SEARCH KEYWORD -- Prime number
The war with spam comment
Spam comments are annoying and notorious. They are either malicious data from hackers to exploit the loopholes of the site or advertisements posted by robots. These kinds of comments have their own features and patterns, if we are careful enough, we can find ways to block most of them although it's not so easy. To block the comment with malicious executable codes such as JavaScript, we should remember one rule : never trust user input. So wherever there are user inputs, we need to check the vali...
Spam comment,Block,Filter 2013-11-29 20:29:43
Apple will shut down Ping on 30th September
What? Apple also has social networks! Yes. Unfortunately, you just heard it and it is to be shut down. In fact, Apple launched Ping not too long ago, in September 2010, it was released together with iTunes 10.Ping allows users to share with your friends the music you are listening to, and you can even share concerts and activities information, and it supports for picture and link sharing. In addition, Ping also includes the "Top Ten" list of features that can be customized, each singer and the ...
Apple,Ping,Social network 2012-09-12 22:21:31
How small should a function be?
"The well-designed functions are often relatively small, large function design is often a mess or there is a lot of room for optimization."Maybe you think there is no need to discuss the size of functions, because the nature of the function design is cohesive, its size is only its manifestations. But it is necessary to discuss about the size of function because the statement above .First let's understand the concept of minimum code processing unit : a basic operation (assignment, comparison, etc...
Function size,Optimization 2012-12-18 13:58:07
How Do You Find the Best Password Managers?
Looking for a smart way to protect your range of electronic devices? Most of us access tons of websites and it could be difficult to store our passwords. It is important to not reuse store passwords that are easily identifiable. Keeping your information secure is more important than ever. Data breaches can occur anytime and sometimes takes months to discover. Sometimes, maybe, they aren’t. Target is a data breach, for instance, took months to discover. Information was leaked online from ce...
Today in history : Steve Wozniak invented Apple I in 1975
The original Apple Computer, also known retroactively as the Apple I, or Apple-1, is a personal computer invented by Steve Wozniak ion 29th June, 1975. Wozniak's friend Steve Jobs had the idea of selling the computer. Features:CPU : MCStek 6502CPU Speed : 1MHzBus Speed : 1MHzMemory : 8KbResolution : 60.05 Hz, 40*24 charactersPower : 58WPrice : $666.66The Apple I went on sale in July 1976 at a price of US$666.66, because Wozniak "liked repeating digits" and because they originally sold it to a lo...
Apple I,History,Steve Wozniak 2012-06-29 06:00:08
A journey to investigate a goroutine leakage case
In Go, creating goroutines is straightforward, but improper usage may result in a large number of goroutines unable to terminate, leading to resource leakage and memory leaks over time. The key to avoiding goroutine leaks is to manage the lifecycle of goroutines properly. By exporting runtime metrics and utilizing pprof, one can detect and resolve goroutine leakage issues. This post will go through one real case encountered by the author. The author maintains a service that connects to a targe...
TIMEOUT,SSH,GUIDE,DEBUG,LEAK,GOROUTINE,PPROF,GOLANG 2024-03-16 11:00:23
Software Development Company Shares Its Development Process
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
Normal
0
false
false
false
false
EN-IN
X-NONE
GU
CUSTOM SOFTWARE DEVELOPMENT COMPANY,SOFTWARE ARCHITECHURE,TESTING,REQUIREMENT ANALYSIS,MAINTENANCE 2016-01-21 00:13:26
Java development company briefs about Lazy and Eager fetch in JPA/Hibernate
Normal
0
false
false
false
EN-IN
X-NONE
X-NONE
JAVA,JAVA DEVELOPMENT COMPANY,LAZY FETCH,EAGER FETCH,JPA,HIBERNET 2016-07-08 06:08:28
8 very useful and free web security testing tools
With more pervasive of web applications, web security threats are becoming increasingly prominent. Hackers gain web server control by exploiting web server vulnerabilities and SQL injection vulnerabilities, then they may tamper with web content, or steal important internal data, the more serious is to inject malicious code into web pages to affect visitors of websites. Attention is gradually warming up to Web Application Security. Here we recommend eight very useful and free web security testing...
Website, security,Web security,Attack 2012-07-22 10:59:09
Google+ is sick
Google says that Google+ now has over 170million registered users, but according a new research report of Fast Company about Google+, Google+ is just a virtual ghost town.This research selected a sample of 40,000 random Google+ users. The result is :The average post on Google+ has less than one +1, less than one reply, and less than one re-shareRoughly 30% of users who make a public post never make a second oneEven after making five public posts, there is a 15% chance that a user will not ...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>