SEARCH KEYWORD -- EVENT MECHANISM
JavaScript: Passing by Value or by Reference
In JavaScript, we have functions and we have arguments that we pass into those functions. But how JavaScript handles what you’re passing in is not always clear. When you start getting into object-oriented development, you may find yourself perplexed over why you have access to values sometimes but not other times. When passing in a primitive type variable like a string or a number, the value is passed in by value. This means that any changes to that variable while in the function are com...
JavaScript,Function,Pass by reference,Pa 2011-07-28 11:05:25
Deep Dive into Spin Locks in Golang
In concurrent programming, a Mutex is a commonly used synchronization mechanism to protect critical resources and prevent data races. However, in certain specific scenarios, especially when the lock-holding time is short and the number of threads is limited, a more lightweight lock known as a Spin Lock can provide higher performance. What is a Spin Lock A Spin Lock is a form of busy-wait lock. When a thread attempts to acquire a lock held by another thread, it continuously checks the lock's stat...
How to be jQuery-free?
jQuery is now the most famous JavaScript library. There are around 57.3% websites in the world using jQuery, i.e, 6 out of 10 websites are using jQuery. If we only consider those websites which use libraries, then the percentage is even higher which is 91.7%. Although jQuery is very popular, its size is still a headache to many websites maintainers. The uncompressed jQuery 2.0 has a size of 235KB, the size is 81KB after optimization.The jQuery 1.8.3 which supports IE 6/7/8 has a uncompressed si...
jQuery,JavaScript,ECMAScript,CSS3 2013-05-13 11:53:20
A Solution to CPU-intensive Tasks in IO Loops
Back in October 2011, Ted Dziuba infamously said that Node.js is Cancer. A provocative title to a provocative article. The only thing it didn’t really provoke in the commentary was much thought ;) Zing. My interpretation of the article is that Ted holds up the classic blocking-IO process-per-request (or thread per request; same difference) model as superior. Yet we all remember where the blocking-IO forking model got Apache in the early days. ...
CPU,Intensive IO loops,Solution,C++ 2012-02-06 07:42:40
About browser event
First look at following codes: var $ = KISSY.all; $(‘a’).on(‘click’,function(e){ doSomeThing();//This function seems very famous e.halt(); }); The above codes seem complete the work we want them. The browser will not redirect us to the link in href, but is there some issue with the codes above? Before explaining what's wrong with the above codes, we first need to understand some concepts. Browser default behavior When we click a link, the browser will redirect us to anoth...
JavaScript event,Event bubbling,event capturing 2012-11-15 11:15:41
Google Nexus Event Live
Google is going to have new Nexus product release at 12 o'clock 30th September(Beijing time). This new Nexus will ship with the latest Android 6.0 Marshmallow system from Google. Here is the live stream from YouTube. Two Nexus phones are expected to be unveiled tonight. They are from LG and Huawei respectively.. The Nexus 6P is Huawei's first Nexus device and will be available for pre-order on Tuesday in the U.S., U.K., Ireland, Canada and Japan starting at $499.99 and the devic...
LIVE,ANDROID 6.0,NEXUS,GOOGLE 2015-09-29 10:57:04
Will the next generation of iPhone be launched on September 10?
According to AllThingsD, Apple might launch its next generation of iPhone on September 10. There is no detailed information about this new iPhone yet, it's also unknown whether it's a cheap one or other kind of versions. But it will equip with iOS 7 and Apple may launch the next generation of Mac OS--Maverick in next few weeks. Since Apple acquired finger print recognition manufacturer AuthenTec with $356 million and it also applied the finger print unlock patent, so the next generation iPhone ...
Two things I don’t like about Hacker News
Hacker News is a very famous IT information hub. We can find many useful links about the latest IT news and fantastic technology demos. But there are two things I don’t like about Hacker News. Maybe some of you also have the same feelings.1. About the more link. Every time we click the more link to go to next page, there will be a unique key generated to produce the new page. It is a good security mechanism. Also it may increase pages views as we need to read page by page bu...
Hacker news,More link,Submission,Security 2012-02-28 11:55:37
Deep Understanding of ReentrantLock: Unlocking the Mysteries of Java Concurrent Programming
ReentrantLock introduction ReentrantLock is a class in the Java concurrent package, java.util.concurrent.locks, and is an implementation of the Lock interface. As its name suggests, it is a reentrant mutual exclusion lock. A mutual exclusion lock is a synchronization tool used to protect shared resources, ensuring that only one thread can access the resource at a given time. Reentrant means that a thread can acquire the same lock multiple times without causing a deadlock. This lock provides some...
JAVA,REENTRANTLOCK,CONCURRENCY,MULTITHREADING 2023-05-22 08:01:13
Capture video stream with WebRTC
WebRTC(Web Real-Time Communication) is an API supporting real time audio and video communication through a browser. It is now a recommended W3C standard. This post is to show you how to capture video stream and screenshot with WebRTC. Capture video stream To play video stream from the video camera, we first need to put a video tag in our code: <video id="video"></video> The main function to get the video stream is the navigator.getUserMedia, as of now only few of the browsers support...
WebRTC,Video,Screenshot 2013-10-24 21:04:41
RECENT
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- more>>