SEARCH KEYWORD -- BLOCK ACCESS
Nielsen : Google ranks No.1 web brand
Nielsen released the 2012 digital industry rankings report, The report said Google continued to rank No.1. for web brand From January 2012 to October 2012, the average monthly unique visitors reached 172 million. Followed by Facebook which has 153 million average monthly unique visitors. In 2012, the online video service continues to grow, YouTube is still the largest online video site, an average annual 132 million unique visitors. Top 10 U.S. Web Brands of 2012 For the details of other ranks ...
Jelly Bean becomes the most popular Android OS
Google released the latest Android usage stats on Monday. Jelly Bean becomes the most popular Android OS for the first time. It takes 37.9% Android market share(32.3% from 4.1.x and 5.6% from 4.2.x). Ginegerbread is at the second place and it has 34.1% Android market share. This is a good news to many Android developers as they can use many new features provided in the new system if there are more and more users are using the new OS. Also if Google wants to attract news users, they have to enco...
Android,Jelly Bean,Usage 2013-07-09 04:52:28
Set file permission in Java
Prior to Java 6, there is no good solution at the Java level to provide file permission management. You need to implement your own native methods or call the Runtime.exec() to invoke the system routine such as chmod in LInux. Since Java 6, Java introduces a set of methods which can be used to set the file permission at Java level. These methods include: File.setReadable(boolean); File.setWritable(boolean); FIle.setExecutable(boolean); File.setReadable(boolean, boolean); File.setWritable(bo...
JAVA, FILE PERMISSION, POSIX,learnjava 2015-08-29 03:37:37
A mini guide to HTTP referer
In HTTP header, there is a field named Referer which is to provide the referrer of the current accessed page. In this post, we will introduce the usage of HTTP referer field. On the web, when a user visits a webpage, s/he must be from some place. This place is usually referred a s referer. This information is very important to some website operators and server owners as they want to know where they get the traffic from and this helps them provide better service for potential targeted users. In t...
HTML,HTTP REFERER,REFERRERPOLICY 2019-06-29 02:23:25
Additional steps need to implement to setup shadow-boxV2 OPTEE on Raspberry PI
We followed the Shadow-box v2 project from the https://github.com/kkamagui/shadow-box-for-arm to set up the trustZone on Raspberry PI modeB to protect the Linux Kernel. But got a problem when doing the step: [3.6.5. Activate Shadow-Box for ARM and Start Secure Pi!] to create the hash for the memory area. The result is not shown. If you met the same problem, this is what I did to fix the problem on my PI: 1.1 When we do the step [3.5.1. Copy OP-TEE OS with Shadow-Box for ARM and N...
HARDWARE,RASPBERRY PI 2019-05-20 08:52:55
Qihoo 360 confirms the cooperation with Google
Affected by the news that Qihoo 360 would cooperate with Google, Qihoo 360 and Baidu are treated differently in capital market at the beginning of 2013. Analysts have high expectations on Qihoo 360 and increase its performance expectations for fiscal year 2013, while Baidu suffered price target downgrades.According to Sina technology news, Qihoo 360 confirmed this news to ZDNet, but they refused to disclose more details. According to Qihoo 360, there is some kind of cooperation existed between ...
Facebook steps into the $100 billion club
According to 36 Kr, investors and analysts seemed to be inspired by the Q2 earnings report released on 24th July by Facebook, Facebook share price increased by more than 50% post that. As the U.S. stock market closed, Facebook share price rose $0.79 yesterday, closing at $41.34. As of now, Facebook's market capitalization has reached 100.676 billion U.S. dollars.The reason why Facebook share price kept dropping since its IPO is because investors doubted,the ability of Facebook on selling advert...
Facebook,Share price 2013-08-27 03:48:12
How to optimize MySQL insert statement
For a big data system, one problem is the data access efficiency, one more problem is that the data insertion is very slow. We had a service system, the data loading process would take 4-5 hours. This time consuming operation is risky since if the program is interrupted during the loading process, it might be rerun, this will be troublesome. So it's necessary to improve the insertion efficiency for big data systems. Here we provide two optimization suggestions. 1. Combine multiple insert stateme...
MySQL,insert,optimization 2012-10-24 22:03:13
10gen provides free training courses for MongoDB
MongoDB is an open source document oriented database, developed with C++, it is to solve some real problems existing among development communities. In October 2007, MongoDB development began at 10gen, in 2009, MongoDB was open sourced as a standalone product. 10gen provides technical support, training and consultancy service. According to 10gen education, 10gen will provide some training courses for MongoDB starting from 22 October, 2012. Now it's available for registration. There are two cours...
HeartBleed: Should C be blamed for the HeartBleed bug?
There is a discussion about the security of applications written in C on Hacker News recently after the report of HeartBleed bug in OpenSSL. In this discussion, some people are saying that the applications written in C are unsafe. It seems all or most of the faults should be laid on C. I think this is biased. The language itself should not be blamed.Safety is a relative term for programming languages. No language is absolutely safe. We claim some languages like Java and C# are safer than C/C++ b...
C,HeartBleed,Analysis,Code review 2014-04-14 03:52:55
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>