SEARCH KEYWORD -- HTML to Wordpress
Ways to check existence of JavaScript object
The design of JavaScript is not so sophisticated. It's very easy for us to make mistakes if we are not very careful when using JavaScript. For example, to check the existence of JavaScript object. Now we want to check whether a global object myObj exists or not, if it doesn't exist, we declare it. The pseudo code for this is : if(myObj not exist){ declare myObj; } You may think it's very easy to write the code. In fact, it is much more difficult than we may think. Juriy Zaytsev says there are m...
JAVASCRIPT,OBJECT,EXISTENCE 2020-09-12 02:14:02
Using JSON in PHP
Currently JSON has become one of the most popular data exchange formats. Many website APIs support it. Since PHP 5.2, PHP provides json_encode() and json_decode() method to handle JSON encoding and decoding.1. json_encode()This function is used to transform array and objects to JSON format. First let's look one array example. $arr = array ('a'=>1,'b'=>2,'c'=>3,'d'=>4,'e'=>5);   echo json_encode($arr);the result is{"a":1,"b"...
JSON,PHP,json_decode(0,json_encode() 2012-05-06 06:04:42
Crash your Chrome with %%30%30
Have you ever wondered a simple string can crash one of the most sophisticated designed web browsers -- Chrome? There is a finding from Andris Atteka who found that a null string "%%30%30" appended to an URL can crash Chrome. For example, if you have below URL in your browser address bar or you mouse over below URL, Chrome will crash: http://www.pixelstech.net/%%30%30 When the browser crashed, it may show : Or on Windows, you will see : This bug has been reported to Google at Is...
4 ways to obtain access token in OAuth 2.0
OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...
OAUTH2,ACCESS TOKEN,REFRESH TOKEN 2019-06-29 07:12:03
The Trouble With Bright Kids
It's not easy to live up to your fullest potential. There are so many obstacles that can get in the way: bosses that don't appreciate what you have to offer, tedious projects that take up too much of your time, economies where job opportunities are scarce, the difficulty of juggling career, family, and personal goals. But smart, talented people rarely realize that one of the toughest hurdles they'll have to overcome lies within. People with above-average aptitudes — the ones we ...
Smart,Confidence,Hardworking,Trouble,Bright kids 2011-11-29 08:33:03
Easy Parallel Processing in PHP
The proliferation of multicore CPUs and the inability of our learned CPU vendors to squeeze many more GHz into their designs means that often the only way to get additional performance is by writing clever parallel software. One problem we were having is that some of our batch processing jobs were taking too long to run. In order to speed the processing, we tried to split the processing file into half, and let a separate PHP process run each job. Given that we were using a dual core serv...
PHP,Parallel processing,Multithreading like,Sleep 2011-12-12 10:58:59
Do scientists really need a PhD?
Young scientists at a Chinese genomics institute are foregoing conventional postgraduate training for the chance to be part of major scientific initiatives. Is this the way of the future?The approach to extended postgraduate training varies from country to country. The United States and Europe, for example, have long believed that students need to finish a multiyear programme of postgraduate work before they can fully participate in the front rank of research, whether in industry or acad...
Career,PhD,Scientist,Relationship,BGI 2012-01-02 08:19:32
The new Google Search By Voice
Along with the new announcement of the new Google logo, there is a new change to the Google search -- The Google Search By Voice. When you use Google in a browser, you will see below color mic icon now: With this, you can search by speaking in front of your computer, OK, Google will listens to what you are saying and do the search for you. As described by Google, this change: A colorful Google mic help you identify and interact with Google whether you’re talking, tap...
Google, Google voice, Google logo 2015-09-02 11:07:13
Why localStorage only allows to store string values
localStorage allows data to be stored in browsers across sessions, the data will be there even though the session is expired. It is frequently used to store static data so that they can be loaded when needed. But as per spec, it says that the keys and the values are always strings (note that, as with objects, integer keys will be automatically converted to strings). Why cannot store the object as it is? Take a look at an example: var str = "test"; localStorage.setItem("str", str); cons...
JAVASCRIPT,LOCALSTORAGE 2020-04-05 00:54:29
The difference between System.load and System.loadLibrary in Java
When writing code using native library in Java, normally the first step is loading some native library. static{   System.load("D:" + File.separator + "Hello.dll"); } JDK provides two ways to load libraries: System.load(String filename) System.loadLibrary(String libname) This post will try to explain the differences of these two ways. According to Java Doc on System.load(), it has below description. Loads the native library specified by the filename argument. The filename a...
NATIVE,JNI,JAVA,SYSTEM.LOAD,SYSTEM.LOADLIBRARY 2019-02-05 05:49:28
RECENT
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- more>>