SEARCH KEYWORD -- Prime number
When will resizing be triggered in Java HashMap?
HashMap is one of the most frequently used collection types in Java, it stores key-value pairs. Ideally it expects to use hash table which expects the data access time complexity to be O(1), however, due to hash conflicts, in reality, it uses linked list or red-black tree to store data which makes the worst case time complexity to be O(logn). Although collections are using data structures like arrays and linked lists, unlike arrays, they will dynamically resize when there is not enough spa...
Some frequently used ES6 code snippets
Below are a list of ES6 code snippets which are used frequently. Hope that it will be helpful. 1. Shuffle array elements let arr = [67, true, false, '55'] arr = arr.sort(() => 0.5 - Math.random()) console.log(arr) // [ '55', 67, false, true ] 2. Remove characters which are not numbers const str = 'xieyezi 23213 is 95994 so hansome 223333' const numbers = str.replace(/\D/g, '') console.log(numbers) // 2321395994223333 3. Reverse sequence or words const sentence = 'xieyezi js so handsome, lol.'...
JAVASCRIPT,ES6,CODE SNIPPET,TIPS 2022-04-10 07:56:07
Is Singapore a good place for startups?
Singapore is long time being considered as a perfect place for living and investing given its beautiful environment, warmly climate, well-polished legal system and well-known richness. Its government is relatively young and open-minded. They like to take new challenges and embrace new technologies. It's the first country to open its government data to the world online. Many of you may consider that Singapore would be a perfect place for you to start your next startup. But the tr...
Gemini Example with Go
To connect and use Gemini with Go, Google's LLM, one can use their official Go SDK for doing this. In this post, we will just show a simple chat example to demonstrate how to make it work with Go. The example is just to ask the model to translate some English to Chinese and get its output. The code actually looks like: var client *genai.Client // geminiOnce.Do(func() { client, err = genai.NewClient(ctx, option.WithAPIKey(string(apiKey))) if err != nil { log.Fatal(err) } model := client.Genera...
EXAMPLE,GO,TRANSLATION,GOLANG,GEMINI 2024-12-14 19:37:23
Funny Linux commands
1. sl You will see a train moving from the right to left on the screen. Install : $ sudo apt-get install sl Run : $ sl It has options like -aiFe: -a An accident seems to happen. You'll feel pity for people who cry for help.-l shows little one.-F It flies.-e Allow interrupt by Ctrl+C. We can also make fun of other people by setting an alias like below: $alias ls=sl When the user types ls, he will see the train instead of the file list. 2. fortune Output one statement, it can be a joke, or famous...
Linux,funny command,figlet,sl 2013-06-08 21:30:26
Use progressive JPEG to improve user experience
JPEG image files can have two different save types : Baseline JPEG and Progressive JPEG. Both of them have the same extension name but with different display effect. Baseline JPEG This type of JPEG files are scanned from top to bottom consecutively, each line of the image data will be saved sequentially. When opening this kind of images, data will be displayed with the save order line by line until all the data are read. If the image size is very large or network speed is very slow, the image wi...
USER EXPERIENCE,PROGRESSIVE JPEG,BASELINE JPEG 2013-07-25 08:11:50
A simple example of git bisect command
git bisect is a very powerful command for finding out which commit is a bad commit when bug occurs. The rationale behind this command is that it pin locates the bad commit by divide and conquer. It divides the commit history into two equal parts, then determines whether the bad commit is at the first half or at the other half. This process will continue until the bad commit is located. Here is a really good example created by bradleyboy, this is a simple git repository which demonstr...
GITHUB,GIT,GIT BISECT 2019-07-12 10:31:51
Deep Understanding of ReentrantLock: Unlocking the Mysteries of Java Concurrent Programming
ReentrantLock introduction ReentrantLock is a class in the Java concurrent package, java.util.concurrent.locks, and is an implementation of the Lock interface. As its name suggests, it is a reentrant mutual exclusion lock. A mutual exclusion lock is a synchronization tool used to protect shared resources, ensuring that only one thread can access the resource at a given time. Reentrant means that a thread can acquire the same lock multiple times without causing a deadlock. This lock provides some...
JAVA,REENTRANTLOCK,CONCURRENCY,MULTITHREADING 2023-05-22 08:01:13
Top Digital Transformation Trends To Lookout For in 2018
While Innovation was rife in 2017, it is expected that 2018 will bring the cherry on the cake. While businesses are shifting continually towards making things work with Technology in view, organizations have had to embrace the Tech wave for good. A paradigm change in the way businesses operate is the consequence of the trends in Digital Transformation. From Artificial Intelligence to Blockchain, to Machine Learning, to Data Analytics, 2017 saw the onset and the growth of numerous new Technologie...
CUSTOM SOFTWARE SOLUTIONS,SOFTWARE DEVELOPMENT,OFFSHORE SOFTWARE DEVELOPMENT,OUTSOURCING SOFTWARE DE 2018-01-10 00:37:38
What is the Right Length of a Blog Article?
The length of your blog posts can build your website or break it. If you thought that this is a myth then you are wrong. Pleasing the search engines is one of the targets of SEO efforts. However, you have to please your visitors as well. With good traffic then you will get good ranking on the Search Engine Results pages (SERPs). One of the best ways to increase your traffic is to make sure that once a visitor lands on your site then they will come again for more information. The length of your b...
DIGITAL MARKETER ,SEO,SEO TOOLS 2016-03-05 04:18:28
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>