SEARCH KEYWORD -- SESSION KEY TYPE
Differences between bashrc and profile in Linux
After login to a Linux system, the command console will show up with a prompt label such as # or ~, a shell command can be typed after this prompt and the system can execute the command thereafter. All these operations are handled by shell. Shell is a command language interpreter that executes commands read from the standard input device (keyboard) or from a file. There are different types of shells such as bash, ksh, csh etc. The most commonly used of them is bash and it's also the de...
LINUX,PROFILE,BASH,BASHRC,.BASHRC,.PROFILE 2016-11-05 22:17:51
Mac shortcut key cheatsheet
More and more people are using Mac computers or switch from Windows or other OS to MacOS, there are lots of shortcut keys which can help improve the work efficiency or ease operations. This post will try to list some commonly used shortcut keys in Mac. But before that, let's first know some common keys on a Mac computer keyboard. There are four major function keys: Command, Control, Option and Shift. Most of the shortcut keys will combine the functional key and other key. Basic Command key is t...
SHORTCUT,SCREENSHOT,COMMAND,SHORTCUT KEY,MACOS 2019-02-05 07:13:06
Hide a file in a picture
Sometimes if you want to hide some important files on your computer which you don't want others to see, how would you do that? Find a professional tool? Set password for some folders? Change the file properties to hidden? They are possible, but they may not be so convenient or so secure. Here we share with you how to hide a file in a picture. Prerequisites 1 picture for example : test.jpg 1 test file, for example : test.txt WinRAR Steps Prepare the picture test.jpg and test file test.txt Use ...
Trick,Picture,Fil hiding,WinRAR 2012-09-13 19:36:36
Cool things you can do with iPhone
Nowadays smart phones have plenty of cool features you can get to know without reading the manuals. But do you know there are some useful but less well known features which can ease our life? In this post, we will share with you some cool features on iPhone. If you have an iPhone with, go and get a try. 1. Use Google Map as free GPS While traveling abroad, you can use Google Maps as a free GPS without an international data plan by making use of it's hidden offline maps feature.You can use this f...
Different types of keystore in Java -- Overview
Keystore is a storage facility to store cryptographic keys and certificates. They are most frequently used in SSL communications to prove the identity of servers and clients. A keystore can be a file or a hardware device. Three are three kinds of entries can be stored in a keystore depending on the types of keystores. The three types of entries are: PrivateKey : This is a type of keys which are used in asymmetric cryptography. It is usually protected with password because of its sensitivity. It ...
JAVA,KEYSTORE,OVERVIEW,JKS,PKCS12,JCEKS,PKCS11,DKS,BKS 2014-08-18 02:09:54
4 Things Every Great Online Teacher Knows
Virtual classrooms have become the new norm for education during the pandemic. Teachers from every school have to adjust to this new reality to ensure students keep learning even in the absence of a physical classroom setup. Thankfully, there are various digital solutions to help teachers conduct online classes without much hassle. One such tool that has revolutionized the online learning market is a Learning Management System (LMS). For schools, the in-house learning management department...
Service discovery with etcd
In previous post, we have talked about etcd and its usage. This post we will cover how to implement server discovery with etcd. Service discovery is to solve one of the most commonly seen scenarios in distributed system where how to find the corresponding target service to talk to. In short, it is to find some server which one can talk to based on some service name. A complete service discovery system include below three key functions: Service registration: A service must register itself to so...
ETCD,SERVICE DISCOVERY,DEMO,TUTORIAL 2021-03-08 05:36:29
Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
When working with large language models like Claude from Anthropic, understanding how many tokens your input consumes is essential for managing costs and optimizing performance. In this blog, we’ll explore how to calculate token counts for a given input using Go. We’ll use Anthropic’s count_tokens API endpoint, which provides a straightforward way to determine token usage. Prerequisites Before diving in, ensure you have: A working Go environment (installation guide). An Anthro...
CLAUDE,GO,GOLANG,TOKEN CALCULATION,GUIDE,EXAMPLE 2024-12-23 22:25:29
Solve Hibernate "Too many connections" issue in MySQL
When working with Hibernate and MySQL, sometimes some exceptions will be thrown after sometime. The exception may seem like : java.sql.SQLException: Data source rejected establishment of connection, message from server: "Too many connections" This means there are too many active connections on the MySQL, you can use SHOW STATUS LIKE '%Threads_connected%'; to check the active connections to MySQL. If you want to change the maximum connections allowed to MySQL. You can execute: set global max_co...
12 Eye-Popping Presentation Ideas That Will Keep Everyone Awake
Photo credit: Freepik Engaging an audience during a presentation is a challenge every speaker faces. The key to a successful presentation is not just delivering information but doing it in a way that captivates and keeps the audience interested throughout. Here are 12 creative and eye-popping ideas that will ensure your audience stays awake, attentive, and inspired. Start With a Shock Begin your presentation with a surprising fact, shocking image, or a provocative question. This creates immedia...
PRESENTATION SKILL 2024-06-19 07:09:23
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>