SEARCH KEYWORD -- PERMISSION ISSUE
do {...} while (0) in macros
If you are a C programmer, you must be familiar with macros. They are powerful and can help you ease your work if used correctly. However, if you don't define macros carefully, they may bite you and drive you crazy. In many C programs, you may see a special macro definition which may seem not so straightforward. Here is one example: #define __set_task_state(tsk, state_value) \ do { (tsk)->state = (state_value); } while (0) There are many this kind of macros which uses do{...}while(0)...
The evolving history of asynchronous operation in JavaScript
JavaScript is single threaded, it means there would be only one task running at any point of time. But this would slow down the overall program execution if there is long running task, hence asynchronous task execution is desired in complex cases. To achieve asynchronous task execution, there are a few options introduced in JavaScript. setTimeout/setInterval Event Promise Async/Await setTimeout/setInterval is one of the first mechanisms introduced in JavaScript to simulate asynchronous operati...
JAVASCRIPT,ASYNC,PROMISE,AWAIT 2019-11-09 08:21:56
What and what not to log while debugging
Log is a critical part of an application. It serves as an eye to the programmer on how the application is working while debugging. Especially for applications running on production environment, if the application encounters problem and the problem cannot be reproduced on other environments, log will be extremely useful. While log is essential, but developers have to log smartly. Because if don't put log smartly, you may not get what you want while debugging or you may get too many...
PROGRAMMING,DEBUG,LOG,SUPPORT 2016-03-14 08:09:03
Productivity tips for freelance web designers
There are lots of great things about freelance, such as not being tied to a desk, flexible working hours and little, if any, supervision. All freelance web designers probably realize that one of the biggest challenges of their job is the issue of productivity. How to motivate yourself and stay productive every day with no external supervisors telling us to complete a task right now? Here are five practical productivity hacks for all freelance web designers who want to boost their performance. 1....
productivity tips, freelance, web designers, productivity hacks 2015-02-13 01:40:29
Failed merge and acquisition cases in the Internet history
Bebo founder sold Bebo with 850 million US dollars in 2008, but later he bought it back with just 1 million US dollars. This news lets us think about those failed merge and acquisition cases in Internet history. Let's summarize some of them here. 1. Bebo Buyer : AOL Acquisition price : 650 million US dollars Sold price : 1 million US dollars Loss: 849 million US dollars In 2008, AOL was still belong to Time Warner. It made a decision to acquire the third largest social networking site Bebo, The...
Merge and acquisition,Loss,MySpace 2013-07-03 08:37:13
Some measures for improving Linux server security
The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...
Linux server,Server security 2012-08-21 05:08:50
Useful git commands in daily work
In a developer's daily work, it is frequent to see lots of commits made. It would be a headache if one cannot use git commands well especially when in cases where some fixes need to be made on existing branches. There are some frequently used command such as git pull, git merge and git push. Apart from these, there are some other practical commands which may be useful for real use cases. This post will try to list some of them. git grep It will lists all files containing the searched keywo...
GIT,GIT COMMAND,GIT LOG 2022-05-01 03:17:15
Disgusting programming language list
To avoid arguments among different programming languages, this ranking only covers the opinions from programmers with multi-language experience. Also it doesn't mean the language is not good if the language is on the list, it just means those developers don't like some features of the language. Below ranking is summarized from Quoraã€Stack Overflow and Hacker News. 10. Python Reason : It uses code indent to define block level scope, why not use curly braces? It also uses massive colons and ...
Programming language rank 2013-09-27 09:53:39
Only 4G can resolve the conflicts between China Telecom Carriers and WeChat ?
Why WeChat has made the three big Chinese telecom companies uncomfortable? Let's analyze from both technical and commercial levels. From a technical point of view, Mr. Huang, Dean of China Mobile Research Institute, described the impact of "always online service" applications like WeChat. Instead of using technical terms, we will explain in simple vivid phrases. First, mobile QQ, or WeChat, will have their own "request frequency". These requests are sent to the carrier network, to check the re...
Is Java the platform of the future?
I've mentioned before, but I think we are living in a period of time where a bigger explosion of programming languages is occurring than at any time in the past four decades. Having lived through a number of the classic languages such as BASIC, Simula, Pascal, Lisp, Prolog, C, C++ and Java, I can understand why people are fascinated with developing new ones: whether it's compiled versus interpreted, procedural versus functional, languages optimised for web development or embedded devices,...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>