SEARCH KEYWORD -- Front end development



  A journey to investigate a goroutine leakage case

In Go, creating goroutines is straightforward, but improper usage may result in a large number of goroutines unable to terminate, leading to resource leakage and memory leaks over time. The key to avoiding goroutine leaks is to manage the lifecycle of goroutines properly. By exporting runtime metrics and utilizing pprof, one can detect and resolve goroutine leakage issues. This post will go through one real case encountered by the author. The author maintains a service that connects to a targe...

   TIMEOUT,SSH,GUIDE,DEBUG,LEAK,GOROUTINE,PPROF,GOLANG     2024-03-16 11:00:23

  Google's acquisition of Quickoffice threatens Microsoft

Windows has over 90% market share in desktop operating systems, even though now other OS such as Mac OS and Linux are saying they are more user friendly, more stable and safer than Windows, Windows still has a weapon MS Office which can defeat all of them. However, with the development of mobile network and cloud computing, Windows is now challenged by different competitors on mobile and cloud areas.  Mobile and cloud are weak sides of Microsoft , but they are strength of Google.Google sudd...

   Google,QuickOffice,Microsoft,MS Office     2012-06-07 11:40:10

  Chrome 23 supports Do Not Track now

Google has upgraded its browser to Chrome 23, released for Windows, Mac, Linux and Chrome framework. New features brought by Chrome 23 include GPU video decode acceleration, more convenient site permissions management and start supporting DNT agreement. The most important feature of this version upgrade is the support for "Do Not Track (DNT)". As one of the solutions to address online privacy issues, DNT protocol allows Internet users to control how their privacy information can be tracked, als...

   Chrome 23, Do Not Track,DNT     2012-11-07 11:27:26

  IoT System Cyber Attack Case Study 02: Python Deserialization Attack and Library Hijacking Attack

Project Design Purpose: The objective of this cyber attack case study is to develop a workshop that demonstrates how a red team attacker can permanently compromise a people detection radar IoT device. The attack path is achieved through a series of attacks, including traffic eavesdropping, data deserialization attacks, web shell attacks, remote command/code execution, and Python library hijacking attacks. This case study is intended for IoT and data security professional training, aiming to ill...

       2024-07-14 01:40:09

  Products born for Cloud

Cloud computing has become increasingly popularity among companies. It greatly saves the investment of infrastructure and training with everything is running on cloud, it also improves the accessibility and flexibility of service provided by companies. With its popularity, many products are born or becoming popular to help build and move the apps to the cloud. Some well known names of these products are Vagrant, Docker/LXC, Chef and OpenStack. These tools can help create, test and deploy applica...

   Cloud,Openstack,Docker,Vargrant,LXC,Chef     2015-01-25 02:27:11

  The story behind Sublime Text

Sublime Text is a cross-platform text and source code editor, with a Python application programming interface (API). The graphical user interface design was inspired by Vim.Its functionality is also extendable with plugins; Post its release, it gained much attention and wide popularity. Do you know what's the story behind Sublime Text? Jon Skinner left his job as a software engineer at Google in order to pursue a dream: to build a better text editor. The end result is the popular Sublime Text t...

   Sublime Text,Story,History     2013-09-22 11:05:36

  Is Utah a good place for startups?

If you’re thinking of starting a business soon, then know that it’s a really good time to do so despite current circumstances. Rieva Lesonsky, a writer for the US Chamber of Commerce, highlights that today’s “new normal” has brought new customer demands and improved business technologies that you can take advantage of. In fact, many of the most successful businesses in the world, like Microsoft and Netflix, were created during an economic downturn. But this begs th...

   STARTUP,BUSINESS,UTAH     2020-11-19 06:12:05

  Twitter to sponsor Apache Software Foundation

Twitter recently made a commitment that they would sponsor the Apache Software Foundation, it will become its official sponsor. The Apache Software Foundation is a nonprofit organization, it can provide the organization and management, legal and financial support for open source projects. As we all know, Twitter loves open source, and its engineers are often engaged in open source community to provide technical support. Twitter team is also responsible for the related construction of the o...

   Apache,ASF,Twitter,Sponsor     2012-04-20 12:08:06

  New Features to Look Out for in Xcode 9

When we say Xcode, we mean a designing toolset which is completely packed with features. Using this Xcode, developers can create applications for platforms such as the Apple TV, the iPad, Apple Watch, and the iPhones and even for the Macintosh. The development system for Xcode has a mixture of features. These are called the instrument analysis tool, simulators, and the ever important OS frameworks which are present in the package in a variety of form of tvOS SDKs, iOS SDKs, watchOS SDKs, and the...

   XCODE,IPHONE,XCODE9     2017-09-26 06:31:30

  Top 10 WhatsApp Tips & Tricks To Try in 2017

v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 false false false false EN-US X-NONE X-NONE

       2017-02-01 03:14:42