SEARCH KEYWORD -- Place
Difference between Beijing and Silicon Valley on innovation
The fundamental difference between Beijing and Silicon Valley is not the sky color, but the fact that on one side the young people are talking about buying a new house, a new car and getting married, while on the other side young people are talking about how to change the world. Now and then we can read from the newspaper or the Internet that a Silicon Valley company is valued over 1 billion US dollars. Also we can see many famous US IT brands on the Internet such as Google, Facebook,Twitter, Am...
China,Silicon Valley,Innovation, Comparison 2013-06-24 03:09:54
TIOBE : What's the future of C#?
TIOBE released the programming language index for August 2012, the top 3 programming languages are still C, Java and Objective-C. Objective-C still performs well after it ranked 3rd place last month, it's still rising. Is there any possibilty Object-C will overtake Java in the near future? However, Microsoft's C# doesn't look so good. C# is generally recognized as the enterprise language with most modern and expressive features available today and C# has shown more downward trends in the past an...
Best Tips for a brilliant responsive design
Portability of mobile devices have made it easier for the users to access internet. Consequently , this has increased a lot of of mobile traffic and has given birth to new terms such a mCommerce. Now the point is that as we know that technology is ephemeral , will we keep on investing time and money every time a new gadget is launched? Indeed yes, because this is what market demands! But what if I say a that there is a technology which is independent of the size of the devices or a technol...
responsive, mobile 2015-07-01 01:25:37
GitHub launches a separate training page
Code hosting community Github has much proud data: 55 employees, Andreessen Horowitz promised a $100 million investment, $750 million valuation, a place developers stay longest since its launch in 2008 ... Github announced the official launch of a separate teaching page, to teach developers collaborative programming through various forms. Github announces the detail about the training program on its official blog, the entire training project has two modes : free and paid. The content of their t...
GitHub,Training,Open source 2012-10-07 05:45:47
About tmpfs
tmpfs is another confusing name in Linux kernel, its implementation is in mm/shmem.c, shmem has no relation to tmpfs at first glance although we know tmpfs is based on memory. We can understand why we use this name by seeing where this is used. In a desktop Linux system, tmpfs is loaded usually: % grep tmpfs /proc/mountsdevtmpfs /dev devtmpfs rw,seclabel,nosuid,relatime,size=1958956k,nr_inodes=489739,mode=755 0 0tmpfs /dev/shm tmpfs rw,seclabel,nosuid,nodev,relatime 0 0tmpfs /run tmpfs rw,seclab...
tmpfs,Linux,file system 2013-06-14 12:10:56
SD Cards: Why Order Them In A Bulk?
Backing up important data is an undeniable aspect of the technologically advanced modern world. Be it photographs, videos, movies or other significant data, they all need to be stored properly for future use. SD card or Secure Digital card is one such device that will help store all the relevant materials securely. As the name suggests, it secures all digital data. To understand why we should order bulk SD cards, we need to know why they are so beneficial. They are extremely compact,...
Do you really understand Geolocation?
LBS(Location based service) services continue to emerge, it seems that every product has some relationship with maps. But to be honest, do you really understand what is Geolocation? Not necessarily. Although lots of products have LBS service, they can be categorized as sign, search, navigation and information display, these are functional features of the map as a software should have. However, Geolocation is not software, it is just a functional feature, a functional feature of all LBS applicat...
geolocation,app,significance 2012-10-22 12:11:41
Public Vs. Private Cryptocurrency Keys
Before investing in any form of cryptocurrency, you must become familiar with the terminology used in the industry. This will prevent mistakes that could jeopardize your entire investment, and no one should be investing in any type of security or asset that they don't fully understand first. Crypto Wallets Before we even delve into what public and private keys are, we first need to discuss what the keys are for. Your Bitcoin or crypto wallet is basically the account that you store your cryptocur...
SECURITY,CRYPTOCURRENCY 2022-03-06 08:17:30
Why does LinkedIn migrate to NodeJS from Ruby?
Node.js, the server-side JavaScript-based software platform used to build scalable network applications, has been all the rage among many developers for the past couple of years. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices. Because of these advantages, there are many websites are migrating to Node.js.One of them is LinkedIn. LinkedIn was initially built on Ruby...
Service discovery with etcd
In previous post, we have talked about etcd and its usage. This post we will cover how to implement server discovery with etcd. Service discovery is to solve one of the most commonly seen scenarios in distributed system where how to find the corresponding target service to talk to. In short, it is to find some server which one can talk to based on some service name. A complete service discovery system include below three key functions: Service registration: A service must register itself to so...
ETCD,SERVICE DISCOVERY,DEMO,TUTORIAL 2021-03-08 05:36:29
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>