SEARCH KEYWORD -- Application field
Use Java ThreadLocal with caution
According to Oracle documentation, ThreadLocal is a class provides thread-local variables. These variables differ from their normal counterparts in that each thread that accesses one (via its get or set method) has its own, independently initialized copy of the variable. ThreadLocal instances are typically private static fields in classes that wish to associate state with a thread. In short, ThreadLocal variables are variables belong to a thread, not a class or an instance of a class. One common...
JAVA,MEMORY LEAK, THREADLOCAL 2015-11-03 07:31:57
Is Java the platform of the future?
I've mentioned before, but I think we are living in a period of time where a bigger explosion of programming languages is occurring than at any time in the past four decades. Having lived through a number of the classic languages such as BASIC, Simula, Pascal, Lisp, Prolog, C, C++ and Java, I can understand why people are fascinated with developing new ones: whether it's compiled versus interpreted, procedural versus functional, languages optimised for web development or embedded devices,...
Show Bootstrap tooltip in AngularJS ng-repeat elements
In contemporary web application development, many front-end frameworks have been used to accelerate the speed of development and circumvent browser compatibility issues. Among them, AngularJS and Bootstrap are two frequently used. AngularJS is a MVC JavaScript framework developed by Google to provide easy synchronization between user view and data model. While Bootstrap is developed by Twitter and it eases the work of designing a simple and concise UI without much manual design work ...
Beauty of code : How to write graceful PHP code
Writing good code is an art. In order to achieve this, it is necessary to develop good programming habits at the beginning. Good programming habits not only contributes to the early project design (modular),but also allows you to the code easier to understand, so that the maintenance of the code is easier. Bad programming habits will result in more code bugs, and will make future maintenance work difficult. We introduce some good programming habits taking PHP as example. Hope this will help you....
Android Security
Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an alternative to Apple’s iOS, is now slowly eating into the market share of Apple and is of primary concern to the company. Let’s have a brief introduction about android and then look into the security concerns and vulnerabilities that need to be focused on. Android Introduction: Android was deve...
Android security,Input validation 2013-04-16 12:19:37
Will Microsoft use Windows 8 to replace Metro?
Since there is some dispute with a German company Metro AG on the word "Metro", it is said that Microsoft will abandon "Metro" in Windows 8. Then what will be the replacement of "Metro"? According to Zdnet, the answer may be Windows 8. Microsoft reminds Windows developers not to use "Metro" when they mention interface of Windows Phone or Windows 8 in their apps and recommends that the developers use New User Interface when they describe Windows 8 style interface design. Microsoft officially anno...
Access control in Java -- Permission check order
Previously we showed you how to turn on SecurityManager in Java. After SecurityManager is turned on, a series of permission checks will be applied on the code you are calling in your application to protect some resources against malicious access such as files, sockets etc. To perform these permission checks, a set of Permissions will be created and checked using the AccessController. The AccessController has three purposes : To decide whether an access to a critical system resource is to be all...
JAVA,SECURITY,ACCESSCONTROLLER 2016-03-07 04:17:40
3 reasons why Alibaba invests on Sina Weibo
Last night, Alibaba announced acquisition of 18% shares of Sina Weibo with $586 million, according to sources close to the deal, after the completion of this deal, Alibaba will become the second largest shareholder of Sina Weibo and may become the largest shareholder in the future.This deal was supposed to be completed before Chinese Spring Festival, but because Alibaba and Sina had a heated argument about the share holding of Sina Weibo which resulted in substantial delay in the time to complet...
Alibaba,Sina Weibo 2013-04-29 20:30:05
Google launched new Chromebook in cooperation with Samsung
According to report from technology blog GigaOm, Google and its partner Samsung launched a new Chromebook and Chromebox yesterday, mainly targeting at education and corporation market.New Chromebook looks like any other 12.1 inch computer, while Chromebox is a mini PC that can be connected to peripherals such as keyboard, mouse and monitor, just like Apple’s Mac Mini. Currently prices for Chromebook and Chromebox are $499 and $329 respectively.They both are equipped with Intel Core proces...
Google,Chromebook,Samsung 2012-05-30 04:58:28
HTTP Server development resource summary
This article summarizes some materials, articles and books I used when learning HTTP Server development. Hope this will help you. RFC and standard documents RFC2616 – Hypertext Transfer Protocol — HTTP/1.1 HTTP protocol standard document, it's an essential reference document for all personnel engaged in the development of the HTTP-related projects, careful study is recommended. RFC793 – TRANSMISSION CONTROL PROTOCOL TCP Protocol standard document The WWW Common Gateway Interfac...
HTTP Server,Book,Article 2012-09-25 22:46:56
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>