SEARCH KEYWORD -- Development languages



  People Detection Radar [IoT] : Build a Raspberry PI Xandar Kardian IoT People Count Radar

Program Design Purpose: People detection sensors and radars are utilized in various applications across multiple fields such as security and surveillance, healthcare, building automation, smart cities, transportation and autonomous manufacturing systems. This project aims to develop a prototype IoT device for an indoor people counting using the Xandar Kardian people detection radar and a Raspberry Pi. The device will be network-ready and easily integrated with other systems. The Python-based I...

       2024-07-21 08:19:57

  About .NET memory leak--GC,Delegate and weak reference

Memory leak is always a headache for many programmers, the situation is much better now in some languages which have GC mechanism, but still we may face some memory leak issues when we write programs. 1. What is memory leak? Memory leak is not that the memory chip is broken. In short, it's about that the memory requested is not released at the expected time as an expect way. So what is the expected time? This is very important for you to understand memory leak. If the time an object taking the m...

   .NET,GC,Reference counting,Mark and sweep,Weak reference     2013-05-25 12:59:09

  The Great Tech War Of 2012

From left: The late Apple cofounder Steve Jobs, Facebook CEO Mark Zuckerberg, Google CEO Larry Page, and Amazon CEO Jeff Bezos. | Photos courtesy of David Paul Morris/Getty Images (Jobs); Justin Sullivan/Getty Images (Zuckerberg); Chip East/Reuters (Page); Mario Tama/Getty Images (Bezos).Gilbert Wong, the mayor of Cupertino, California, calls his city council to order. "As you know, Cupertino is very famous for Apple Computer, and we're very honored to have Mr. Steve Jobs come here tonight ...

   2012,Tech war,Facebook,Apple,Google,Amazon,Tablet,Cloud,Analysis     2011-10-17 11:06:25

  Python Deserialization Attack Introduction: How to Build a Python Pickle Bomb

This article introduces an old and classic unsecured Python data serialization feature (the pickle library) and demonstrates how a red team attacker can exploit it to create a malicious binary or text data file that executes remote code or commands upon deserialization. The following attack flow diagram illustrates this process: We will follow 3 steps with the program code to show how Deserialization Attacks Work:   [ Step1 ] Crafting Malicious Data: An attacker crafts a malicious payloa...

       2024-07-07 03:08:22

  How VR technologies take over the world

Virtual Reality (VR) literally may get it beneficial to experience anything, anywhere, anytime. It is normally the several immersive type of legitimate fact technology and can convince the real real human human brain that it is usually normally someplace it can get absolutely critically not really seriously. Brain installed displays happen to be used with earphones and hands controllers to offer a entirely immersive arrive across. With the major technology businesses on whole world community (Fa...

       2019-05-20 05:30:39

  Creating Working application in 15 minutes in ASP.NET MVC with Entity Framework and Scaffolded Items

You can create a working application in asp.net MVC at your place. Asp.net development services providers bring this tutorial to make you learn about the use of Entity framework and Scaffolded items for asp.net mvc application development. Read this and share your experience at the end. In this post we going to use Microsoft technology to create a fully working web application which going to contain a fully featured CRUD capabilities. So first of all let’s create, a new table which going t...

   ASP.NET ,COMPANY,DEVELOPMENT,SERVICES     2016-12-21 00:10:00

  CSS3 Animation With jQuery Fallbacks

In today's post, we'll be taking a look at how you can use CSS3 transitions to power your application's animations with jQuery's .animate() method as a fallback where transitions aren't supported. The benefit of transitions is that unlike JavaScript based animations, they're hardware accelerated in certain browsers and mobile devices, resulting in a potentially smoother overall animation than you would normally experience. In a lot of cases your code will work seamlessly with the solut...

   CSS3,Animation,JavaScript,jQuery,Demo     2011-08-19 08:10:58

  2D_Indoor_CQB_Robot_Simulation

Program Design Purpose: The integration of robots in Close Quarters Battle (CQB) represents a significant advancement in modern military and law enforcement tactics. These robots, designed to navigate tight spaces, gather real-time intelligence, and engage threats, are invaluable assets in high-stakes scenarios. Our goal is to develop a 2D tactical board simulation system, similar to a computer game, that can load building floor blueprints, display CQB squad (robot) positions, enemy locations, ...

       2024-08-11 08:40:31

  A brief guide to tech internships

Planning to be an Intern in the Bay Area during Summer 2012? Make sure to read an Intern's Guide to the Bay Area, and join the 2012 Facebook group.  (via this guy, via this guy) Joel Spolsky, from the Joel On Software blog and StackOverflow, wrote an article with Advice for Computer Science College Students back in '05. According to Joel,  No matter what you do, get a good summer internship. As such: here’s everything you ever wanted to know about tech inter...

   Internship,Advice,CS student     2012-02-01 04:48:31

  Install and configure git plugin in Eclipse

When developing using IDE, it's always a good experience if everything can be done in the IDE including development, testing and version control. This also applies to Eclipse.  In this post, we will show the process of installing and configuring git plugin in Eclipse. The pre-requisite is that you have git installed on your local machine.  The detailed steps for installing and configuring git plugin are below. 1. Installing Git plugin Install using "Install New Software..." menu. ...

   ECLIPSE,GITHUB,GIT PLUGIN     2018-10-13 04:22:06