SEARCH KEYWORD -- CONTENT SECURITY POLICY
About C++ comma operator precedence
When learning programming language, we will always have one topic about the operator precedence. Since there are many operators can be used in one expression, there should be some rules regarding which operation can happen first so that the compiler or interpreter can handle them correctly. One rule of programming with expression is using as much as brackets as you can to avoid unexpected results. Here we refer one problem we see online about the comma operator in C++. The following program has ...
comma,precedence 2012-11-12 10:25:00
Twitter is the winner of US election
Yesterday, the final result of the U.S. election was that Obama defeated Romney and he was re-election as President of the United States of America, Later he made a victory speech. While in the Internet world, the real winner is not Obama, but Twitter. Why? Because there was no downtime for Twitter yesterday.On election day, There were a total of 31 million election-related Tweets posted, In peak period, there were 327,452 tweets posted per minute, the peak record was 874,560, about 15,107...
Twitter, US election,Fail whale 2012-11-08 10:55:38
Some measures for improving Linux server security
The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...
Linux server,Server security 2012-08-21 05:08:50
The Internet : from 1969-1974
Internet was born 43 years ago. There are some big events in the history of Internet development. In my opinion, most of the big events happened at the first five years, i.e, from 1969-1974. 1969 : ARPANETThe Advanced Research Projects Agency Network (ARPANET), was the world's first operational packet switching network and the core network of a set that came to compose the global Internet. The first ARPANET transmission was between Stanford Research Institute and UCLA on 29th, October 1969...
Different types of keystore in Java -- JKS
JKS is Java Keystore, a proprietary keystore type designed for Java. It can be used to store private keys and certificates used for SSL communication, it cannot store secret keys however. The keytool shipped with JDKs cannot extract private keys stored on JKS. This type of keystore usually has an extension of jks. Next we will show how to operate the JKS keystore with pure Java code. Create JKS keystore The simplest method to create a JKS keystore to create an empty keystore. We can first get an...
Data governance Challenges and solutions in Apache Hadoop
Do you understand meaning of data governance? This is taken as most critical part of an organization that deals with sensitive data of an enterprise. If organization wanted to know who is accessing their sensitive data and what action has been taken by the viewers then data governance is wonderful solution to consider. In this article, we will discuss on data governance solutions and what are the challenges that are faced by organization during implementation of data governance. We will also dis...
HADOOP DEVELOPMENT,HADOOP INTEGRATION 2015-10-26 08:06:29
A Chinese Programmer Accused of Circumventing Great Firewall Faces Confiscation of RMB 1.05 Million
Recently, a programmer posted an article on Weibo claiming that he was working for an overseas company while accessing the international internet. He was subsequently accused by the Shuangqiao Public Security Sub-bureau in Chengde, Hebei of "illegally establishing and using non-official channels for international networking" and received an administrative penalty of a fine of RMB 200 and the confiscation of "illegal gains" totaling RMB 1.05 million. This is the most severe punishment reported s...
5 million units of Galaxy Note II are sold until now
Samsung announced on its official website that the Galaxy Note II sales have exceeded 5 million units, the number of shipments reached 2 million in last 24 days.Galaxy Note II was officially released at the end of August and was on sale at the end of September, equipped with Android 4.1 Jelly Bean system, 5.5 inches HD Super AMOLED screen and a 1.6GHz quad-core Exynos processor.In the first 37 days on sale, Samsung Galaxy Note II had achieved 3 million units of sales,the sales is three ti...
Samsung Galaxy Note II,Sale 2012-11-26 11:19:21
About browser event
First look at following codes: var $ = KISSY.all; $(‘a’).on(‘click’,function(e){ doSomeThing();//This function seems very famous e.halt(); }); The above codes seem complete the work we want them. The browser will not redirect us to the link in href, but is there some issue with the codes above? Before explaining what's wrong with the above codes, we first need to understand some concepts. Browser default behavior When we click a link, the browser will redirect us to anoth...
JavaScript event,Event bubbling,event capturing 2012-11-15 11:15:41
Marissa Mayer brings 3rd Googler to Yahoo
In Marissa Mayer's plan reviving Yahoo, the focus on products is well known. It is generally expected that the reviving plan will start from Flickr. Mayer recently appeared in the Flickr team, and talked to Flickr designers. It means that Mayer now starts the formal implementation of her product strategy.After communicating with the entire team, Mayer talked to Flickr designer separately, but details are unknown. As shown below:: Mayer once again brings Yahoo the third Googler: Andrew Schulte. ...
Googler,Yahoo,Marissa Mayer, Flickr,Andrew Schulte 2012-08-21 06:04:21
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>