SEARCH KEYWORD -- SYSTEM
How to write good requirements
Requirements are pretty ubiquitous in the embedded world. They are used to define tasks, help coordinate large development efforts, and to communicate the behavior of the desired end product between the developers and the customer. When done right, requirements can be very useful. Unfortunately, if you spend much time working in the embedded world you quickly discover that there are a lot of bad requirements. And then when you try to go fix them, you quickly discover that writing good req...
Requirement gathering,Good requirement 2012-02-18 12:53:15
How Kafka achieves high throughput low latency
Kafka is a message streaming system with high throughput and low latency. It is widely adopted in lots of big companies. A well configured Kafka cluster can achieve super high throughput with millions of concurrent writes. How Kafka can achieve this? This post will try to explain some technologies used by Kafka. Page cache + Disk sequential write Every time when Kafka receives a record, it will write it to disk file eventually. But if it writes to disk every time it receives a record, it would ...
Reflection in Java
What is Reflection? Reflection is a feature in Java that allows a program to obtain information about itself at runtime and dynamically manipulate the properties, methods, and constructors of classes or objects. With reflection, we can instantiate objects, call methods, and set properties without knowing the exact class name beforehand. The core of the reflection mechanism is the Class object, which represents a class. The Java Virtual Machine (JVM) automatically creates this Class object when i...
JAVA REFLECTION,TUTORIAL,FIELD,METHOD 2024-06-27 07:52:12
Mount DD image on Linux
Yesterday, my Raspberry Pi running Arch Linux was not able to boot with error: Kernel Panic, not syncing: no init found. I spent a night on it, but could not find a working solution. The last option is easy: reinstall the system. That is really the last resort, for I do not want to re-setup everything I have done: samba server, Time Machine server, Xunlei Offline Downloader… Unable to mount the SD card The system does not boot, so I need to find a way to get into the file system to identi...
Android 4.0+ occupies quarter of Android market
Google updates its developer page about Android platform version market share. From the latest data, we can find Android 4.0 and above system occupy around 25% of all Android market. But Android 2.3 Gingerbread still occupies over 50% of Android market. From the above chart, Android 4.0 has 23.7% market share, the latest Android 4.1 JellyBean takes 1.8%, these two have 25.5% market share in total. But Android 2.3 Gingerbread alone still dominates the Android market, it takes 55.8% market share....
Check file readability in Java
File operation is quite platform dependent. Although Java is a cross platform programming language, the file operation in Java is also platform dependent. The obvious evidence is the file permission check. In Java, we can call canRead(), canWrite() and canExecutable() to check whether the program can read, write or execute the file specified. However, on Windows, when we call canRead() on a File object, we may get unexpected result. Actually, on Windows, when we call canRead() on a File object, ...
Use Java ThreadLocal with caution
According to Oracle documentation, ThreadLocal is a class provides thread-local variables. These variables differ from their normal counterparts in that each thread that accesses one (via its get or set method) has its own, independently initialized copy of the variable. ThreadLocal instances are typically private static fields in classes that wish to associate state with a thread. In short, ThreadLocal variables are variables belong to a thread, not a class or an instance of a class. One common...
JAVA,MEMORY LEAK, THREADLOCAL 2015-11-03 07:31:57
Google's new pirate penalty doesn't affect YouTube
Google has just announced a new policy: sites with high numbers of removal notices may appear lower in our results. However, this new policy may not affect the company's video site YouTube. In fact, they themselves clearly know that there are copyright protected contents on YouTube.According to a report published by Search Engine Land, through the "Removing Content From Google" page, users can remove content from the Google services with valid reasons, the services including Google Play, Google+...
Hadoop or Spark: Which One is Better?
What is Hadoop? Hadoop is one of the widely used Apache-based frameworks for big data analysis. It allows distributed processing of large data set over the computer clusters. Its scalable feature leverages the power of one to thousands of system for computing and storage purpose. A complete Hadoop framework comprised of various modules such as: Hadoop Yet Another Resource Negotiator (YARN MapReduce (Distributed processing engine) Hadoop Distributed File System (HDFS) Hadoop Common Thes...
COMPARISON,HADOOP,SPARK 2018-11-22 07:08:57
How to enable developer mode on Huawei
As a developer, there might be some need to fake locations when developing and testing mobile apps for different countries. Lots of the times some fake GPS apps will be used and they will ask to enable mock location access on the device before allowing you to fake GPS. To achieve this, we first need to have developer mode enabled. In this post, we will show how the developer mode can be enabled and disabled on Huawei devices. Go to Settings, find About phone and open it. You should be able to se...
ANDROID,HUAWEI,DEVELOPER MODE,DEVELOPER OPTIONS 2020-08-15 21:22:29
RECENT
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- Flows.network: Writing an LLM Application in Rust
- more>>