Skip to main content

Blog - Page 23

To be trusted, you must first be trustworthy; you need to be competent. Not only must you be competent, but you also need to establish a connection with the other party, which requires you to appear approachable. Psychologists have found that trust equals competence plus approachability, but being overly competent can create a sense of distance and threat. You also need to expose minor weaknesses to bridge the gap with others.

Read more →

Architecture can directly impact costs per feature. Let's compare Tight-coupling MVC, Cocoa MVC, MVP, MVVM, and VIPER in three dimensions: balanced distribution of responsibility among feature actors, testability and ease of use and maintainability.

Read more →

The key-value cache is used to reduce the latency of data access. What are read-through, write-through, write-behind, write-back, write-behind, and cache-aside patterns?

Read more →

Traditional NFS based design has metadata bottleneck: large metadata size limits the metadata hit ratio. Facebook photo storage eliminates the metadata by aggregating hundreds of thousands of images in a single haystack store file.

Read more →

Disclaimer: All things below are collected from public sources or purely original. No Uber-confidential stuff here.

Read more →

Names are a very important weapon. Researchers at Syracuse University found that when people use derogatory terms to refer to a certain social group, the suicide rate among that group tends to be higher. Names can also unite people; experimental results show that the name of a game influences people's ability to cooperate. When people cheer for themselves during a competition, they often achieve their best performance.

Read more →

A blockchain is an incorruptible distributed ledger that is hosted by multiple parties, secured by crypto algorithms and immutable and verifiable in data storage. The blockchain technology is applied in a wide range of industries.

Read more →

The cycle system enables people to follow through. It suggests every day should start with your to-do list, hours needed and plans. The secrets also lie in writing down goals and scheduling things with the calendar, instead of your brain.

Read more →

Different auth systems solve the problem with different needs. For a new start-up who does not want to build their own auth systems, the most suitable solution is auth0. Meanwhile, the best solution for a company that needs integrations of enterprise services is OneLogin.

Read more →

People cannot dominate an industry solely with superior technical skills, as the replicability and update rate of technology are extremely high. Maintaining a curious mind and deliberately exploring the world is another necessary condition for enhancing one's competitiveness. Allen Gannett interviewed numerous creative individuals and concluded that we must spend 20% of our waking time each day absorbing knowledge in our respective fields.

Read more →