SEARCH KEYWORD -- GO VERSION
Apple will shut down Ping on 30th September
What? Apple also has social networks! Yes. Unfortunately, you just heard it and it is to be shut down. In fact, Apple launched Ping not too long ago, in September 2010, it was released together with iTunes 10.Ping allows users to share with your friends the music you are listening to, and you can even share concerts and activities information, and it supports for picture and link sharing. In addition, Ping also includes the "Top Ten" list of features that can be customized, each singer and the ...
Apple,Ping,Social network 2012-09-12 22:21:31
Run executable jar on double click on Windows
Normally after installing Java, there will be an association between .jar and the javaw.exe. This enables the executable jar to be opened on double click. You can check the association by going to Control Panel -> Programs -> Default Programs -> Associate a file type or protocol with a program. The default program of a file type can be changed in this dialog. However sometimes there are cases where the file association for .jar may be altered after a third party application instal...
JAVA,WINDOWS,JAR,EXECUTABLE JAR 2016-05-12 03:05:04
Socket programming tips in Solaris
I sponsored a topic in stackoverflow.com, and hoped the programmers can share the socket programming tips in different UNIX flavors. But unfortunately, the responders are few. So I can only share my socket programming tips in Solaris at here (the Chinese version can be found there): 1. Use the following link options: "-lresolv -lnsl -lsocket";2. Solaris doesn't provide socket options: SO_SNDTIMEO and SO_RCVTIMEO(Why does Solaris OS define SO_SNDTIMEO and SO_RCVTIMEO socket options...
Using public key authentication in SSH
SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc. To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...
LINUX,DEBUG,SSH,PUBLIC KEY 2016-09-10 05:55:46
What do programmers like to say usually?
Coding is an very important part of programmer's daily work. But beyond coding, programmers need to do other work as well, they need to fix bugs reported by users, they need to write documents for their codes. Also, they often need to answer questions from customers, bosses and colleagues. What do they often say when they are facing different sort of questions? Today we share some. It's done. I just need to clean up a few things. This is hacky, but I'll fix it soon. This can never happen: It's ...
Programmer,Execuse,Bug 2013-08-07 07:38:30
HeartBleed: Inside the heart, what causes the bleeding?
Just after a few weeks since Apple's famous goto fail bug, there is one bug in OpenSSL which catches the attention from the world again. The bug is named HeartBleed, found in OpenSSL library, a famous open source library supporting lots of SSL/TLS communication among server/client applications. The reason why this bug catches the attentions from the world is it affects almost all sites which are using the affected OpenSSL library, these includes many applications like Nginx server, some v...
OpenSSL,HeartBleed 2014-04-09 05:47:30
Lenovo gets into the chip design field
According to EETimes, Lenovo will enter the field of chip design, the main focus is the smartphone and tablet chip design.There is a small team of 10 people who are working on integrated circuit design in Lenovo in the past 10 years, Till the middle of this year, Lenovo intends to expand the team to 100 engineers. Lenovo may recruit 40 engineers in Shenzhen and 60 engineers in Beijing.Despite Lenovo has much freedom in the choice of application processors, but because it involves a competitive ...
Lenovo,Chip,Samsung,Smartphone 2013-04-01 06:15:54
Android 4.0+ occupies quarter of Android market
Google updates its developer page about Android platform version market share. From the latest data, we can find Android 4.0 and above system occupy around 25% of all Android market. But Android 2.3 Gingerbread still occupies over 50% of Android market. From the above chart, Android 4.0 has 23.7% market share, the latest Android 4.1 JellyBean takes 1.8%, these two have 25.5% market share in total. But Android 2.3 Gingerbread alone still dominates the Android market, it takes 55.8% market share....
Many Chinese applicants to US universities may be affected by Gmail cut out
Just after Christmas, many Chinese found that they could not connect to Gmail anymore in mainland China. Since Google announced leaving from China in 2010, the web version of Gmail was not accessible anymore. But people from China could still access Gmail through some Gmap apps. This time, Gmail is not accessible even with these apps. It is said that all the mail service protocols of Gmail including IMAP/POP/SMTP have been cut out by Chinese government. This means no mails can be sent to or rece...
Gmail, China, Gmail cut out 2014-12-30 00:35:28
Understanding database, instance and schema in Oracle database
Oracle database is the most popular database system among enterprises. To start working on Oracle database, some concepts must be understood first. They include database, instance, schema and user etc. And among these concepts, some have different meanings from those in other database systems such as MS SQL, MySQL, DB2. On the web, there are already some good posts which explain different concepts such as Ask Tom's database vs instances, Difference between database vs user vs schema. In this pos...
DIFFERENCE,DATABASE,ORACLE DATABASE,INSTANCE,SCHEMA,USER 2016-12-14 23:30:56
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>