SEARCH KEYWORD -- Data type
How to read Haskell like Python
Have you ever been in the situation where you need to quickly understand what a piece of code in some unfamiliar language does? If the language looks a lot like what you’re comfortable with, you can usually guess what large amounts of the code does; even if you may not be completely familiar how all the language features work.For Haskell, this is a little more difficult, since Haskell syntax looks very different from traditional languages. But there's no really deep difference here; you j...
Haskell,Python,Format,Like,Similarity 2011-11-15 08:45:39
Do American teenagers hate Facebook?
PewInternet released latest survey report about Internet and life. The report shows that Facebook is still the favorite social network of American teenagers, but it's also the most criticized one. Although some people enjoyed staying on Facebook, most people are complaining that there are more and more adult contents and negative social interactions on Facebook. The key findings are: Teens are sharing more information about themselves on social media sites than they did in the past. Teen Twitte...
American teenage,Facebook,Survey 2013-05-26 10:37:40
All I Know About Certificates -- Certificate Authority
One of the crucial steps in the TLS handshake is for the server to prove its identity to the client. While there is plenty of content explaining the principles of the handshake, there's less information about certificates, which are a critical component of TLS/SSL. This series of articles aim to explain what certificates are used for, how Google prevents others from impersonating Google, and why certificate issues frequently arise, among other topics. (Postscript: It took me a full 10 hours to w...
CLIENTS,WEBSITE,CERTIFICATE,SSL CERTIFICATE 2024-07-26 22:22:28
Generate certificate with cRLDistributionPoints extension using OpenSSL
In an X509 certificate, the cRLDistributionPoints extension provides a mechanism for the certificate validator to retrieve a CRL(Certificate Revocation List) which can be used to verify whether the given certificate is revoked. A cRLDistributionPoints extension can contain one or more DistributionPoints where the CRL can be retrieved from. Each DistributionPoint consists of three fields,each of which is optional: distributionPoint : it contains either a SEQUENCE of general...
X509,OPENSSL,CERTIFICATE,CRLDISTRIBUTIONPOINT,EXTENSION 2015-10-22 03:41:11
ARM adopts 64-bit architecture
ARM has disclosed technical details about its new v8 architecture - the first to include a 64-bit instruction set - at ARM TechCon 2011 in Santa Clara, California.The next-gen architecture will expand the reach of ARM processors in the consumer and enterprise markets where extended virtual addressing and 64-bit data processing are required.According to ARM CTO Mike Muller, ARMv8 architecture consists of two main execution states: AArch64 and AArch32. 

The AArch64 execution state int...
ARM,Processor,64 bit,Architecture,v8,Nvidia 2011-10-28 10:31:52
SpaceX's Starlink satellites were endangering other satellites
On 3 Dec 2021, The Permanent Mission of China sent a note to UN General Assembly complaining two dangerous approaches to China's Shenzhou space station from SpaceX's Starlink satellites during 2021. These two dangerous approaches were happening in July and October respectively and they almost caused collisions of the Starlink satellites and the Shenzhou space station because the two SpaceX satellites manoeuvred continuously to the orbit of China's space station. These dangerous approaches forced...
SHENZHOU SPACE STATION,SPACEX STARLINK,CHINA SPACE STATION 2021-12-27 10:56:51
Google feels the threat from Samsung
In response to Apple's iOS system, Google and Samsung stood on the same side. But with the increase of market share of Samsung Android devices, Google begins to feel the threat from Samsung.On MWC in Barcelona, a group of business executives said Google increasingly worried about Samsung after a private party. Because its equipment has occupied 40% of the Android devices, which could erode the Google advertising service. Google hopes manufacturers such as HTC and HP can challenge Samsung.It is r...
WireGuard VPN Troubleshooting
When you are working as a network/cluster admin for you team to config the WireGuard VPN for other members, you may meet some of the problems below and these are the solution you can try to fix them. ----------------------------------------------------------------------------------------------------------- Problem [1]: The WireGuard handshake request send from the client can be received from the server but the server's response was blocked at some where so the client can not receive serv...
WIREGUARD,VPN,TROUBLESHOOTING 2021-12-14 09:17:46
Handy PHP functions should be in your toolkit
When developing projects, there are always some common work should be accomplished, for example, encrption/decryption, get IP. As a PHP developer, you should have a list of the handy functions in your toolkit so that you can pick up in every project you work on. Here is a summary of some handy PHP functions. 1. PHP encryption/decryption Encryption/decryption can be used when storing user confidential information such as passwords. Below function uses base64 and MD5 to accomplish encryption/decry...
PHP,function,real IP,SQL injection 2014-12-06 08:46:08
Vim: revisited
I’ve had an off/on relationship with Vim for the past many years. Before, I never felt like we understood each other properly. Vim is almost useless without plugins and some essential settings in .vimrc, but fiddling with all the knobs and installing all the plugins that I thought I needed was a process that in the end stretched out from few hours to weeks, months even; and it the end it just caused frustration instead of making me a happier coder. Recently, I decided to give Vim ano...
Linux,Editor,Vim,Setup,Quick guideline 2011-12-12 07:55:27
RECENT
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- more>>