SEARCH KEYWORD -- Plain text
Tim Cook is ready for China
Everybody knows that China is a big potential market. China is the biggest market of iOS devices. Currently for iOS devices, the market in North America is almost saturated, while Asia market especially China has a very big capacity for iOS devices. Tim Cook has noticed this trend. So his newly released iOS6 has showed his preference for Chinese market. The new features added to iOS6 for supporting Chinese are : With improved text input and built-in support for popular Chinese Internet se...
Convert number to string in C++
Prior to C++11, there is no built-in function in C++ standard library which can be used to convert numbers such as interger and double number to string. There are many ways which can convert number to string. Since C++ is C compatible, we can use itoa() function to convert an integer to C style string. But this one can only convert integer to string, not double. For different types of numbers, we need to use different functions. string s = string(itoa(a)); Actually, we can also use strings...
C++,conversion,number,string 2012-08-14 15:52:48
3 Most Popular Ways Hackers Steal Your Phone Data – Stay Safe
Our mobile devices store personal information, including passwords, usernames, birthdates, financial information, social security numbers, PIN, etc. Hence, this makes hacking a mobile phone an attractive option for hackers and scammers. There are various techniques that hackers use to spy on a mobile phone for personal information. Also, stalkers can make use of spy apps and malicious software to spy on unsuspecting people. Mobile phones are not secure because these devices connect to other net...
TECH 2019-11-29 00:29:40
1) How to Reset a Mac Computer
Why do you want to reset your Mac computer? Probably, you are thinking about selling it. Alternatively, maybe the computer has become too slow thus frustrating you most of the time. Additionally, you may simply be considering freeing up some space. Regardless of your reasons, the first thing you should realize is that resetting the machine is a demanding task. Additionally, it would be great to remember that in resetting the machine, you are basically formatting the hard drive fully while reins...
Linux Clock : CST,UTC and NTP setup
1. There is an option when you set up clock on installing Linux: system clock users UTC, so what does UTC mean? It's Universal Time Coordinated(UTC), there are two different times in GPS system: one is UTC , the other one is LT(Local Time). The difference between these two is just the timezone difference, UTC is the time in timezone 0. If the local time in Beijing is 8 o'clock in the morning, then UTC time is 0 o'clock, which is a 8 hour difference. 2. In Linux, when we use date to check the tim...
Click and Drag on xkcd
xkcd is a webcomic created by Randall Munroe. The comic's tagline describes it as "a webcomic of romance, sarcasm, math, and language." Also some webcomics about IT may frequently appear on it. For example, the following one-- People who know Unix will understand it easily. In fact, xkcd is a Geek culture, many comics inside this site can only understood by some specified group of people. The comic began in September 2005 when Munroe decided to scan doodles from hi...
xkcd, 1110,Click and Drag 2012-11-05 11:23:19
Integer overflow
You may be familiar with integer overflow, but what you may not be familiar with is how gcc handles signed integer overflow. First let's look at the standard, for unsigned integer, the standard says : A computation involving unsigned operands can never overflow, because a result that cannot be represented by the resulting unsigned integer type is reduced modulo the number that is one greater than the largest value that can be represented by the resulting type. In other words, unsigned integer ov...
Integer overflow,gcc,Linux 2012-10-20 13:33:10
Resolve SystemStackError issue when resolving IP address in Ruby
In Ruby, Resolv is the default DNS resolution implementation. It can be used to resolve IP address of a hostname. To use it, one just needs to require 'resolv' in the code. But sometimes, a user would want to check /etc/hosts first or some other mechanisms to resolve an IP address. In this case, one can require 'resolv-replace' and then replace the default DNS resolvers with customized DNS resolvers. For example, using resolv-replace, one would write require 'resolv-replace' Resolv::DefaultResol...
RUBY,RUBY ON RAILS,NETWORK 2017-07-08 09:54:35
How to find which process a file is being written by in Linux?
Some people ask a file is being written by one process and they want to check this process, but they cannot find the process even with sof. This question is very common and there are many solutions, here we introduce a straightforward method. In Linux, each file will be stored on one device and of course there will be a relative inode, then we can use vfs.write to know who is writing the inode on one specified device continuously. Luckily there is inodewatch.stp in the installation package of s...
Linux,process,file write 2013-03-16 21:44:35
Apple's new patent for non-programmers
U.S. Patent and Trademark Office this week announced a new Apple patent called "Content Configuration for Device Platforms" which they applied in December 2011. This patent describes a new border software that allows users who do not understand code to create applications .The patent mentioned that computer programming language has become the obstacles to creating applications, because a lot of content writers and designers do not have knowledge of computer programming.Thi...
Apple,New patent,Authoring tool 2012-04-15 01:16:17
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>