SEARCH KEYWORD -- ARTICLE WRITE



  Huawei phone with HarmonyOS installed is becoming real

In past few days, there is a photo of a Huawei phone with HarmonyOS installed appearing on the web. This is an engineering testing phone circulating inside Huawei according to the source.  This is the first time that a real phone with Huawei's own operating system HarmonyOS installed is being seen on the web. This indicates that it will not be that far for general public to be able to access the new Huawei self developed OS. From the photo, there are a few indications: This phone sample s...

   HUAWEI,HARMONYOS,P40     2020-05-19 08:23:48

  One Way to Quickly Locate SQL with High CPU Usage in MySQL

When the CPU usage of a MySQL database rises abnormally, it's necessary to quickly identify the problematic SQL statements. In this post, we try to provide one way to achieve this.  Below are the actual steps. 1. Use the top command to find the threads with the highest CPU usage in the MySQL process. # Find the MySQL process ID ps -ef | grep mysql # Use the process ID to find the thread IDs with the highest CPU usage: top -H -p In top, press P to sort by CPU usage. Note the thread ID, fo...

   MYSQL,DEBUG,HIGH CPU,SLOW QUERY     2024-08-01 21:25:48

  Google search now highlights search text in target link page

It seems Google is slowly releasing a new feature to highlight search text when user opens a matching search result link through its search engine.  Now for example if you type something in the Google search bar, you will see normal search results. But when you click the link, e.g, the first search result to Stackoverflow, you will see something like below after the link is opened. The searched text is highlighted and the page automatically scrolls to the position where the search text ap...

   GOOGLE SEARCH,FEATURED SNIPPET,TECH NEWS     2020-06-13 06:09:38

  How to use xargs command in Linux

What is the xargs command? The xargs command constructs and executes commands provided through standard input. It takes input and converts it into command arguments for another command. This functionality is particularly useful in file management and can be combined with commands like rm, cp, mkdir, and others. Using the xargs command When used alone, the xargs command prompts the user to enter a text string and then passes it to the echo command. This example demonstrates the input provided an...

   XARGS,LINUX     2023-11-17 11:19:41

  Here is Surface Pro 4

Microsoft is holding a new product release event today in New York. The biggest excitement Microsoft brings us is the Surface Pro 4. The most advanced Microsoft tablet ever equipped with Windows 10. Here are the selling points of Surface Pro 4: Performance 6th generation of Intel Core processor 30% faster than Surface Pro 3 50% faster than MacBook Air Up to 15 G RAM Up to 1TB storage 8.4 mm. Thinnest Surface Pro ever Four USB 3.0 ports Two 4K display ports Ethernet One productive connection S...

   WINDOWS 10,SURFACE PRO 4,MICROSOFT     2015-10-06 10:39:57

  Weibo is testing an Instagram like app called Lvzhou

Weibo, the Chinese version of Twitter, is testing an Instagram like app called Lvzhou(Oasis in English). Now only invited people can access the app. You can download the app on App Store if you are an iPhone user or you can download online if you are an Android user. The vision of this app is to allow users to discover beautiful world, users can post photos or short videos and share with the rest of the world. Before you can access the app, you have to obtain an invitation code shared by y...

   INSTAGRAM,WEIBO,LVZHOU,OASIS     2019-09-07 09:59:54

  Apple.com is down

UPDATE : The service is back now! Apple.com is now inaccessible. It shows below "Access denied" message on its official site. It is still unknown why the service is down. And there is no ETA on when the service will be back to normal. From the error message, some people think this happens because Apple uses Akamai's security product and the security policy in place is violated. It's basically a WAF. The big issue is it takes 45 minutes for changes to propagate through Akamai's network. So, you ...

   IPHONE 6S,IPHONE 6S PLUS,APPLE     2015-09-12 00:50:17

  The details and analysis of capturing gRPC packets

Introduction If you're only using gRPC at the application layer, I believe studying the examples on the gRPC official website is sufficient. However, when planning to extensively use gRPC within a team, you will face many challenges, such as authentication schemes between services, routing solutions for multi-region services, and compatibility solutions with existing RESTful services. I recently realized that applying a technology stack requires mastering a wealth of information about that stack...

   GRPC,GOOGLE     2024-01-14 05:59:13

  How Query Optimizer Works in RDBMS

In a previous post, we discussed how the various relational operators are implemented in relational database systems. If you have read that post, you probably still remember that there are a few alternative implementations for every operator. Thus, how should RDBMS determine which algorithm (or implementation) to use? Obviously, to optimize the performance for any query, RDBMS has to select the correct the algorithm based on the query. It would not be desirable to always use the same algori...

   DATABASE,DATABASE DESIGN,DATABASE OPTIMIZATION     2019-04-20 07:26:32

  Three images to understand immutability of String in Java

String is immutable in Java. This means once a String object is created and instantiated, that object cannot be changed. Any operation on the String object will create a new Object instead of operating on the original content. Below are three images to help you understand String immutability in Java. Declare a String String s = "abcd"; s stores the reference to the string content created in the heap. Assign the String reference to another String variable String s2 = s; s2 stores the same ...

   STRING,JAVA     2016-03-11 20:58:28