SEARCH KEYWORD -- OPEN LINK



  Video website in big data era

Big data initially means the large data set which is not able to be analyzed, but later it was derivatized to the method to analyze huge amounts of data in  order to gain great value.This is a form which gradually gets attention, It's difficult to analyze these data and it's also difficult to store these data and it needs some unprecedented way, Now in China many companies use the open source Hadoop distributed data cluster to meet the needs of data statistics. Since we can get segmented d...

   Netflix,Big data,Data mining     2013-04-11 04:20:40

  A simple tutorial on writing Java native program

Java provides Java Native Interface(JNI) to enable developers to write programs which can utilize the underlying native libraries of the operating system. The benefits of writing native code are that they normally provide better performance compared to Java codes. Sometimes if you want to utilize some system specific functions you may also want to use JNI. One main drawback of writing native code is that your application may not be platform independent anymore. This is not what Java is desi...

   Java native interface, JNI, Native code, Sample     2015-08-15 08:28:15

  When and How to Use the Go Channel

Go’s concise structure and powerful native library enable us to hit the ground running easily. It is more efficient than Java or Python when implementing the same functions, especially its concurrent programming, which is very handy and widely admired due to its goroutine and channel. goroutine and channel has much to dig into, and let’s start with channel, which I used to consider narrowly as a message queue to transfer data between gorouti...

   GOLANG,CONTEXT,CHANNEL     2022-09-17 23:06:36

  A journey to investigate a goroutine leakage case

In Go, creating goroutines is straightforward, but improper usage may result in a large number of goroutines unable to terminate, leading to resource leakage and memory leaks over time. The key to avoiding goroutine leaks is to manage the lifecycle of goroutines properly. By exporting runtime metrics and utilizing pprof, one can detect and resolve goroutine leakage issues. This post will go through one real case encountered by the author. The author maintains a service that connects to a targe...

   TIMEOUT,SSH,GUIDE,DEBUG,LEAK,GOROUTINE,PPROF,GOLANG     2024-03-16 11:00:23

  Twenty Years of Linux according to Linus Torvalds

Summary: In an interview, Linus Torvalds talks about Linux’s multiple 20th birthdays and life with Linux.The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux, started the celebration of Linux’s 20th anniversary at the Linux Foundation Collaboration Summit, but when is Linux’s real birthday? Is it August 25th, when Linus announced the project? October 5th 1991, when 0.02, the first public release was made? I decided to go st...

   Linux,Linus Tonalds,Interview,Developmen     2011-09-28 09:39:10

  Jackie the smart quadcopter to launch at Robotics Week

Flying security camera synced to smartphone kicks off Kickstarter campaign Entrepreneurs and robotics graduate students Jackie Wu and Ritwik Ummalaneni, in Northwestern University’s Master’s in Robotics program, are launching their new product, Jackie, during the National Robotics Week. The flying security camera quadcopter syncs straight to a smartphone, and is the next evolution in home security platforms that consumers have been waiting for. Jackie’s intuitive and easy co...

   Startup,Quadcopter,Security camera,Jackie Wu     2015-04-05 20:56:11

  How Can Your Data Be Stolen Online?

In 2019, according to Statista, nearly 165 million sensitive records were exposed in the US due to data breaches. Unfortunately, data theft is not going anywhere. Hackers are using increasingly sophisticated methods to steal information, but thankfully there are measures you can take to ensure your data stays safe. Here are some of the most common ways people get their data stolen online and how you can take precautions against the methods cybercriminals use. Human Error Hacking is one of the m...

   DATA SECURITY,PROTECTION KID     2021-01-27 19:46:05

  App Store, Most Effective Weaponry In Apple’s Armor

Apple’s most effective and effectual weaponry is its app store. Surprisingly however, the first generation iPhone did not support any Mobile apps, and Steve Jobs was actually proud of this fact. Back then, in 2007, third party mobile apps were not allowed on the iPhone. Jobs in-fact announced that Mobile app developers could use the most modern standards and write customized mobile apps for the iPhone web browser. He said, “We think we’ve got a very sweet story for you. You can...

   Mobile app developers, customized mobile apps, software development kit,     2015-07-28 03:26:19

  Save QWidget as image

Qt library is an excellent GUI library for C++ programmers developed by Nokia and now is an open source project. Often, we may use QPainter to draw strings, lines or images on a QWidget. We can override the QWidget's paintEvent() method when we want to use QPianter object to draw something on a QWidget. If we want to save the items drawn on QWidget as image for later reference, what can we do? We can save a QWidget as an image. Here is the code for achieving this: QPixmap pixmap(this->size())...

   Qt,C++,QWidget,Image     2012-08-19 12:01:18

  Server monitoring shell scripts

There are many open source server monitoring software such as cacti and nagios. Besides these, can we write our own shell scripts to monitor them? The shell scripts written by ourselves can fulfill our special requirements better and have a more detailed coverage. Below are some commonly used shell scripts used by Evangelist, an Oracle DBA. 1. Check network gateway traffic #!/bin/bash #network #Mike.Xu while : ; do time='date +%m"-"%d" "%k":"%M' day='date +%m"-"%d' rx_before='...

   Server monitor,CPU,memory,shell     2013-08-30 21:56:14