SEARCH KEYWORD -- Big Data Analytics Solutions
Why TCP needs 3 handshakes
Prerequisite Knowledge First, let's look at the control bits and state machine of TCP, which form the basis for understanding the three-way handshake of TCP. TCP Packet Control Bits The control bits in the TCP packet header are used to control the status of the TCP connection and can indicate various control information such as connection establishment, termination, reset, etc. There are six common control bits: SYN (Synchronize Sequence Numbers): Requests to establish a connection (part of the...
REASON,NETWORK,TCP,EXPLANATION,HANDSHAKE 2024-09-28 08:57:52
New features in Java 9
Java 9 is planned to be released in March 2017. It will be 3 years since Java 8 was released. Are you still excited about the new features introduced in Java 8 such as Lambda, new Date APIs etc? Now Java 9 is to be released and there are also quite a few fantastic new features to be introduced. Below is a list of major new features in Java 9. Modular system. Java 9 will introduce a brand new modular system to organize Java codes. The modular system will divide different packages into diffe...
JAVA,NEW FEATURE,JAVA 9 2016-04-05 09:56:01
Go Error Best Practice
Being indulged in Go for quite a while and having implemented web-related programs, grpc interfaces and Operators, I seem to be an advanced beginner now. However, I am still a raw hand in production-environmental debugging, which is cumbersome if done by querying logs or error messages. Imagine the scenario that a full-text search is called when the specific location of the error log is missing. Then what happens when those error logs are not only in one place? Yes, my error logs can no longer h...
GO ERROR,ERROR HANDLING 2021-10-07 07:38:28
Applying Large Language Models (LLMs) to Solve Cybersecurity Questions
In this document, we will introduce some test, experiment and analysis conclusion about applying Large Language Models (LLMs) to solve cybersecurity questions. Introduction Large Language Models (LLMs) are increasingly used in education and research for tasks such as analyzing program code error logs, help summarize papers and improving reports. In this project, we aim to evaluate the effectiveness of LLMs in solving cybersecurity-related questions, such as Capture The Flag (CTF) challenges, ...
Steve Jobs's prediction about wireless,iPad and App Store in 1983
1983 was still a year uncultivated. That year, Apple released the first personal computer Apple Lisa with graphical user interface in the world, TCP/IP was released less than two years, the Internet was basically still a wasteland. General people had few knowledge about computer. Steve Jobs still needed to start with "What is the computer" in his speech. Today, we have become accustomed to social networking, smart phones and mobile Internet, it was really unbelievable at that time. That ye...
Steve Jobs, record,Apple,prediction 2012-10-03 04:37:17
FTP active mode and passive mode
1. What's active mode and passive mode a. FTP has two ports to control: Port 20 is for data transfer Port 21 is for control or establish TCP connection b. The process of active connection Note: C represents Client and S represents Server S opens port 20 and 21 C connects to port 21 of S with a random port, this port can be between 1024 and 65536, it sends port+x to server at the same time to specify C(X)->S(21) When S receives the command, it will sends back ACK, S(21)->C(X) S will set ...
FTP,Active mode,Passive mode 2013-04-01 07:01:25
How to find which process a file is being written by in Linux?
Some people ask a file is being written by one process and they want to check this process, but they cannot find the process even with sof. This question is very common and there are many solutions, here we introduce a straightforward method. In Linux, each file will be stored on one device and of course there will be a relative inode, then we can use vfs.write to know who is writing the inode on one specified device continuously. Luckily there is inodewatch.stp in the installation package of s...
Linux,process,file write 2013-03-16 21:44:35
Sass Style Guide: A Sass Tutorial on How to Write Better CSS Code
Writing consistent and readable CSS that will scale well is a challenging process. Especially when the style sheets are getting larger, more complex, and harder to maintain. One of the tools available to developers to write better CSS are preprocessors. A preprocessor is a program that takes one type of data and converts it to another type of data, and in our case CSS preprocessors are preprocessing languages which are compiled to CSS. There are many CSS preprocessors that front-end develop...
Pros and cons of 6 most popular test automation frameworks
Not everyone dappling into systems for test automation knows how to leverage the maximum benefit and keep them going in top shape for a long time. That's where test automation frameworks come in – they're basically sets of rules, standards, protocols and guidelines which can be incorporated into practice or simply followed to provide beneficial execution environments for automation test scripts. Why are test automation frameworks important? Test automation frameworks offer m...
Chrome overtakes IE as the No.1 browser
According to data from market research company StartCounter, by May 2012, Chrome has overtakes IE as the No. 1 web browser globally. Firefox and Safari is following IE to be 3rd and 4th most popular web browser.In May, market share of Chrome is 33%, while IE only gets 32%. Firefox is slowly dropping, which has a share of 25%. However, with release date of Windows 8 approaching, IE 10 will also be shipped with Win8, at that time, the number of users who use IE may increase because according...
Chrome,No.1,IE,StatCounter 2012-05-21 06:03:04
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>