SEARCH KEYWORD -- KNIFE DATA BAG
Processing Unicode Data in Python - A Primer to Understand Non-English Data Processing
Introduction: Currently we live in a world where people of diverse cultures/backgrounds use electronic devices to express their ideas, do their daily work that earns them their daily bread, and entertain themselves using content that is created using their own language and so on. Naturally, in order to make all these things happen, any computational instrument, be it a laptop or a desktop computer, or a smartphone, or something else, should be capable enough to serve all of these things in a man...
PYTHON,UNICODE,UTF-8,NON-ENGLISH DATA,ASCII CODE 2019-04-10 00:55:19
File upload in PHP
File is a special kind of form data, when being uploaded to the server through HTTP POST request, PHP will create a $_FILES global array, the relevant file information will be stored in this global array. We will illustrate file upload with some code snippets using PHP and look into the internal work mechanism. Lastly will talk about file upload security. File upload In order for users to upload files in client side, we have to provide a form on the user interface. Since the uploaded file is a s...
File upload,PHP 2012-11-30 22:01:28
Amazon unveils 8.9" Kindle Fire HD
Amazon today unveiled 7 products of Kindle family, including the $69 new Kindle; Kindle Paperwhite WiFi/3G, priced at $119 / $179; 7-inch Kindle Fire regular edition/HD version, $159/$ 199; 8.9inch Kindle Fire HD with WiFi/4G Edition at $299 /$499. However, the Amazon phone did not show up. The 8.9-inch Kindle Fire HD is today's highlight, because it looks real similar to iPad. Kindle Fire HD has the following features: 1920 x 1200 resolution, 254PPI Texas Instruments OMAP 4470 proce...
Amazon,Kindle Fire HD,tablet 2012-09-06 19:12:05
Flows.network: Writing an LLM Application in Rust
Over the past year, large language models (LLMs) have been booming and developing vigorously. As an enthusiast of data systems, it would indeed seem outdated not to pursue and research this hot field at all. This article summarizes my recent practical experiences attempting to write an LLM application using Rust with flows.network. Concepts Related to Large Language Models When talking about large language models, it's impossible not to mention ChatGPT and OpenAI. Although OpenAI recently change...
LLM,RUST,APPLICATION,DEVELOPMENT 2024-09-30 21:38:04
How Java Application Developers Can Build Secure Internet Based Apps?
There are few compiled solution tested by experts to guide Java application development and maintenance team how they can start safe journey on Internet. Strong encryption, wise passwords, secure hardware are few of the tech tools that should be used by Java app development team to secure their Internet based apps. The Internet is most amazing yet most risky platform where nobody knows either they are doing safe transaction on Internet or there is some dog watching out for data packets t...
JAVA APPLICATION MAINTENANCE,JAVA APPLICATION DEVELOPMENT 2015-09-16 02:13:17
Resolving error "SSL certificate problem: self signed certificate in certificate chain"
In a PHP application, cURL is frequently used to make connection to remote server to request some resource. It can be used to transfer data with different protocols such as HTTP, HTTPS, FTP etc. While using cURL in PHP, someone may get an error with message similar to "SSL certificate problem: self signed certificate in certificate chain". This may happen when cURL tries to make a SSL connection server and the server returns a server certificate which is self-signed and it's not trusted by the c...
Text editor vs IDE
A meaningless editor war Many people like to debate which editor is the best. The biggest controversy is between Emacs and vi. vi supporters like to say: "Look it's very fast to type in vi, our fingers no need to leave the keyboard, we even no need to use the up,down,left and right keys" Emacs supporters often downplayed this and said: "What's the use of typing fast if I just need to press one key and it equals to dozens keys you type in vi?"In fact, there is another group of people who like to ...
Editor,IDE,Structured editor,vi 2013-05-20 12:03:39
Google releases new app to improve the accuracy of indoor positioning
Google Maps, Bing Maps, and some map providers have offered indoor map service such as in the airport, major shopping malls and stadiums for some time. The problem is that these indoor maps can not precisely tell you which floor you are on a map, the GPS obviously can not work very well in this environment, WiFi and GPRS positioning is not very precise. Google announced the improvement program of Google Maps for accurate indoor positioning. The current owners of these places will cooperat...
Google Map,Indoor service,Positioning 2012-04-08 09:46:53
4 ways to obtain access token in OAuth 2.0
OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...
OAUTH2,ACCESS TOKEN,REFRESH TOKEN 2019-06-29 07:12:03
Use Delve to debug GoLang program
If you don't know how to debug program, you are not a real programmer. gdb can be used to debug go program, but according to golang website, delve is a better option. Note that Delve is a better alternative to GDB when debugging Go programs built with the standard toolchain. It understands the Go runtime, data structures, and expressions better than GDB. Below is a simple go program. package main type Person struct { Name string Age int } func main() { var me Person me.Nam...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>