SEARCH KEYWORD -- Back slash



  Go 1.16 is released

Note: The post is authorized by original author to republish on our site. Original author is Stefanie Lai who is currently a Spotify engineer and lives in Stockholm, original post is published here. Last week, Go1.16 was released, bringing relatively more changes than version 1.15, which was influenced by the epidemic. The update is in many aspects, including compilation, deployment, standard library, etc. In the official Go document, all changes are classified based on Too...

   GOLANG,GO1.16,NEW FEATURES     2021-02-26 21:08:42

  Integer overflow

You may be familiar with integer overflow, but what you may not be familiar with is how gcc handles signed integer overflow. First let's look at the standard, for unsigned integer, the standard says : A computation involving unsigned operands can never overflow, because a result that cannot be represented by the resulting unsigned integer type is reduced modulo the number that is one greater than the largest value that can be represented by the resulting type. In other words, unsigned integer ov...

   Integer overflow,gcc,Linux     2012-10-20 13:33:10

  Everything you need to know about what happened at Apple’s Special Event 2019

Apple’s special event that was announced in mid-November is finally over. The company held a presentation event in New York City where it highlighted the best apps and games of 2019 with no new software or hardware announcements at all.   On the event, five different nominations were announced: Apple’s chosen favourite apps, top free apps, top paid apps, top free games, and top paid games for 2019. Usual keynotes from Apple The tech industry is pretty accustomed to Apple’s...

   APPLE,EVENTS     2019-12-04 05:50:15

  SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure

Project Design Purpose: In a Security Information and Event Management (SIEM) system, effective monitoring and visualization of scam events is crucial to detecting and responding to cyberattacks. Cybercriminals often use deceptive methods to exploit individuals or organizations, aiming to steal sensitive information, financial assets, or disrupt operations. This project seeks to develop a web plugin dashboard to help cybersecurity researchers and managers better understand the scope and impact ...

       2024-10-05 20:47:09

  JavaScript efficiency catch up

JavaScript is a very flexible language, we can write JavaScript code freely with various styles, different kinds of codes will have different execution efficiency. Here we summarize some tips we get from our development. Efficiency of JavaScript itself JavaScript has execution context chain, closures, prototype inheritance, eval etc. It brings us some magic features, but it also introduces the performance issue, if we don't use them properly, it will affect the codes execution efficiency. 1. Glo...

   JavaScript,efficiency,event delegation,eval     2013-04-02 04:08:46

  How to Stream Your PC Games to Android with Steam Link

If you are a PC gamer who is in a hurry to compete, Steam Link is looking for a possible answer. With this on your Android phone, you can play games on your phone with your computer. What is steam link? Basically, steam link is a perspective of streaming your steam library in other gadgets. The first steam link is a physical set of the best box you share with your TV, and after using its gaming PC after playing the Fate Grand Order game in your TV. The steam link application is another Andr...

   PC GAMES TO ANDROID WITH STEAM LINK     2018-06-03 05:04:33

  8 most successful open source products

Open source itself is a successful product. It is not only liked by many personals, many famous enterprises like itAlthough there are numerous open source projects and open source products, which is the most successful among them? "Success" is defined as the widely used + well known here. In many successful open source products, only a minority leaders. Here we share 8 most successful open source products we think they deserve to be.LinuxReason: Linux + GNU = GNU / Linux. It has been almost 2...

   Open source,MySQL,Linux,BIND,BSD     2012-04-19 08:29:00

  Balancing Convenience and Security in the Digital World

 Source The digital world has made everyday life easier in ways that were unimaginable a few decades ago. Online banking, smart home automation, cloud storage, and seamless communication have changed how people work and interact. With a few clicks or a simple voice command, tasks that once required time and effort are now completed instantly. However, this increased accessibility comes with risks. Every day, cybercriminals look for weaknesses to exploit, putting personal data, financial in...

   DIGITAL WORLD,DATA SECURITY     2025-02-07 06:14:43

  All I Know About Certificates -- Websites

In last article, we know the role of clients and their responsibilities for certificate verification. Finally, let's talk about websites. We've discussed many potential issues between CAs and clients concerning certificates, but the most frequent issue is with websites—many websites have faced this problem: certificate expiration. Websites need to ensure two things: Ensure their certificate does not expire. Protect their private key from being leaked. If someone else obtains the priv...

   CLIENTS,WEBSITES,SSL CERTIFICATE,CERTIFICATE AUTHORITY,CA     2024-07-26 22:33:29

  Flows.network: Writing an LLM Application in Rust

Over the past year, large language models (LLMs) have been booming and developing vigorously. As an enthusiast of data systems, it would indeed seem outdated not to pursue and research this hot field at all. This article summarizes my recent practical experiences attempting to write an LLM application using Rust with flows.network. Concepts Related to Large Language Models When talking about large language models, it's impossible not to mention ChatGPT and OpenAI. Although OpenAI recently change...

   LLM,RUST,APPLICATION,DEVELOPMENT     2024-09-30 21:38:04