SEARCH KEYWORD -- FIND



  Why 0.1+0.2 != 0.3

In programming languages such as JavaScript, c/c++, Java and Matlab, you will find that you will get unexpected result when doing float point calculation. For example, when calculating 0.1 + 0.1, you will not get 0.3: > 0.1 + 0.2 == 0.3 false > 0.1 + 0.2 0.30000000000000004 Don't be surprised of this result, this is the end result of IEEE 754 standard, float point number cannot be accurately represented according to IEEE 754 because: No enough memory is allocated for representing the num...

   float point,comparison,JavaScript     2014-11-19 05:32:46

  A simple example of git bisect command

git bisect is a very powerful command for finding out which commit is a bad commit when bug occurs.  The rationale behind this command is that it pin locates the bad commit by divide and conquer. It divides the commit history into two equal parts, then determines whether the bad commit is at the first half or at the other half. This process will continue until the bad commit is located. Here is a really good example created by bradleyboy, this is a simple git repository which demonstr...

   GITHUB,GIT,GIT BISECT     2019-07-12 10:31:51

  Python Disrupts the Programming Language World- Gets Hot and Popular

Python is one of the fastest growing languages currently. It is undeniable that more and more programmers use Python and deploy it to the best of their use. Everyone, from the freelancer and startups to giant corporations and even governments, is using Python. Let us have a look at the reasons that make it so popular.  Training: According to research, 8 out of 10 tech schools in the US teach Python over JAVA. Even the three major MOOC platforms, edX, Coursera, and Udacity have a similar app...

   DEVELOPMENT,PYTHON,TEAM     2018-06-07 01:02:03

  Algorithm : Reverse singly linked list

Questions about singly linked list are the lovers of interviewers during interviews given the characteristic that singly linked list is one-directional list and it's difficult to get the previous node of one node without some buffering tricks.  In this post, we will demonstrate one of the most frequently asked question about singly linked list -- Reversing the singly list. Given the first node of a singly linked list, reverse the singly linked list. For example : A->B->C->D After ...

   ALGORITHM,INTERVIEW,C     2015-10-31 11:38:35

  China has 591 million netizens now

CNNIC(China Internet Network Information Center() released its 32nd research report on Internet usage in China on July 17 Beijing Time. According to the report, China has 591 million netizens until June 2013, among them 464 million are phone Internet users. Chinese netizens surf the Internet 21.7 hours a week. The report shows that China's netizens reached 591 million as of the end of June 2013,  an increase of 26.56 million people compared to the end of 2012. Internet coverage rate is 44...

   CNNICInternet usage     2013-07-18 02:27:52

  Using keytool to create certificate chain

JDK provides a command line tool -- keytool to handle key and certificate generation. This tool has a set of options which can be used to generate keys, create certificates, import keys, install certificate and export certificates etc. In this tutorial, we will show how to create certificate chain using keytool. If you want to understand how to create certificate chain programmably, please refer to Generate certificate in Java -- Certificate chain. To begin, we first generate a key pair whi...

   JAVA,KEYTOOL,CERTIFICATE CHAIN,CERTIFICATE     2015-12-17 07:09:33

  Two things I don’t like about Hacker News

Hacker News is a very famous IT information hub. We can find many useful links about the latest IT news and fantastic technology demos. But there are two things I don’t like about Hacker News. Maybe some of you also have the same feelings.1.  About the more link. Every time we click the more link to go to next page, there will be a unique key generated to produce the new page. It is a good security mechanism. Also it may increase pages views as we need to read page by page bu...

   Hacker news,More link,Submission,Security     2012-02-28 11:55:37

  A simple tutorial on writing Java native program

Java provides Java Native Interface(JNI) to enable developers to write programs which can utilize the underlying native libraries of the operating system. The benefits of writing native code are that they normally provide better performance compared to Java codes. Sometimes if you want to utilize some system specific functions you may also want to use JNI. One main drawback of writing native code is that your application may not be platform independent anymore. This is not what Java is desi...

   Java native interface, JNI, Native code, Sample     2015-08-15 08:28:15

  Resolving SVN error "Error validating server certificate for..."

When using SVN to connect secure server, the server needs to send its certificate to the client for verification. In some cases, the certificate sent by the server is not a trusted certificate, the client may choose to trust the certificate if the server is target server for sure.  But users may get "Error validating server certificate for 'https://...'" the next time when they try to connect to the same secure server even if they specified "p" the first time when they are prompted to accep...

   SSL,SVN,SVN.SSL.SERVER     2016-06-27 07:36:49

  Should Small IT Companies Compete for Government Projects

No matter where in the world you look, you will find that various government agencies spend enormous amounts of money to procure products and services from outside companies. And while most of us immediately think about construction projects and perhaps defense contractors, a huge portion of government projects over the last decade or so were in the IT sector. In essence, governments on all levels often require services that their existing employees cannot handle and they invite outside IT comp...

   IT, BUSINESS, GOVERNMENT CONTRACTS     2017-12-28 17:51:09