If at all there is any error, it will be very easy to find out as responsibilities are way clear off.
This is what called as "Dependency Injection". In other words "Dont call me. I will call you".
public class TransactionManager{
Account sourceAccount;
Account receiverAccount;
Double amount;
void transfer(){
this.sourceAccount.debit(this.amount) ;
this.receiverAccount.credit(this.amount);
}
}
public class Account{
long accountNo;
String name;
void debit(int a){
}
void credit(int a){
}
}
The dependencies of TransactionManager are sourceAccount and receiverAccount. All these dependencies are injected by an assistant - called - Inversion of Control Engine. [IoC Engine]
The IoC engine just requires following configuration to perform this.
< bean name="transactionManager" class="TransactionManager" >
< property name="sourceAccount" ref="sourceAccount"/>
< property name="receiverAccount" ref="receiverAccount"/>
< property name="amount" value="100"/>
</bean >
< bean name="sourceAccount" class="Account" >
< property name="accountNo" value="123" />
< property name="accountName" value="first last" />
</ bean >
< bean name="receiverAccount" class="Account" >
< property name="accountNo" value="89234" />
< property name="accountName" value="xyz man" />
</ bean >
Without dependency injection the
transfer()
would have been like this
void transfer(){
Account sourceAccount=new Account();
sourceAccount.setAccountNo(123);
sourceAccount.setName("first last");
Account receiverAccount=new Account();
receiverAccount.setAccountNo("89234");
receiverAccount.setName("xyz man");
sourceAccount.debit(100);
receiverAccount.credit(100);
}
Instead of tying the dependencies too tightly and mixing with core functionality, the assistant [IoC - Inversion of Control or Dependency Injection Engine] makes sure all the dependencies are readily available when required.
This not only makes the surgeon [TransactionManager] job easier, but also ensures testability and maintenance. If the amount or Account implementation changes in future, its very easy to update the code. Just change the configuration and you all done. The IOC will keep you updated and will deliver you all dependencies at required time
Refer for more info.
http://code.google.com/p/google-guice/
Wednesday, April 1, 2009
Comet - Reverse Ajax - Server Push
Monday, March 30, 2009
Javascript : Anything can convert to Boolean!
var val=5;val=!!val;alert('Numeric Value:'+val); //true
val=0;val=!!val;alert('Zero Numeric Value:'+val); //false
val = '';val =!!val;alert('Empty space value:'+val); //false
val = undefined;val = !!val;alert('undefined value:'+val); //false
val = new Array();val=!!val;alert('Array Object value:'+val); //true
val= {};val=!!val;alert('Empty Object value:'+val); //true
val=false;val=!!val;alert('Boolean value:'+val); //false
val= null;val=!!val;alert('Null value:'+val); //false
var val=5;val=!!val;alert('Numeric Value:'+val); //true
val=0;val=!!val;alert('Zero Numeric Value:'+val); //false
val = '';val =!!val;alert('Empty space value:'+val); //false
val = undefined;val = !!val;alert('undefined value:'+val); //false
val = new Array();val=!!val;alert('Array Object value:'+val); //true
val= {};val=!!val;alert('Empty Object value:'+val); //true
val=false;val=!!val;alert('Boolean value:'+val); //false
val= null;val=!!val;alert('Null value:'+val); //false
Monday, March 23, 2009
eRights - Unified Access & Concurrency Control for IT Products
Albeit open source ldap can fulfill extensive access control mechanism complex entiltments for enterprises, it potentially lacks concurrency enforcement for which many of us, would have employed other custom solutions [like tracking session id/access id with respect to application usage etc]
eMeta attempts to bridge the gap between access & concurrency controls through its unified approach via its eRights suite.
The product description goes as below.....
Thursday, March 5, 2009
Composite Configuration
Configuration to this CompositeConfiguration. If you add Configuration1, and
then Configuration2, any properties shared will mean that Configuration1 will be
returned. You can add multiple different types or the same type of properties
file. If Configuration1 doesn't have the property, then Configuration2 will be
checked.
Here, if you want to override any of the configurations mentioned by default, simply define them in APP_1
Monday, January 12, 2009
How to check what version of JavaScript supported in Browser
<script type="text/javascript">
var jsver = 1.0;
</script>
<script language="Javascript1.1">
jsver = 1.1;
</script>
<script language="Javascript1.2">
jsver = 1.2;
</script>
<script language="Javascript1.3">
jsver = 1.3;
</script>
<script language="Javascript1.4">
jsver = 1.4;
</script>
<script language="Javascript1.5">
jsver = 1.5;
</script>
<script language="Javascript1.6">
jsver = 1.6;
</script>
<script type="text/javascript">
document.write('Javascript version ' + jsver+ ' supported');
</script>
Note:
Firefox, Netscape 7/8, Mozilla, and Opera 7+ all support version 1.6
Netscape 6 supports version 1.5
Opera 6 supports version 1.4
Netscape 4.5, Opera 5, and Internet Explorer 6 support version 1.3
Netscape 4 supports version 1.2
extJS - Javascript library for RIA
Scope in Javascript
When a variable is created, the value it stores is only available for a certain part of the code execution.
Memory is set aside to store that piece of information and then freed when it is no longer needed.
JavaScript, a variable declared outside of a function is available inside a function:
var name = "Jonathan";
function showme()
{
alert(name); // will display "Jonathan"
}
showme();
A variable declared within a function will not be available outside of a function.
function showme()
{
var name = "Jonathan";
}
showme();
alert(name); // name will be undefined
#1 Do not use global variables from within a function
Instead, pass in any required values as parameters to the function.
Using our JavaScript example from before we can do this:
var name = "Jonathan";
function showme(myname)
{
alert(myname); // will display "Jonathan"
}
showme(name);
alert(name); // will display "Jonathan"
#2 Use object-oriented programming (OOP)
This mantra is similar to the first point, but on a larger scale. Instead of a collection of functions that perform related tasks, the functions become methods of an object. (A method is a function that belongs to an object.) Values can then be passed into the object in a variety of useful ways:
By setting the properties of an object
By passing values as parameters of a method
By passing values as parameters of the constructor (the method that gets executed when an object is first instantiated)
Here’s a quick JavaScript OOP example:
function Person(myname)
{
this.name = myname;
}
var me = new Person("Jonathan");
alert(me.name);
Dojo - Javascript Framework
- Dojo is a HTML and Javascript Framework for Rich interactive Applications
- Dojo offers many widgets, utilities and ajax libraries to develop your application.
- Open source under BSD license
- Robus Ajax framework
- Programmer can use just API to build powerful functions
-
Basic components
Tree,Button,Calendar control,Grid,List box
Pros
Associative arrays
Loosely typed variables
Regular expressions
Objects and classes
Highly evolved date, math, and string libraries
W3C DOM support in the Dojo
Challenges:
- Browser dependent; applicable for any client framework
- No way to hide dojo code in view source
Wednesday, January 7, 2009
What is === operator in Javascript?
Example
alert(1=="1"); returns true
alert(1==="1"); returns false
Javascript Cookies
Cookies were originally invented by Netscape to give 'memory' to web servers and browsers. The HTTP protocol, which arranges for the transfer of web pages to your browser and browser requests for pages to servers, is state-less, which means that once the server has sent a page to a browser requesting it, it doesn't remember a thing about it. So if you come to the same web page a second, third, hundredth or millionth time, the server once again considers it the very first time you ever came there.
This can be annoying in a number of ways. The server cannot remember if you identified yourself when you want to access protected pages, it cannot remember your user preferences, it cannot remember anything. As soon as personalization was invented, this became a major problem.
Cookies were invented to solve this problem. There are other ways to solve it, but cookies are easy to maintain and very versatile.
How cookies work
A cookie is nothing but a small text file that's stored in your browser. It contains some data:
A name-value pair containing the actual data
An expiry date after which it is no longer valid
The domain and path of the server it should be sent to
So every time you visit the site the cookie comes from, information about you is available. This is very nice sometimes, at other times it may somewhat endanger your privacy. Fortunately more and more browsers give you the opportunity to manage your cookies (deleting the one from the big ad site, for example).
Cookies can be read by JavaScript too. They're mostly used for storing user preferences.
name-value
Each cookie has a name-value pair that contains the actual information. The name of the cookie is for your benefit, you will search for this name when reading out the cookie information.
If you want to read out the cookie you search for the name and see what value is attached to it. Read out this value. Of course you yourself have to decide which value(s) the cookie can have and to write the scripts to deal with these value(s).
Expiry date
Domain and path
The path gives you the chance to specify a directory where the cookie is active. So if you want the cookie to be only sent to pages in the directory cgi-bin, set the path to /cgi-bin. Usually the path is set to /, which means the cookie is valid throughout the entire domain.This script does so, so the cookies you can set on this page will be sent to any page in the www.quirksmode.org domain (though only this page has a script that searches for the cookies and does something with them).
document.cookie
Cookies can be created, read and erased by JavaScript. They are accessible through the property document.cookie. Though you can treat document.cookie as if it's a string, it isn't really, and you have only access to the name-value pairs.
If I want to set a cookie for this domain with a name-value pair 'ppkcookie1=testcookie' that expires in seven days from the moment I write this sentence, I do
document.cookie =
'ppkcookie1=testcookie; expires=Thu, 2 Aug 2001 20:47:11 UTC; path=/'
First the name-value pair ('ppkcookie1=testcookie')
then a semicolon and a space
then the expiry date in the correct format ('expires=Thu, 2 Aug 2001 20:47:11 UTC')
again a semicolon and a space
then the path (path=/)
This is a very strict syntax, don't change it! (Of course the script manages these dirty bits for you)
Also, even though it looks like I'm writing this whole string to the string document.cookie, as soon as I read it out again I only see the name-value pair:ppkcookie1=testcookie
If I want to set another cookie, I again do
document.cookie ='ppkcookie2=another test; expires=Fri, 3 Aug 2001 20:47:11 UTC; path=/'
The first cookie is not overwritten, as it would when document.cookie would be a real string. Instead the second one is added to document.cookie, so if we read it out we get
ppkcookie1=testcookie; ppkcookie2=another test
If I reset a cookie
document.cookie ='ppkcookie2=yet another test; expires=Fri, 3 Aug 2001 20:47:11 UTC; path=/'
the old cookie is overwritten and document.cookie readsppkcookie1=testcookie; ppkcookie2=yet another test
To read out a cookie you have to treat document.cookie as a string and search for certain characters (semicolons, for instance) and for the cookie name. I'll explain how to do it below.
Finally, to remove a cookie, set it with an expiry date before today. The browser sees that the cookie has expired and removes it.
document.cookie ='ppkcookie2=yet another test; expires=Fri, 27 Jul 2001 02:47:11 UTC; path=/'
Example
If you're thoroughly confused by all this strange syntax, try the example below. You can set two cookies, ppkcookie1 and ppkcookie2. Fill in the desired value in the text box.
The value of the cookie should be
I set the cookies to remain active for seven days. If you return to this page within that time, you'll get an alert that the cookie(s) is/are still active. Try it by setting a cookie, then reloading this page.
These are the three scripts you need.
function createCookie(name,value,days) {
if (days) {
var date = new Date();
date.setTime(date.getTime()+(days*24*60*60*1000));
var expires = "; expires="+date.toGMTString();
}
else var expires = "";
document.cookie = name+"="+value+expires+"; path=/";
}
function readCookie(name) {
var nameEQ = name + "=";
var ca = document.cookie.split(';');
for(var i=0;i < ca.length;i++) {
var c = ca[i];
while (c.charAt(0)==' ') c = c.substring(1,c.length);
if (c.indexOf(nameEQ) == 0) return c.substring(nameEQ.length,c.length);
}
return null;
}
function eraseCookie(name) {
createCookie(name,"",-1);
}
Explanation
functions are not very difficult, the hardest part is creating the correct syntax for setting a cookie.
createCookie
When calling createCookie() you have to give it three bits of information: the name and value of the cookie and the number of days it is to remain active. In this case the name-value pair should become ppkcookie=testcookie and it should be active for 7 days.createCookie('ppkcookie','testcookie',7)
If you set the number of days to 0 the cookie is trashed when the user closes the browser. If you set the days to a negative number the cookie is trashed immediately.
The function receives the arguments and starts doing its job.function createCookie(name,value,days) {
First of all see if there is a days value. If there isn't we don't need to do the time calculation. if (days) {
If there is, create a new Date object containing the current date. var date = new Date();
Now get the current Time (in milliseconds) and add the required number of days (in milliseconds). Set the Time of the date to this new value, so that it now contains the date in milliseconds that the cookie should expire. date.setTime(date.getTime()+(days*24*60*60*1000));
Set the variable expires to this date in the UTC/GMT format required by cookies. var expires = "; expires="+date.toGMTString();
}
If 0 is passed to the function, expires is not set and the cookie expires when the user closes his browser.. else var expires = "";
Finally write the new cookie into document.cookie in the correct syntax. document.cookie = name+"="+value+expires+"; path=/";
}
Cookie created.
readCookie
To read out a cookie, call this function and pass the name of the cookie. Put the name in a variable. First check if this variable has a value (if the cookie does not exist the variable becomes null, which might upset the rest of your function), then do whatever is necessary.var x = readCookie('ppkcookie1')
if (x) {
[do something with x]
}
The function receives the argument and starts.function readCookie(name) {
We're going to search for the name of the cookie, followed by an =. So create this new string and put it in nameEQ: var nameEQ = name + "=";
Then split document.cookie on semicolons. ca becomes an array containing all cookies that are set for this domain and path. var ca = document.cookie.split(';');
Then we go through the array (so through all cookies): for(var i=0;i < ca.length;i++) {
Set c to the cookie to be checked. var c = ca[i];
If the first character is a space, remove it by using the substring() method. Continue doing this until the first character is not a space. while (c.charAt(0)==' ') c = c.substring(1,c.length);
Now string c begins with the name of the current cookie. If this is the name of the desired cookie if (c.indexOf(nameEQ) == 0)
we've found what we were looking for. We now only need to return the value of the cookie, which is the part of c that comes after nameEQ. By returning this value we also end the function: mission accomplished. if (c.indexOf(nameEQ) == 0) return c.substring(nameEQ.length,c.length);
}
If, after having gone through all cookies, we haven't found the name we're looking for, the cookie is not present. We return null. return null;
}
Cookie read.
eraseCookie
Erasing is extremely simple.
eraseCookie('ppkcookie')
Pass the name of the cookie to be erased and call createCookie() to set the cookie with an expiry date of one day ago.
function eraseCookie(name) {
createCookie(name,"",-1);
}
The browser, seeing that the expiry date has passed, immediately removes the cookie.
Monday, January 5, 2009
ICU DateFormat - Year Representation
Example:
December 31, 2008 formatted with YYYY/MM/dd yields 2009/12/31
December 31, 2008 formatted with yyyy/MM/dd yields 2008/12/31
ICU - International Components for Unicode
ICU stands for International Components for Unicode.
ICU is a cross-platform Unicode based globalization library. It includes support for locale-sensitive string comparison, date/time/number/currency/message formatting, text boundary detection, character set conversion and so on.
History
ICU was originally developed by the Taligent company. The Taligent team later became the Unicode group at the IBM® Globalization Center of Competency in Cupertino.
Developing globalized software is a continuous balancing act as software developers and project managers inadvertently underestimate the level of effort and detail required to create foreign-language software releases.In general, the standard process for creating globalized software includes "internationalization," which covers generic coding and design issues, and "localization," which involves translating and customizing a product for a specific market.
ICU Services provides standard platform-independent libraries to resolve this issue.
The ICU services support all major locales with language and sub-language pairs.
Services of ICU
ICU enables you to write language-independent C and C++ code that is used on separate, localized resources to get language-specific results. ICU supports many features, including language-sensitive text, dates, time, numbers, currency, message sorting, and searching. ICU provides language-specific results for a broad range of languages.
The set of services provided by ICU includes:
Strings, Properties and CharacterIterator
Conversion Basics
Locale and Resource Management Support
Date and Time Support
Format and Parse
Formatting Numbers
Transformations
Searching and Sorting
Text Analysis
Text Layout
Search String
ICU and Java
Java™ classes developed at Taligent were incorporated into the Java Development Kit (JDK) 1.1 developed by Sun® Microsystems. The classes were then ported to C++ and later some classes were also ported to C. The classes provide internationalization utilities for writing global applications in C, C++, or Java programming languages.
ICU for Java (ICU4J) includes enhanced versions of some of these classes, plus additional classes that complement the classes in the JDK. C and C++ versions of the same international functionality are available in ICU for C (ICU4C). The APIs differ slightly due to language differences and new functionality.
For example, ICU4C includes a character converter API.ICU4J and ICU4C keep the same development goals. They both track additions to the Java internationalization APIs and implement the latest released Unicode standard. They also maintain a single, portable source code base.
Reference
http://icu-project.org/