SEARCH KEYWORD -- AUTO DIALER
Set file permission in Java
Prior to Java 6, there is no good solution at the Java level to provide file permission management. You need to implement your own native methods or call the Runtime.exec() to invoke the system routine such as chmod in LInux. Since Java 6, Java introduces a set of methods which can be used to set the file permission at Java level. These methods include: File.setReadable(boolean); File.setWritable(boolean); FIle.setExecutable(boolean); File.setReadable(boolean, boolean); File.setWritable(bo...
JAVA, FILE PERMISSION, POSIX,learnjava 2015-08-29 03:37:37
Remove the Small Arrow on Desktop Application Shortcut on Windows
Maybe many of us have seen a small arrow on desktop application shortcut after we install the application on Windows. Some may like it but some people may think it doesn't look beautiful enough. We may need to remove these small arrows somehow the desktop can be clean. So how? Many people may use a third party software to remove the small arrow, then they must go to download the software and install them. But do we necessary do this in order to remove the small arrow?The a...
SMALL ARROW,SHORTCUT,DESKTOP,APPLICATION,WINDOWS 2014-10-25 08:39:58
The history of the name Google
Google now is known almost by everyone who has internet access. It's the most frequently accessed search engine around the world and it provides fast speed and high quality search results. While you are using Google, have you ever wondered how the name Google comes? According to Steven Levy, the author of the book In The Plex: How Google Thinks, Works, and Shapes Our Lives. The original name for the project was named BackRub and was coded by Sergey Brin. He was thinking that web pages made thei...
GOOGLE,HISTORY,GOOGLE NAME,GOOGOL 2016-12-03 20:58:06
What I learned from a month of blogging and 250k visits
Roughly a month ago, I decided to give blogging another try, in earnest. I put out an article most days and up to 3 per day when I was experimenting with new channels.It has been fascinating.That being said, this is not a post about blogging tactics. It’s about what the experience has taught me about startups.Find the customers first, then build for themIt took me a long time to understand YC’s motto that you should:Make something people want.The first time I heard that, ...
Amazon unveils 8.9" Kindle Fire HD
Amazon today unveiled 7 products of Kindle family, including the $69 new Kindle; Kindle Paperwhite WiFi/3G, priced at $119 / $179; 7-inch Kindle Fire regular edition/HD version, $159/$ 199; 8.9inch Kindle Fire HD with WiFi/4G Edition at $299 /$499. However, the Amazon phone did not show up. The 8.9-inch Kindle Fire HD is today's highlight, because it looks real similar to iPad. Kindle Fire HD has the following features: 1920 x 1200 resolution, 254PPI Texas Instruments OMAP 4470 proce...
Amazon,Kindle Fire HD,tablet 2012-09-06 19:12:05
JavaScript efficiency catch up
JavaScript is a very flexible language, we can write JavaScript code freely with various styles, different kinds of codes will have different execution efficiency. Here we summarize some tips we get from our development. Efficiency of JavaScript itself JavaScript has execution context chain, closures, prototype inheritance, eval etc. It brings us some magic features, but it also introduces the performance issue, if we don't use them properly, it will affect the codes execution efficiency. 1. Glo...
JavaScript,efficiency,event delegation,eval 2013-04-02 04:08:46
Additional steps need to implement to setup shadow-boxV2 OPTEE on Raspberry PI
We followed the Shadow-box v2 project from the https://github.com/kkamagui/shadow-box-for-arm to set up the trustZone on Raspberry PI modeB to protect the Linux Kernel. But got a problem when doing the step: [3.6.5. Activate Shadow-Box for ARM and Start Secure Pi!] to create the hash for the memory area. The result is not shown. If you met the same problem, this is what I did to fix the problem on my PI: 1.1 When we do the step [3.5.1. Copy OP-TEE OS with Shadow-Box for ARM and N...
HARDWARE,RASPBERRY PI 2019-05-20 08:52:55
Facebook fires a few Chinese employees
There is a big news happening in the Silicon Valley in past few days. Facebook fired a few Chinese employees for bringing outsiders into Facebook's campus and canteen on a charged basis. It's well known that tech companies in Silicon Valley provide attractive welfare to their employees. We often heard about the news that lots of free service(including free food, free laundry, free massage etc) are provided to employees to encourage them to stay effective when working. This is good news and welc...
Facebook,Chinese employee, Chummy 2015-09-03 07:39:05
The Number One Trait of a Great Developer
Maybe the best programmers aren’t those who spectacularly solve crazy problems, but those who don’t create them, which is much more silent. – Lena HerrmannWhen I look around at other companies hiring Ruby on Rails developers, I see them focusing on three major traits: Super-smart; Large community following; Deep Ruby knowledge. They’re all wrong. While these are great aspects in moderation, they all miss the number one quality of a fantastic developer: Judge...
Concise bash programming skills
The following are some concise bash programming skills which we may need in our daily programming work. 1. Check status of command execution The usual way: echo abcdee | grep -q abcd if [ $? -eq 0 ]; then echo "Found" else echo "Not found" fi Concise way: if echo abcdee | grep -q abc; then echo "Found" else echo "Not found" fi Of course you can remove if...else with following code [Sun Nov 04 05:58 AM] [kodango@devops] ~/workspace $ echo abcdee | grep -q ...
RECENT
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- more>>