SEARCH KEYWORD -- CLOUD AUTO DIALER
China has 591 million netizens now
CNNIC(China Internet Network Information Center() released its 32nd research report on Internet usage in China on July 17 Beijing Time. According to the report, China has 591 million netizens until June 2013, among them 464 million are phone Internet users. Chinese netizens surf the Internet 21.7 hours a week. The report shows that China's netizens reached 591 million as of the end of June 2013, an increase of 26.56 million people compared to the end of 2012. Internet coverage rate is 44...
CNNICInternet usage 2013-07-18 02:27:52
Mac shortcut key cheatsheet
More and more people are using Mac computers or switch from Windows or other OS to MacOS, there are lots of shortcut keys which can help improve the work efficiency or ease operations. This post will try to list some commonly used shortcut keys in Mac. But before that, let's first know some common keys on a Mac computer keyboard. There are four major function keys: Command, Control, Option and Shift. Most of the shortcut keys will combine the functional key and other key. Basic Command key is t...
SHORTCUT,SCREENSHOT,COMMAND,SHORTCUT KEY,MACOS 2019-02-05 07:13:06
A Python assignment trap
Python has no assignment, it only has reference. Assume, we have following code snippet: >>> values = [0, 1, 2] >>> values[1] = values >>> values [0, [...], 2] Why the result is not [0, [0, 1, 2], 2], instead it goes into an infinite loop? To understand this, we need to understand some basics about Python. Python has no variables, it only has labels. When we run: values = [0, 1, 2] Python will first create a list object [0,1,2], then it labels it as values. If we later...
Python,Assignment,Trap,Shallow copy 2013-07-19 22:08:36
git reset vs git revert
When maintaining code using version control systems such as git, it is unavoidable that we need to rollback some wrong commits either due to bugs or temp code revert. In this case, rookie developers would be very nervous because they may get lost on what they should do to rollback their changes without affecting others, but to veteran developers, this is their routine work and they can show you different ways of doing that. In this post, we will introduce two major ones used frequently by develo...
GIT,GIT RESET,GIT REVERT 2019-02-02 08:26:39
Identify & Address 3 Common BYOD Adoption Problems
With an abundance of mobile phones, tablets, and other personal devices; delivering Enterprise Mobility Solutions has become much more easier as compared to early years, however; the new avenues that have opened up for Enterprise Mobility Consulting in India brings in new, interesting and unforeseen challenges as well. Alongside the growing presence of SaaS applications and BYOD; data protection and integrity has become very critical and a concern that demands immediate attention. Here are some ...
enterprise mobility solutions, enterprise mobility consulting, enterprise mobility management servic 2015-03-16 06:05:21
Useful git commands in daily work
In a developer's daily work, it is frequent to see lots of commits made. It would be a headache if one cannot use git commands well especially when in cases where some fixes need to be made on existing branches. There are some frequently used command such as git pull, git merge and git push. Apart from these, there are some other practical commands which may be useful for real use cases. This post will try to list some of them. git grep It will lists all files containing the searched keywo...
GIT,GIT COMMAND,GIT LOG 2022-05-01 03:17:15
Weibo is testing an Instagram like app called Lvzhou
Weibo, the Chinese version of Twitter, is testing an Instagram like app called Lvzhou(Oasis in English). Now only invited people can access the app. You can download the app on App Store if you are an iPhone user or you can download online if you are an Android user. The vision of this app is to allow users to discover beautiful world, users can post photos or short videos and share with the rest of the world. Before you can access the app, you have to obtain an invitation code shared by y...
One Way to Quickly Locate SQL with High CPU Usage in MySQL
When the CPU usage of a MySQL database rises abnormally, it's necessary to quickly identify the problematic SQL statements. In this post, we try to provide one way to achieve this. Below are the actual steps. 1. Use the top command to find the threads with the highest CPU usage in the MySQL process. # Find the MySQL process ID ps -ef | grep mysql # Use the process ID to find the thread IDs with the highest CPU usage: top -H -p In top, press P to sort by CPU usage. Note the thread ID, fo...
MYSQL,DEBUG,HIGH CPU,SLOW QUERY 2024-08-01 21:25:48
Google Nexus Event Live
Google is going to have new Nexus product release at 12 o'clock 30th September(Beijing time). This new Nexus will ship with the latest Android 6.0 Marshmallow system from Google. Here is the live stream from YouTube. Two Nexus phones are expected to be unveiled tonight. They are from LG and Huawei respectively.. The Nexus 6P is Huawei's first Nexus device and will be available for pre-order on Tuesday in the U.S., U.K., Ireland, Canada and Japan starting at $499.99 and the devic...
LIVE,ANDROID 6.0,NEXUS,GOOGLE 2015-09-29 10:57:04
How to use xargs command in Linux
What is the xargs command? The xargs command constructs and executes commands provided through standard input. It takes input and converts it into command arguments for another command. This functionality is particularly useful in file management and can be combined with commands like rm, cp, mkdir, and others. Using the xargs command When used alone, the xargs command prompts the user to enter a text string and then passes it to the echo command. This example demonstrates the input provided an...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>