Origin of orkut – Inspiring love story

A guy was traveling with his girlfriend in the train. Train meets with an accident. This guy searched his girlfriend everywhere but in vain. This guy grew up to become an IT technical architect. He hired many IT developers so that he can develop a software with them while will help him to find his girlfriend through the web. As thought, he was able to find her after losing millions of dollars and 3 long years. While, he was deciding to shut down his search operation, the CEO of Google met him and took over the application. The application was able to make a profit of 1billion dollar in the first year. This software made a whooping profit of 1 billion in its first year. The name of the software is known as orkut.
The name of the guy is orkut Buyukkokten. He gets a large amount from Google. He will become one of the richest men by 2009. Some more interesting facts about this guy are whenever a person opens an account in Orkut he gets $12 from google and when you add somebody in your friend’s list he gets $10. For even small things he gets paid. Google pays him as follow: $5 if you scrap someone and $4 when someone scraps you. For loading each photograph he gets $200. When you become someone’s fan he gets $2 and when someone becomes your fan he is paid $1.5. When you logout of orkut he is paid $1. He gets $0.5 each if you change your profile photograph or when you read your friend’s scrap-book or when you visit your friend’s friend list.
Definition of Open Source
The term “Open source” does not just represent right to use the source code. The distribution terms of open-source software has a necessity to meet the terms with the subsequent standards:
- Redeployment without charge
- Source Code
- Derived Works
- Reliability of the Author’s Source Code
- No inequity against Persons or Groups
- No favoritism against Fields of Endeavor
- Distribution of License
- License should Not Be precise to a Product
- License Must Not Restrict Other Software
- License Must Be Technology-Neutral
The certificate does not limit anyone from advertising or giving away the software as a module of a combined software distribution encloses programs from numerous different sources. The license does not entail a fee or other payment for such sale.
The program should consist of source code. It has to permit sharing of source code in compiled form. If some form of a product is not circulated with source code, there must be a fine revealed means of how to obtain the source code for a rational reproduction cost preferably, downloading via the Internet without charge. The format of source code must be like a programmer can be able to alter the program. Intermediate forms like output of a preprocessor or translator are not permitted.
The warrant must let them to make any modifications and derived works. It should permit them to be distributed the software under the similar conditions as the license of the original software.
The license possibly will confine source-code from being distributed in customized form only if the license agrees to distribute “patch files” with the source code for the intention of transforming the program at build time. The license must openly allow distribution of software built from modified source code. The license may need derived works to bring out different name or version number from the original software.
The license is required to distinguish beside any person or group of persons.
The license should not put a ceiling on making use of the program in a particular field of endeavor. For instance, it may not confine the program from being used in a trade, or from being used for genetic observations.
The rights enclosed to the program should be relevant to all to whom the program is rearranged with no need for implementation of an additional license by those parties.
The rights attached to the program should be unique. It should not depend on other program’s which is part of a particular software distribution.
The authorization should not put limitations on other software that is distributed in conjunction with the licensed software. For instance, the license should not claim that all other programs distributed on the similar medium ought to be open-source software.
No stipulation of the license may be predicated on any individual technology or style of interface.
How Google Saves People from Harmful Sites
If you do a Google search between 6:30 a.m. PST and 7:25 a.m. PST this morning, you probably saw this following message “This site may harm your computer” accompanied each and every search result. This was obviously an error, and Google were very sorry for the trouble caused to all their users.
What happened? Very merely, human error. Google flags search results with this message “This site may harm your computer” if the site is called to install malevolent software in the background or otherwise slyly. We do this to guard our users against visiting sites that could damage their systems. Google maintain a list of such sites through both physical and automated methods. Google work with a non-profit known as StopBadware.org to come up with criterion for maintaining this list, and to offer simple processes for webmasters to take their site from the list.
Google sporadically updates that list and released one such update to the site this morning. Unluckily (and here’s the human error), the URL of ‘/’ was incorrectly checked in as a value to the file and ‘/’ enlarges to all URLs. Opportunely, their on-call site reliability team found the problem rapidly and reverted the file. As we push these updates in a reeled and rolling fashion, the errors began appearing in this particular duration i.e. 6:27 a.m. and 6:40 a.m. and began disappearing amid 7:10 and 7:25 a.m., so the duration of the problem for any meticulous user was roughly about 40 minutes.
Google thanked their team for their quick work in finding this and they also apologized to all their users due to the inconvenience caused to them this morning and also to their site owners whose pages where incorrectly labeled. Google said that they will carefully interrogate this incident and put more robust file checks in place to avert it from taking place again.
Google Favicon
A favicon is a tiny icon that is usually accustomed to imitate the uniqueness of a web site. You can come across it in the address bar, in your browser’s tabs, in the bookmarks list or in some feed readers like Bloglines, dig, furl etc.
Google’s favicon is introduced in 2008. It is an edition of the lowercase “g” from its authorized logo. Google has a new favicon now. The new favicon is a fraction of a bigger set of icons developed for improved scalability on mobile devices.
Google’s favicon is hosted at google.com/favicon.ico.It is a 16×16 pixels image which is a usual size for favicons. . In this, the new icon is the depiction of a multi-colored lowercase “g”, highlighted with the colors of Google namely red, green, blue and yellow.Google swap the upper-case “G” in blue border, green and red borders with a lower-case purple “g” in a rounded corner rectangle.
India positioned fourth in the midst of top ten internet users
The escalating faith on the web build India stands fourth with the country being home for 81 million net users. The sum of internet users in the world is 134, 85, 72,040 by the end of 2007 and Asia is the core of about 568.7 million users.
The United States of America is on top of the chart with 220 million net users whereas China and Japan pursue with 210 million and 88.1 million users, in the same way. Next to India, Brazil set at the fifth rank with 53.1 million users. As stated by the statistics which was revealed by the Internet Governance Forum, United Kingdom stands as sixth uppermost internet usage center with 40.2 million citizens being accessible to the internet, followed by Germany with 39.1 million users, Republic of Korea with 35.5 million users, and Italy with 32 million users and France with 31.5 million users.
But if we consider broadband connection, India has no place in the top ten nations. But U.S. occupies first position with 73.2 million connections. The other countries who had bagged a position in the broadband chart are China with 66.4 million connections, followed by Japan with 28.28 million, Germany with 19.6 million, UK with15.6 million, France with 15.5 million, Republic of Korea with 14.7 million, Italy with 10.8 million, and Canada with nine million and Spain with eight million.
DNN has problems while executing SQL file
Are You facing a problem with DNN while you try to install a module?
Is DNN having problems in executing your file even it runs perfectly in Query Analyzer?
For example
If you have this line
set @var = @var+ 1.
DNN fails to execute it.
If you remove the blanks like
set @var=@var+1
DNN will truncates it to
set @var=@varSolution:
This problem is due to the format of the sqldataprovider you are trying to upload.
Check the format of sql script files.
DNN requires its sql script files to be in a unicode format.
1. Open sql script in Notepad;
2. Goto File > Save As
3. Save the file file over the existing sql script however specify the file type as Unicode.
DNN should now execute the script correctly.
Do not forget to replace the dbo. with {databaseOwner} and prefix table name with the {objectQualifier} tag
What is the difference between cgi and perl?
Most of the programmers were having confusion with .cgi and .pl.
Since the file with .cgi extension is using the perl code and it is running fine.
But the file with .pl extension which contains the perl code does not run.
Here is the answer for you
File extensions are generally meaningless. Windows preserves a map between programs and the file extensions which should be accustomed to open them. Apache, a web server which performs something similar like windows. CGI is an interface approved upon by rfc 3875 which is mainly used for passing information from web requests to executables. CGI has capable of bypassing data to several types of executable which can recognize it. Your .cgi files are possibly parsed for #! line which is responsible for mapping your exact .cgi file to be executed by Perl. Briefly, file extensions are virtually meaningless.
The extension simply notifies the server about how to handle it. cgi extensions tell it to run the script with whatsoever program is programmed at the top #! line. If the server is not notified to do the same with .pl files in that case it will not know what to do with it.
If you are lying on an apache server, adding up this line to the .htaccess file will make it parse .pl files through CGI
AddHandler cgi-script .pl
php code optimization tips
Do you know the ways to optimize your php code. Here we have some tips for you.
- If a method can be static, declare it as static. It will improve the Speed by a factor of 4.
- You should use echo as it is faster than print.
- If you have to concat string, Use echo’s multiple parameters.
- Set the value of how many times it should be iterated before the loop. Do not assign the value in the loop.
- When a variable is no longer useful, unset those variables which will free memory.
- Use absolute urls in includes and requires.
- To get the time of when the script started its execution, you must prefer $_SERVER [‘REQUEST_TIME’] than time ()
- Str_replace is faster than preg_replace
- It is much better to utilize switch statements than multi if, else if statements.
- Every time close your database connections when you got all the datas from DB
- Always use $row [‘name’] to get data from DB.Because it is 7 times faster than $row [name]
- Don’t use functions inside of for loop, such as for ($y=1; $y <= main ($arr); $y) the main () function gets called each time.
- If you declare a global variable and you are not using it in any function will slow down the performance because will check if the global exists or not.
- Methods should be in derived classes. This will run faster than the method which was defined in the base class.
- Surrounding your string by single quote (‘) instead of double quotes (“) will be little faster as php looks for variables inside “” but not inside ”.
- A PHP script will be at least 2-10 times slower than a static HTML page by Apache. So it is better to use lot of static HTML pages with less scripts.
- You must install a PHP caching product to naturally boost the performance by 25-100% by eliminating compile times. Your PHP scripts will be recompiled each time if the scripts are not cached.
- Do not use OOP concepts too much because each method and object call consumes a lot of memory.
- Split methods that has the code you will really re-use too much.Do not split all the functions.
Are you a real programmer? How can you tell that?
This is really amusing for one and all to read.
Machine code is your pseudo code
You trust that by means of a linker or a macro library to make a program is “dirty”, a real programmer does not get baffled when the source code get to 6000 lines in one file
You suppose that PC playoffs are a squander of CPU cycles.
While you are at a monetary firm coding for mainframes in mainframe assembly (the manager inform him to code in Assembly rather than machine code so the other ‘normal’ programmers may possibly be aware of what is going on)
You construct your individual programming languages and provide them crappy names.
You were not being fond of multicore systems. You accept as true that if you cannot formulate a program to run fast enough on a single core, you are not a programmer.
You will never utilize operating system interrupts … you make your own.
If your random number generator creates the random numbers from zero to infinity in 5 seconds, you believe it as very slow.
You consider that remarking the source code is for the amateur.
You don’t make use of computers outside of work. You will not have belief on other programmer’s code.
You judge that technologies like PHP, Python or VBA were not a programming language- it is only scripting language.
You don’t want to use Object Orientation for the reason that it makes your work trouble-free. In any case you wish for a challenge.
C++ and APL programming languages was a toy to you.
Someone point out the languages like VB and JAVA to you, you will give a punch them on the head.
Even if your code has been typed up, it was already optimized.
You get clear of the Back Space key on the Keyboard as you do not make any mistakes.
You don’t like to have any book or notepads; it’s all in your head.
Your programs are not user friendly, even if they are bug free.
You have a nightmare of creating your own CPU for yourself one day and maintain it in your parent’s garage.
You thought that IDE’s, Programmer Tools and Syntax Highlighters are for people who do not be familiar with what they are doing.
You return back the computer mouse to the technician, with a screw driver stabbed through it. Real programmers will make use of command prompt only.
If the client does not be fond of what you perform for them, you think that the client is an idiot and you say “No” to alter anything.
Who wants friends when you can program your own friends.
How to handle errors using Boolean flags
This error handling method may be the most ancient. Boolean flags were used by many programming languages, and PHP will not be an exception. Even though they are very simple to apply, the main negative aspect is that they were not very informative about the mistake that happened and its perspective. Here is an unsophisticated implementation of the FileReader class, which make use of Boolean flags:
[php]
class FileReader{
var $file;
var $fileDir=’fileDir/’;
function FileReader($file){
if(!@file_exists("{$this->fileDir}{$file}.php")){
return false;
}
$this->file=$file;
}
function getContent(){
if(!@$content=file_get_contents("{$this->fileDir}{$this->file}.php")){
return false;
}
return $content;
}
}
[/php]
Bearing in mind about the explanation for the above example, class errors might be handled as follows:
[php]
$fr=new FileReader(‘inexistent_file’);
if(!$fr->getContent()){
die(‘Unable to read file contents’);
}
else{
echo $fr->getContent();
}
[/php]
In the example, @ error suppression operator is intentionally used, so as to stay away from the complaints of the PHP interpreter and return a false value (or 0 or -1) when a failure happens. At first look, you can observe the incompetence of this method, plus its restricted flexibility. On the other hand, this approach has established to be quite victorious in procedural applications, or when client code is able to handle straightforward errors without corrupting the entire application.
Nowadays, we have investigated the pros and cons of common error handling approaches in PHP 4. Certainly, in huge web applications, a set of error controlling classes is preferred, so you are able to handle errors through a centralized point. Conversely, the trigger_error () / set_error_handler () combination may suit the requirements of small projects, so it is worth considering.




