SEARCH KEYWORD -- GITHUB
2D Indoor CQB Robot Simulation
Program Design Purpose: The integration of robots in Close Quarters Battle (CQB) represents a significant advancement in modern military and law enforcement tactics. These robots, designed to navigate tight spaces, gather real-time intelligence, and engage threats, are invaluable assets in high-stakes scenarios. Our goal is to develop a 2D tactical board simulation system, similar to a computer game, that can load building floor blueprints, display CQB squad (robot) positions, enemy locations, ...
A brief guide to tech internships
Planning to be an Intern in the Bay Area during Summer 2012? Make sure to read an Intern's Guide to the Bay Area, and join the 2012 Facebook group. (via this guy, via this guy) Joel Spolsky, from the Joel On Software blog and StackOverflow, wrote an article with Advice for Computer Science College Students back in '05. According to Joel, No matter what you do, get a good summer internship. As such: here’s everything you ever wanted to know about tech inter...
Internship,Advice,CS student 2012-02-01 04:48:31
PHP: a fractal of bad design
Preface I’m cranky. I complain about a lot of things. There’s a lot in the world of technology I don’t like, and that’s really to be expected—programming is a hilariously young discipline, and none of us have the slightest clue what we’re doing. Combine with Sturgeon’s Law, and I have a lifetime’s worth of stuff to gripe about. This is not the same. PHP is not merely awkward to use, or ill-suited for what I want, or suboptimal, or...
First impression of Github Copilot
It has been some time since I heard about the new generation of AI powered coding assistant -- Github Copilot. Don't get chance to experience it until obtained the tech preview access recently. So this post will document some first impression while using it. For now, this tool is only supported in VSCode and it can support various different programming languages. To enable it, just need to search and install the Github Copilot extension within VSCode. Once that is enabled, you will find that whe...
GITHUB COPILOT,FIRST IMPRESSION 2021-08-13 22:45:31
How to check when an API is introduced in GoLang
Normally people would not pay much attention to which GoLang version is being used as lots of functions are backward compatible. However there are cases where GoLang version does matter as some functions may not be supported by old version of GoLang. For example, strings.Builder is introduced in Go 1.10, but below code would fail to be compiled on Go 1.10. package main import ( "fmt" "strings" ) func main() { var b strings.Builder b.WriteString("polarisxu") fmt.Println(b.Cap()) } The ...
GOLANG,API VERSION,GO TOOL 2021-02-07 00:43:24
Chinese Developers Release CEC-IDE, Claimed as First Independently Developed IDE
China witnessed the recent launch of a new IDE called CEC-IDE, which boldly claims to be the first IDE independently developed by Chinese developers. Initially, this release was anticipated to be a moment of pride for the country, as it marked the availability of a homegrown IDE. However, the situation quickly took an embarrassing turn, and the entire narrative soon became a subject of ridicule. It has come to light that the so-called independently developed IDE, CEC-IDE, is actually built upon ...
Fix SSL 'alert protocol version' issue while git clone remote repository
Git provides ways to securely connect to remote repository and clone remote repository to local machine. This post will teach you how to fix the "SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version" issue while cloning a remote repository. The issue would look like: If this error occurs, it is most probably caused by out of date git version being used.To improve its security awareness, some weak cryptographic algorithms have been disabled and all git clients should upgrade to latest ones to acc...
GIT,GIT CLONE,GIT SECURITY 2018-07-08 05:41:39
Encrypting and decrypting PGP file or text on MacOS
When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...
PGP,GPG,ENCRYPTION,DECRYPTION,TUTORIAL 2020-10-29 05:06:09
RECENT
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- more>>