SEARCH KEYWORD -- Big Data Analytics Solutions
Get associated file icon with only extension name using C++ on Windows
I have searched on Google for a few examples on how to get associated file icon with only file extension name using C++ on Windows. There are some useful information provided on MSDN which explains the use of SHGetFileInfo() function.It also gives an example code, but it doesn't say how to do it with only the extension name. Here I give an example code on how to achieve this after I gathered and summarized some useful information from Internet. I have tested the code on my PC, it w...
File icon,Windows,Association,Extension name,C++ 2012-03-26 09:55:20
Facebook fires a few Chinese employees
There is a big news happening in the Silicon Valley in past few days. Facebook fired a few Chinese employees for bringing outsiders into Facebook's campus and canteen on a charged basis. It's well known that tech companies in Silicon Valley provide attractive welfare to their employees. We often heard about the news that lots of free service(including free food, free laundry, free massage etc) are provided to employees to encourage them to stay effective when working. This is good news and welc...
Facebook,Chinese employee, Chummy 2015-09-03 07:39:05
Google CEO : Facebook holds its users hostage
Google CEO Larry Page claimed in a media interview recently that it’s unfortunate that Facebook has been pretty closed with their data while Google is in the business of searching dataPage has been attacking Facebook ban on the search engine to search its data. In fact, the battle between the two sides has been going on for several years, and in June 2011 Google launched its social networking service Google+ which somehow further exacerbated the tension. On Monday, Page, in an interview...
Google,Facebook,Hostage,Larry Page 2012-05-23 05:58:07
Why should we drop or reduce use of MD5?
MD5 is a frequently used one-way hash algorithm, it is commonly used in following situations: Check data integrity. We take hash of the data stored in two different places and compare them. If the hash results are the same, then there is no need to check the actual data. This utilizes the collision-resistant feature. Two different data block will have little chance that their hash values will be the same. Many data service providers use such technique to check repeated data to avoild repeating...
MD5,Vulnerability,attack 2012-09-29 04:47:49
Encrypting and decrypting PGP file or text on MacOS
When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...
TUTORIAL,ENCRYPTION,DECRYPTION,PGP,GPG 2020-10-29 05:06:09
jQuery 2.0 will drop support for some IE6/7/8 oddities
jQuery official website releases its road map for the future jQuery development. This road map reveals that jQuery 1.8 will be released within a month and other consecutive versions will follow the following release plan:jQuery 1.9 (early 2013): many of the interfaces already deprecated in version 1.8 will be removed; some of them will be available as plugins or alternative APIs supported by the jQuery project. IE 6/7/8 will be supported as today.jQuery 1.9.x (ongoing in 2013 and beyond): This v...
jQuery 2.0,jQuery,IE support 2012-06-29 05:20:27
Windows 8 launch event data
Today on Microsoft Windows 8 launch event, Microsoft CEO Steve Ballmer and Windows manager Steven Sinofsky shared with us some data. Let's see what's happening to Windows. Since launch, Windows 7 system gains a total of 670 million upgrade and 400 million new PC installed with Windows 7.Microsoft's cloud storage service Skydrive, 200 million users share 11 billion photos and 550 million documents. new 2PB file uploaded monthly.(1PB = 1024TB)Windows 8 has been tested in 190 countries for 1.24 bil...
Windows 8,Microsoft data 2012-10-25 13:16:30
Ensuring Go Interface Implementation: A Quick Guide
Introduction Go's simplicity and power shine in its interface system, offering a clean way to define contracts between types. However, when it comes to checking whether a struct satisfies an interface, Go's static typing philosophy means there isn't a direct runtime check. In this concise guide, we'll explore practical methods, including some lesser-known tricks, to verify whether a struct implements an interface. Method 1: Type Assertion and a Dummy Method package main import "fmt" type MyInt...
INTERFACE,GOLANG,IMPLEMENTS 2023-11-25 21:36:01
Best practices of front end optimization
1. Use DocumentFragment or innerHTML to replace complex elements insertion DOM operation on browser is expensive. Although browser performance is improved much, multiple DOM elements insertion is still expensive and will affect the page load speed. Assume we have an ul element on our page, we now want to retrieve a JSON list using AJAX and then update the ul using JavaScript. Usually we may write it as : var list = document.querySelector('ul'); ajaxResult.items.forEach(function(item) { // ...
JavaScript,Front end,Optimization,Tips 2013-07-06 11:26:27
Implementing DESede/ECB/NoPadding cipher algorithm in GoLang
By default, GoLang doesn't provide the ECB mode cipher for DESede though there is CBC mode provided. In cases we need to encrypt/decrypt data with ECB mode, we need to implement those by ourselves. This mode is frequently used when encrypting/decrypting PIN block which is small block data less than 16 bytes. In this post, we will introduce how to implement the DESede/ECB/NoPadding algorithm in GoLang by using the existing cipher support. Here we will not cover how DESede works in detail, instead...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>