SEARCH KEYWORD -- AUTO UPDATE
How to project a phone screen to a PC in Windows 10
In this post, we will show you a simple way to project a phone to a PC in Windows 10. Windows 10 provides a feature called Project to this PC which allows to project other devices on a PC installed with Windows 10. Below are the steps for doing this. 1.Press Win + i key to open Windows Settings. 2. In System menu, click Project to this PC option. Then select either Available everywhere on secure networks or Available everywhere. 3. Now open your phone which you want to project. Ensure it connec...
PHONE,WINDOWS 10,WIRELESS PROJECTION 2020-03-06 19:53:40
Do you still remember things you saw around you as a kid
I believe we all have unforgettable childhood, we might see many weird stuff around us and had deep impression about some cool stuff. Some of the old stuff may extinct now but every time when we saw an item rare to be seen, the old memories may flush into our brain immediately and we would be excited about it. Can you still remember things around you as a kid? Here are some of them, if you were born at 80's or 90's, you may be familiar with these. 1. Windows 95 and Windows 98 We could see these ...
Algorithm: Traverse binary tree
Preface There are three ways to traverse a binary tree based on the traversing order. Pre-Order: Root - Left - Right In-Order: Left - Root - Right Post-Order: Left - Right - Root Take below binary tree as example The node to be traversed in different order would be Pre-Order: A - B - C - D - E - F In-Order: C - B - D - A - E - F Post-Order: C - D - B - F - E - A Below are the implementations of different orders for traversing the binary tree. Pre-Order Traversing Recursive implementation N...
ALGORITHM,BINARY TREE 2019-03-01 22:49:04
Mac evolution history
Apple's WWDC is coming in a few hours. All Apple fans are expecting that Apple will release some new amazing Apple products. This year, what are we expecting? The result will be revealed in just a few hours. Before that, we can look back about the history of some Apple products such as Mac. Below is the Mac evolution history summarized by iheartapple2.com. We can take a few minutes to go through it. Reference : http://iheartapple2.com/post/52498663368...
Differences between bashrc and profile in Linux
After login to a Linux system, the command console will show up with a prompt label such as # or ~, a shell command can be typed after this prompt and the system can execute the command thereafter. All these operations are handled by shell. Shell is a command language interpreter that executes commands read from the standard input device (keyboard) or from a file. There are different types of shells such as bash, ksh, csh etc. The most commonly used of them is bash and it's also the de...
LINUX,PROFILE,BASH,BASHRC,.BASHRC,.PROFILE 2016-11-05 22:17:51
JShell -- The command line tool to run Java code in Java 9
Java 9 is currently a work-in-progress and is planned to be GAed in March 2017. Quite a few new features will be introduced in the new release. The coolest feature is project Jigsaw which is to modularize the Java packages so that a customized JDK can be built and shipped with only the necessary modules to fulfill their project requirement. Apart from this feature, another big new feature is project Kulla -- JShell. In simple, JShell is a command line tool which can be used to run...
The hidden risk of passing slice as function parameter
In Go's source code or other open source libraries, there are lots of cases where a slice pointer is passed to function instead of slice itself. This brings up a doubt why not passing slice directly as its internal is backed by an array pointer to point to underlying data? For example, in log package, the formatHeader function takes a parameter buf as type *[]byte instead of []byte. func (l *Logger) formatHeader(buf *[]byte, t time.Time, file string, line int) {} Let's understand the r...
GOLANG,SLICE,SLICE POINTER 2020-12-13 06:11:14
What is cache penetration, cache breakdown and cache avalanche?
When designing and developing highly available system, cache is an very important consideration. It is useful to cache some frequently accessed data so that they can be accessed quickly and also cache can protect the downstream system like DB from being hit too often. To provide better cache design in large systems, some problems may need to be considered first. In this post, we will talk about some frequently discussed cache problems and mitigation plans. Cache penetration Cache penetrati...
SYSTEM DESIGN,CACHE PENETRATION,CACHE BREAKDOWN,CACHE AVALANCHE 2020-04-10 08:43:00
Shortcut keys in Sublime Text 3(Animated demo)
Sublime Text 3 is a light weight code editor which supports lots of languages. It has lots of shortcuts and plugins easing work of programmers. In this post, we will introduce some shortcuts supported in Sublime Text 3 and show how powerful they are. 1. Select sibling matching(equal) word (Ctrl + D) Put the cursor on one word, press Ctrl + D to select the word, then press Ctrl and following by pressing D, it will select next matching word. The number of Ds pressed will mean number of matching wo...
TIPS,SHORTCUT KEY,SUBLIME TEXT 2016-04-28 02:41:28
Create tweet without explicitly showing the link URL
When crafting a tweet, there are instances where we may wish to include a link, but we prefer the preview to be shown without displaying the URL explicitly after the tweet is published. How can we accomplish this? This article outlines the steps to achieve it. To begin, copy and paste the link you want to share into the tweet box. After clicking Post, the tweet will be published without displaying the link; instead, it will showcase the page preview, and clicking on the preview image will open ...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>