SEARCH KEYWORD -- Html 5
Bash Shell Scripting - 10 Seconds Guide
This Bash shell scripting guide is not a detailed study but a quick reference to the BASH syntax. So lets begin... Common environment variables PATH - Sets the search path for any executable command. Similar to the PATH variable in MSDOS. HOME - Home directory of the user. MAIL - Contains the path to the location where mail addressed to the user is stored. IFS - Contains a string of characters which are used as word seperators in the command line. The string normally consists of the spac...
Bash,Shell,Linux,Tutorial,10 seconds,Shortcut key 2012-02-28 08:05:41
Some Thoughts on Twitter's Availability Problems
As a regular user of Twitter I've felt the waves of frustration wash over me these past couple of weeks as the service has been hit by one outage after another. This led me to start pondering the problem space [especially as it relates to what I'm currently working on at work] and deduce that the service must have some serious architectural flaws which have nothing to do with the reason usually thrown about by non-technical pundits (i.e. Ruby on Rails is to blame). Some of my suspicions ...
Twitter,Architecture,Availability,Design 2011-08-12 07:39:21
A tutorial on Github Actions
Github Actions is a CI/CD service created by Github. It aims to make it easy to automate all software workflows, now with world-class CI/CD. Build, test, and deploy code right from GitHub. It was launched in October 2018 and was officially available to all users in November 2019. This post will give an introduction of Github Actions and explain how it works. What is Github Actions Normally Continuous Integration includes some steps, fetching code, running test, sshing into remote server in...
GITHUB,GITHUB ACTIONS,CI,CD 2019-12-23 05:33:39
Some hidden XSS injection vulnerabilities
XSS injection refers to a Web page generates some unexpected executable js codes based on user input and these executable codes are executed by web browser,i.e, the source code sent to web browser by the server contains some illegal js codes, and these illegal js codes are related to user's input. Common XSS injection vulnerabilities can be fixed with some functions such as htmlspecialchars(escaping HTML special characters) and strip_tags() or similar, but there are some hidden XSS injecti...
XSS,PHP,Security,Code,JavaScript 2012-08-27 20:32:08
Misunderstanding about Android UI design
A few days ago I wrote a post trying to correct a lot of the inaccurate statements I have seen repeatedly mentioned about how graphics on Android works. This resulted in a lot of nice discussion, but unfortunately has also lead some people to come up with new, novel, and often technically inaccurate complaints about how Android works.These new topics have been more about some fundamental design decisions in Android, and why they are wrong. I’d like to help people better understand ...
Android,UI,Priority,Background job,Smooth 2011-12-09 02:30:25
Extending Native Features To HTML5 Web Apps
A small company called AppMobi is enabling developers to create HTML5 apps that tap into native hardware and OS capabilities of mobile devices, such as gravity sensing, accelerometer, GPS, camera, sound and vibration, and the file system, InfoWorld reports. 'Its MobiUs browser for iOS implements HTML5's DirectCanvas API for gaming, as well as the HTML5 local storage API for saving executables and data in the browser cache so that apps can run offline. But what makes MobiUs more than just ye...
HTML,WebApp,Hardware,Local storage,Gravity accelaration,AppMobi 2011-11-07 02:57:08
NIO vs IO in Java
Java 1.4 provides a new API for handling IO -- NIO. This is a non-blocking and buffer oriented IO API. Below are main differences between the NIO and IO in Java. IO NIO Stream oriented Buffer oriented Blocking IO Non-blocking IO N/A Using selector Stream oriented vs Buffer oriented The main difference is that IO is stream oriented where the data is read byte by byte and the data will not be buffered normally.This means there is no pointer to move forward and backward in the stream. I...
Hey kids, just say NO to programming !
Cory Doctorow's latest talk 'The Coming War on General Purpose Computing' really puts things in perspective about life in the 21st century. This got me thinking more about functional programming languages and how they are related to the intentional limitation/crippling of turing machines by industry and government. What if Stallman is right about the intentional efforts to limit freedom of information ? What if it's even worse than we all think it is ? In relation to functional languages ...
Programming,Factor,View,Kids,No 2012-01-16 10:16:19
If a programming language was a boat…
我是å—最近的一个论å›å¸–åå¯å‘,他的想法至今ä»è®©æˆ‘感到奇特。Turing(图çµ)Turingç»å¯¹æ˜¯ä¸€ä¸ªåŒäººçš®åˆ’艇(感谢评论里的æ醒)。它很å°ã€‚人力的。它通常被当作åˆå¦è€…çš„â€èˆ¹â€œã€‚è€...
Programming,Turing,C,C# 2011-06-24 01:07:42
Code Refurbishment
Within our industry we use a huge range of terminology. Unfortunately we don’t all agree on what individual terms actually mean. I so often hear people misuse the term “Refactoring†which has come to make the business in many organisations recoil in fear. The reason for this fear I’ve observed is because of what people often mean when misusing this term.I feel we are holding back our industry by not being disciplined in our use of terminology. If...
Code Refurbishment,Code design,terminolo 2011-09-05 08:17:14
RECENT
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- more>>