SEARCH KEYWORD -- Simple
Shortest command on Linux
Usually when we log in to a Linux system,. we may type some frequently used Linux commands such as pwd,ls, ps etc. All these commands are really simple but powerful with different options. But do you know what is the shortest command on Linux? The answer is w. According to Linux manual, w will show who is logged on and what they are doing on the system. w displays information about the users currently on the machine, and their processes. The header shows, in this order, the current time, how l...
Linux,w,shortest command 2014-04-30 11:07:38
OpenLDAP Proxy -- slapd.conf
In the introductory post of OpenLDAP proxy, we mentioned that slapd.conf is the configuration file which tells the slapd service what to do. Apart from this, there is a dynamic way of configuring slapd where the configurations are stored in LDIF database. In the future, LDIF database will be the one for configuring slapd, the old style of slapd.conf is deprecated. The slapd.conf can be converted to LDIF style using the slapdtest command. slapdtest -f /etc/ldap/slapd.conf -F /etc...
OPENLDAP,OPENLDAP PROXY,SLAPD,SLAPD.CONF 2017-10-29 04:01:39
Why doesn't Microsoft involve in the patent war with Apple?
After Apple and Samsung patent war ends, Samsung immediately announced that they would continue to appeal. People are now guessing that the next target of Apple is Motorola and Google, while the situation getting worse, we could not help to ask why there is no emergence of Microsoft?At first glance, the answer seems to be very simple, both Microsoft Window 8 and Window Phone products do not have much intersection with Apple's products. But there is an unknown reason, there is a patent cross-lice...
5 Lightweight PHP Frameworks For Creating An API
PHP is undoubtedly one of the most popular programming languages that offer a wide range of lightweight frameworks for building basic websites to REST APIs. These frameworks are powerful tools that have the potential to enhance productivity in order to deliver faster results without getting distracted from the best practices of development. Developing REST APIs with plain PHP is a tedious and time-consuming process. In order to sort this out, you only need to hire php developers who have a niche...
Facebook hires all Pieceable employees
Facebook recently hired all employees from Pieceable, a web service provider which lets iOS app publishers deliver their apps to the browser and preview their apps in the browser. Facebook claimed that they didn't acquire Pieceable, they just hired their employees. Now Pieceable service is shut down. Currently there are around 800000 app demos on Pieceable, developers can try and show off their iPhone or iPad applications by putting their apps on Pieceable's web service. What Facebook did disapp...
Fix issue "cannot load such file -- bcrypt_ext (LoadError)"
bcrypt() is a sophisticated and secure hash algorithm designed by The OpenBSD project for hashing passwords. The bcrypt Ruby gem provides a simple wrapper for safely handling passwords. However, sometimes the rails application would fail to start after installing the bcrypt gem on Windows. The error would look similar to below. The issue is that it fails to load the bcrypt_ext which is the native built extension, the reason may be the library is wrongly built. To fix this issue, below steps can...
RUBY,SOLUTION,RUBY ON RAILS,BCRYPT,LOAD ERROR 2017-03-05 00:21:10
Google's acquisition of Quickoffice threatens Microsoft
Windows has over 90% market share in desktop operating systems, even though now other OS such as Mac OS and Linux are saying they are more user friendly, more stable and safer than Windows, Windows still has a weapon MS Office which can defeat all of them. However, with the development of mobile network and cloud computing, Windows is now challenged by different competitors on mobile and cloud areas. Mobile and cloud are weak sides of Microsoft , but they are strength of Google.Google sudd...
Google,QuickOffice,Microsoft,MS Office 2012-06-07 11:40:10
A simple example of git bisect command
git bisect is a very powerful command for finding out which commit is a bad commit when bug occurs. The rationale behind this command is that it pin locates the bad commit by divide and conquer. It divides the commit history into two equal parts, then determines whether the bad commit is at the first half or at the other half. This process will continue until the bad commit is located. Here is a really good example created by bradleyboy, this is a simple git repository which demonstr...
GITHUB,GIT,GIT BISECT 2019-07-12 10:31:51
Video website in big data era
Big data initially means the large data set which is not able to be analyzed, but later it was derivatized to the method to analyze huge amounts of data in order to gain great value.This is a form which gradually gets attention, It's difficult to analyze these data and it's also difficult to store these data and it needs some unprecedented way, Now in China many companies use the open source Hadoop distributed data cluster to meet the needs of data statistics. Since we can get segmented d...
Netflix,Big data,Data mining 2013-04-11 04:20:40
A simple tutorial on writing Java native program
Java provides Java Native Interface(JNI) to enable developers to write programs which can utilize the underlying native libraries of the operating system. The benefits of writing native code are that they normally provide better performance compared to Java codes. Sometimes if you want to utilize some system specific functions you may also want to use JNI. One main drawback of writing native code is that your application may not be platform independent anymore. This is not what Java is desi...
Java native interface, JNI, Native code, Sample 2015-08-15 08:28:15
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>