SEARCH KEYWORD -- SYSTEM DESIGN
Some famous article aggregators
Blogs are still very important places for people sharing their thoughts about something although some social media platforms have replaced some of these capabilities. As a blog writer, how can you let others know what you are thinking about? Besides your friends and social media platforms, there are some article aggregators around us which can help us promote our articles. Other than some aggregators like Google News, readers can submit articles to these sites themselves What are some famous art...
News aggregator,Reddit,Digg,Hacker News 2013-08-12 03:34:37
Signature sign/verification demo in Java
Digital signature is commonly used in areas where data authentication and integrity are required. It is extremely important to have signature while transferring sensitive data from one peer to other peers through network since there might be malicious applications or man-in-the-middle attacks which may alter the data along the way. Java provides some APIs to generate and verify digital signature. One important class is Signature. When generating the signature, a private key needs to be pa...
Recover deleted file in Linux EXT3 file system
Environment : CentOS 5.3 x86_64, /dev/sdb1 is the data segment /data0. EXT3 file system. Problem : /data0/tcsql/cankao/phpcws-1.5.0/httpcws.cpp is deleted mistakenly and httpcws.cpp is not backed up. It will take much time to rewrite this program again. So we must recover it back. debugfs is feasible in EXT2 file system, but in EXT3 file system, it's not very useful. There is one open source software called ext3grep which can help us recover deleted file in EXT3 file system. The recovery steps a...
Linux,EXT3,File recovery 2013-08-16 07:06:45
10 design principles of Google data center
Google's data center supports the world's largest search engine, smart phone application platform and cloud computing services. The data center is Google's core engine and competitiveness. Over the years, Google also plays the role of the founder and innovator of large-scale web service data center technology. Its data center infrastructure design is also at the forefront of the industry, including renewable energy use, low-power refrigeration, new energy utilization as well as data center room ...
Google,Data center,Design principle 2013-03-11 19:09:25
New Features to Look Out for in Xcode 9
When we say Xcode, we mean a designing toolset which is completely packed with features. Using this Xcode, developers can create applications for platforms such as the Apple TV, the iPad, Apple Watch, and the iPhones and even for the Macintosh. The development system for Xcode has a mixture of features. These are called the instrument analysis tool, simulators, and the ever important OS frameworks which are present in the package in a variety of form of tvOS SDKs, iOS SDKs, watchOS SDKs, and the...
Why can System.out.println be used to exit while loop
Let's first take a look at one simple Java thread code snippet which is supposed to exit the while loop after the first loop run. public class StopThread { private static boolean stopRequested; public static void main(String[] args) throws InterruptedException { Thread backgroundThread = new Thread(new Runnable() { @Override public void run() { int i = 0; while (!stopRequested) { i++; } } }); backgroundThread.start(); TimeUnit.SECONDS.sleep(1); stopRequested = true; } } But the tr...
The story behind Sublime Text
Sublime Text is a cross-platform text and source code editor, with a Python application programming interface (API). The graphical user interface design was inspired by Vim.Its functionality is also extendable with plugins; Post its release, it gained much attention and wide popularity. Do you know what's the story behind Sublime Text? Jon Skinner left his job as a software engineer at Google in order to pursue a dream: to build a better text editor. The end result is the popular Sublime Text t...
Sublime Text,Story,History 2013-09-22 11:05:36
Access control in Java -- doPrivileged
Previously we have introduced how Java performs permission check to protect resource access. What if sometimes we need to give some class the temporary access to some resource which it initially doesn't have? AccessController provides six doPrivileged methods to fulfill this requirement. These six methods have below signatures : static T doPrivileged(PrivilegedAction action)static T doPrivileged(PrivilegedAction action, AccessControlContext context)static T doPrivileged(PrivilegedExceptionA...
JAVA,SECURITY,DOPRIVILEGED 2016-03-08 05:46:42
An ex-Mozilla employee's view about Chrome
Chrome now becomes the most popular web browser on the planet because it provides excellent user experience. As a general user, we think it's fast and easy to use. How about those who develop web browsers? How do they think about Chrome? Abhinav Sharma ,an ex-Mozilla employee and now Facebook employee, shared his opinion about Chrome. Mozilla fights an uphill battle given Google's advertising budget and capacity to have some incredibly good engineers and designers work on Chrome. They also came ...
Remote execute command in Java example
Frequently there is a need to logon to a remote system and run some commands or programs to get the output, many software can serve this purpose such as putty and gitshell.These software usually provide secure access to the remote system. But have you ever wondered what to do if you need to run commands on many different systems at the same time and get all these results back at a single place? Especially in big data era, many tasks may run on different distributed systems and you want o have a ...
JSch, Example, Distributed system, SSH2 2014-12-12 03:20:19
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>