SEARCH KEYWORD -- Article
How Java Application Developers Can Build Secure Internet Based Apps?
There are few compiled solution tested by experts to guide Java application development and maintenance team how they can start safe journey on Internet. Strong encryption, wise passwords, secure hardware are few of the tech tools that should be used by Java app development team to secure their Internet based apps. The Internet is most amazing yet most risky platform where nobody knows either they are doing safe transaction on Internet or there is some dog watching out for data packets t...
JAVA APPLICATION MAINTENANCE,JAVA APPLICATION DEVELOPMENT 2015-09-16 02:13:17
Samijyon : A tablet from North Korea
According to Sina Tech, North Korea Tech posted an article about Samijyon. Samijyon is a model of Android tablet manufactured by North Korea. You can buy it with $200 in North Korea. Smajiyon's hardware configuration is as good as Samsung and Apple, but it doesn't allow WiFi connection and ordinary North Koreans cannot connect to Internet as well, users can only connect to domestic network of North Korea. On this tablet, there are no built-in Google apps such as Gmail and Google Play. But...
Samijyon,North Korea,Tablet 2013-08-03 22:01:35
Google is returning back to China
It has been five years since Google announced its difficult decision to leave China in 2010. The well known reason was that Google didn't want to conform to China's censorship request on sensitive information. During these five years, many stories happened bbetween these two sides. Things may turn around now as there are a few indications where Google may return back to China at an appropriate time soon. The most convincing indication is that a customized Google play -- Google online shop may a...
Google,China,Alphabet,Google play 2015-09-06 04:13:30
Which program is using USB device?
Sometimes when we want to plug out our USB device, but the operating system tells us we cannot plug it out since some other processes are using the USB device. How do we know which process is using our USB device. Here is a simple solution.First, go to Start->All programs->Accessories->System Tools->Resource Monitor. (as in Windows 7, for other Windows systems, you may similar program called Resource Monitor but may not in the same location as in Windows 7).Then, open Resource Monito...
Windows.ISB device,Plugout problem,Solut 2011-07-22 09:20:13
Unix directory hierarchy history
As a beginner user of Unix or Linux, people would frequently get confused about the use of different directories of the system. For example, there is a /bin directory under root(/), it is used to store binary files. However, there are /usr/bin and /usr/local/bin under /usr which are used for storing binary files as well. Some systems even have /opt/bin. What are the differences among them? Though there are articles explaining different directories in *nix such as Filesystem Hierarchy Stan...
UNIX,LINUX,FILESSYTEM,DIRECTORY HIERARCHY,HISTORY 2016-10-21 23:47:17
Do you have this kind of comments in your source code?
Writing runnable code is the essential skill of a programmer, writing understandable comment is also a skill a programmer should acquire. There is some famous saying that bad comment is worth than no comment. Usually your code will be maintained by other people, if you provide them some difficult to understand or misguided comments, this will be nightmare to them. While at some other time, programmers may put some funny comments in their codes which may make others laugh. Today we...
Understanding Cursor and WindSurf's Code Indexing Logic
Background: The Importance of Context in AI Programming If the “intelligence” of large models, such as Claude 3.5 Sonnet, is the key factor driving a stepwise leap in AI programming capabilities, the other critical factor is the context length. Currently, Claude 3.5 Sonnet offers a maximum context length of 200k tokens. While this is more than sufficient for conversational models—capable of handling a 50,000 or even 100,000-word book with ease—it still falls far short for...
COMPARISON,CURSOR,WINDSURF,INDEXING 2024-12-21 20:23:54
Microsoft to launch Surface Pro 4 on October 6
Microsoft Microsoft has just updated on their website about an event to be held on October 6. This event will be held in New York at October 6 10am EDT. As described by Microsoft : "We have some exciting news to share about Windows 10 devices". Although there are no details about what these Windows 10 devices are, many think this is the time when new Lumia Phones and Surface Pro 4 will be launched. The Lumia devices will be Lumia 950 and Lumia 950XL. Both of them will be shipped wit...
SURFACE PRO 4,MICROSOFT,WINDOWS 10,LUMIA 2015-09-15 07:31:56
Send email from Ubuntu command line
First install exim4 and exim4-config using the package manager then install mailx sudo apt-get install mailutils and follow the prompts once this is set up use the command “mail” to check your mail. if you would like to send mail type “mail” followed by the email address to mail it to eg mail me@examplecom enter the subject and press enter the body and keep pressing enter as many times as you need to, when your body is finished, press “Ctrl” and “D" toge...
Ubuntu,Email,Command line,mailutils 2011-04-25 15:58:10
A trap about PHP random number
The method to get random number in PHP is very simple, we only need to use rand() function. int rand ( int $min , int $max ) One function call can return the random number in a specified range. But in fact, the random number in computer is actually pseudorandomness, generally to increase the randomness, we may set a random seed before calling rand(). void srand ([ int $seed ] ) According to other language features, we should pass a time value as a parameter to the srand() function, generally...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>