SEARCH KEYWORD -- Background image path
People Detection Radar [IoT] : Build a Raspberry PI Xandar Kardian IoT People Count Radar
Program Design Purpose: People detection sensors and radars are utilized in various applications across multiple fields such as security and surveillance, healthcare, building automation, smart cities, transportation and autonomous manufacturing systems. This project aims to develop a prototype IoT device for an indoor people counting using the Xandar Kardian people detection radar and a Raspberry Pi. The device will be network-ready and easily integrated with other systems. The Python-based I...
Let your page be alive
With development of Internet, Web pages lie everywhere. How to design a visually attractive web product is becoming a major concern of designers, A complete webpage consists of the combination of points, lines and layers. If you want to let your page design be alive, you should put your efforts on below 4 aspects. 1. Flexible font use In a webpage, texts are the major information carrier and are what users care mostly about. It's the main element to convey messages to readers. The font size, col...
UI design,White space,Geometric graph 2013-07-23 03:09:51
Do you really understand Geolocation?
LBS(Location based service) services continue to emerge, it seems that every product has some relationship with maps. But to be honest, do you really understand what is Geolocation? Not necessarily. Although lots of products have LBS service, they can be categorized as sign, search, navigation and information display, these are functional features of the map as a software should have. However, Geolocation is not software, it is just a functional feature, a functional feature of all LBS applicat...
geolocation,app,significance 2012-10-22 12:11:41
How to reset root password in MySQL 8
The user password in MySQL is stored in the user table, the password reset is actually to change the value of record in this table. To change the password in case the password is forgotten, the idea is to bypass the authentication of MySQL and get into the system and update the record password value with SQL command. In MySQL 5, one can start MySQL service with --skip-grant-tables option, this option will tell the service to skip loading the grant tables when starting, hence the root user can lo...
Apple.com is down
UPDATE : The service is back now! Apple.com is now inaccessible. It shows below "Access denied" message on its official site. It is still unknown why the service is down. And there is no ETA on when the service will be back to normal. From the error message, some people think this happens because Apple uses Akamai's security product and the security policy in place is violated. It's basically a WAF. The big issue is it takes 45 minutes for changes to propagate through Akamai's network. So, you ...
IPHONE 6S,IPHONE 6S PLUS,APPLE 2015-09-12 00:50:17
Different types of keystore in Java -- DKS
Domain KeyStore(DKS) is a keystore of keystore. It abstracts a collection of keystores that are presented as a single logical keystore. Itself is actually not a keystore. This new keystore type is introduced in Java 8. There is a new class DomainLoadStoreParameter which closely relates to DKS. To load different keystores into the single logical keystore, some configuration is needed. Here is the format of the configuration for grouping different keystores. domain [ ...] { keystore [ ....
Apple share price drops again
According to Sina Financial, Due to worries about mini iPad shipments for the second quarter, investors continued to sell Apple stock (AAPL) on Wednesday, its intraday stock price fell 4.8% to its lowest level for the past year.Beijing time 23:00, Apple shares fell 4.76% to $405.97. DigiTimes reported that due to lack of market demand, mini iPad shipments fell 10% to 20% in the second quarter.Edward Parker from Lazard Capital wrote: "We continue to expect that Apple is at risk, it's mainly on a...
Apple,Stock price,Drop 2013-04-17 12:04:48
Cool HTML5 matrix effect
Do you still remember the movie The Matrix? Do you still remember the cool matrix effect in that movie? How is that effect achieved? Shaun Dunne shared a piece of HTML5 code which displays a cool matrix effect. The matrix demo can be found here. Below is the code which he achieves this effect: with var s = window.screen; var width = q.width = s.width; var height = q.height = s.height; var letters = Array(256).join(1).split(''); var draw = function () { q.getContext('2d').fillStyle='rgba(0,0,...
OpenLDAP Proxy -- Installation and configuration
After understanding what the configuration would be for an OpenLDAP proxy, it's time to explain the installation of OpenLDAP proxy and how to make it run. In this post, we will cover how to install OpenLDAP proxy both locally and using docker. Local installation The installation is quite easy, there are a few packages to be installed including the ldap server, ldap client and some utilities. Below steps are for CentOS, the instructions for other platforms should be similar with minor differ...
INSTALLATION,CENTOS,DOCKER,OPENLDAP,OPENLDAP PROXY 2017-11-03 20:26:41
Python and PLC Communication
This article provides detailed steps on how to use Python to communicate with Schneider M221 and Siemens S7-1200 PLCs via Ethernet. Additionally, we offer a packaged Python PLC client library, enabling you to easily build your own SCADA control programs, such as Human-Machine Interfaces (HMI). The system overview is shown below: To check the project detail please refer to Python Physical PLC Communication Clients # Created: 2024/06/29 # Version: v0.1.3 # Copyright: Copyright (c) 2024 ...
PYTHON,PLC,COMMUNICATION 2024-06-30 02:21:17
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>