SEARCH KEYWORD -- Property
How Chinese tech websites survive
As a tech site which aims to share knowledge and experience, content is its core value. To attract readers, it needs to produce valuable content and keep the originality of the content. When an article is published on a site, it should be a copyrighted property of that site or the original author while others should be very careful when considering to copy that article to their own site. They should generally avoid to copying the whole content of the article. However, in reality, this is no...
How to play with cross domain request
What is cross domain request In simple, cross domain request is to request resource from other domain in one domain. Note, the "other domain" doesn't just mean domain name only, it includes much more. If the protocol, domain name, port is not the same, two domains will be considered different. Below example describes what is considered as different domain. http://www.a.com/a.jshttp://www.a.com/b.js # Same domainhttp://www.a.com/lab/a.js &nb...
FRONT END,JSONP,CROSS DOMAIN,CROSS ORIGIN,CORS,DOCUMENT.DOMAIN,WINDOW.NAME 2016-11-06 00:48:54
Microsoft forms a new subsidiary focused on open source called Microsoft Open Technologies
Microsoft once again changes its attitude and intends to set up an open technology subsidiaries in order to promote the formulation of open-source projects and standards.The new company name is Microsoft Open Technologies and Jean Paoli, Microsoft executives will be the president of the new company. The company will also form interoperability strategy team in the future. The newly established company will have about 50-75 employees.Over the years, Microsoft has been considered to be the rival of...
Microsft,Open source,Microsoft Open Technologies 2012-04-13 06:10:45
JavaScript to scroll element into view
In AJAX applications, there are frequent needs to scroll some element into view after some modification to the page. For example, after adding an item or updating an element in an admin panel, the page may need to be scrolled to the item added or updated so that we can see the changes immediately. In these cases, JavaScript can be used to scroll the element we want to show. In Vanilla JavaScript, there is no built-in function which can achieve scroll_element_into_view(), but most of modern brows...
JAVASCRIPT,JQUERY,SCROLLTO,HOW-TO 2015-12-17 03:47:32
Different types of keystore in Java -- DKS
Domain KeyStore(DKS) is a keystore of keystore. It abstracts a collection of keystores that are presented as a single logical keystore. Itself is actually not a keystore. This new keystore type is introduced in Java 8. There is a new class DomainLoadStoreParameter which closely relates to DKS. To load different keystores into the single logical keystore, some configuration is needed. Here is the format of the configuration for grouping different keystores. domain [ ...] { keystore [ ....
Use cases of Java enumeration
JDK 1.5 introduces a new type -- enumeration. In Java, it's just a small feature, but it can bring us much convenience.Here we summarize some use cases of Java enumeration. 1. Constant Prior to JDK 1.5, we can define constant as public static final..., now we can use enumeration to group all constants in one enum variable and it also provides some useful functions. public enum Color { RED, GREEN, BLANK, YELLOW } 2.In Swit...
Java, Enum,enumeration 2013-01-05 09:15:30
Tips and tricks about JavaScript from Google
JavaScript is now a very popular client side language. It's flexible, powerful but easy to make mistakes. So good programming style is better for you to write efficient and readable JavaScript codes. Here are some tips and tricks about JavaScript from Google. True and False Boolean Expressions The following are all false in boolean expressions: null undefined '' the empty string 0 the number But be careful, because these are all true: '0' the string [] the empty array {}&n...
JavaScript, Google, Coding standard 2013-02-26 23:11:03
Access control in Java -- Permission check order
Previously we showed you how to turn on SecurityManager in Java. After SecurityManager is turned on, a series of permission checks will be applied on the code you are calling in your application to protect some resources against malicious access such as files, sockets etc. To perform these permission checks, a set of Permissions will be created and checked using the AccessController. The AccessController has three purposes : To decide whether an access to a critical system resource is to be all...
JAVA,SECURITY,ACCESSCONTROLLER 2016-03-07 04:17:40
5 good anti SOPA designs
The Stop Online Piracy Act (SOPA) is a United States bill to expand the ability of U.S. law enforcement to combat online copyright infringement and online trafficking in counterfeit goods. Its goal is to protect the intellectual-property market and corresponding industry, jobs and revenue. However since its proposal, many organizations protest against it as they believed it would threaten free speech and innovation, and enable law enforcement to block access to entire internet domains due t...
Java Concurrency Basics: CountDownLatch and CyclicBarrier
CountDownLatch CountDownLatch can be used in synchronizing behavior among threads, it makes one or more threads wait for some actions in other threads to be completed. It has a property count which defines how many countDown() need to be called before other threads which called await() to be waked up. When a thread calls CountDownLatch.await(), the thread will be blocked until the value of count becomes 0. The initial value of count can be specified when creating the CountDownLatch instanc...
JAVA,JAVA CONCURRENCY,COUNTDOWNLATCH,CYCLICBARRIER 2018-03-25 07:02:40
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>