SEARCH KEYWORD -- Social media
WireGuard VPN: Setup WG_VPN client App on Android phone and connect to local WG_VPN server on VM
We will show the detail steps about how to setup the WireGuard VPN client on an Android phone/pad and configure the VPN client to connect a WG_VPN server in local network. The setup process contents three main steps: Install WireGuard and create a key-pair in WireGuard client. Add the Android client peer information in the WireGuard server’s config file. Config the Android WireGuard client to connect to the server. The test environment network configuration: Step 1. Install Wire...
How to organize a successful technical party?
Since last year, I began to take part in some technical parties. Some are held very successful, while some seem not. In this article, I will share ideas about how to organize a successful technical party and use Golang programming language as an example. To hold a party, there must have been a stable user group first. According to the number of user, there may need a committee or a president, and the job of the organizer is searching for the sponsors, selecting the topics, etc. Although there ha...
Will Google+ be a "Ghost City"
Just now, I read an article about Google+’s status quo. The key point of this article is that it states that Google+ is now a “Ghost Cityâ€. According to the article, users of Google+ spend only 3 minutes per month on Google+, this is a very low participation rate for a social network website. After reading this, I wonder whether Google+ is really a Ghost City now, I cannot give my answer. Since it was released just around 8 months ago, so the user base is not very large. ...
Google+,Social fayigue,User base,Ghost City 2012-02-28 09:44:39
Additional steps need to implement to setup shadow-boxV2 OPTEE on Raspberry PI
We followed the Shadow-box v2 project from the https://github.com/kkamagui/shadow-box-for-arm to set up the trustZone on Raspberry PI modeB to protect the Linux Kernel. But got a problem when doing the step: [3.6.5. Activate Shadow-Box for ARM and Start Secure Pi!] to create the hash for the memory area. The result is not shown. If you met the same problem, this is what I did to fix the problem on my PI: 1.1 When we do the step [3.5.1. Copy OP-TEE OS with Shadow-Box for ARM and N...
HARDWARE,RASPBERRY PI 2019-05-20 08:52:55
C++/CLR int to System::String^
In C++/CLR (for Microsoft), sometimes we need to convert int to System::String type or vice versa. The simple way is :From System::String^ to int int num= int::Parse(str); // System::String^ to int From int to System::String^ System::String^ str = num.ToString(); // int to System::String^For all the other data types, similar ways can be adopted....
C++,CLR,Microsoft,System::String,Convert,int 2011-12-15 12:47:22
9 fields platform companies need to fight for
If you are person reading technology news much, you will find a large part of the tech news are about a few companies : Apple, Google, Facebook, Amazon and Microsoft, in which the first four are today's "Big Four (platform)" as said by Google Chairman Eric Schmidt. These giants have both competition and cooperation in many areas, and each has its own place in the world, with Schmidt's words, Google dominates search, Apple designs device, Amazon occupies e-commerce and Facebook leads social. Alth...
Big four, Future,Software and hardware 2012-10-20 09:50:43
Path gets another $40miliion investment
Social network website Path may officially announce today that it has completed its funding round B. According to sources, Red Point led this round of funding of $ 40 million. In addition, Path's market value is estimated about $ 250 million.Path was established in November 2010, there are currently over 2 million registered users. The company's slogan "Path to help you easily share with friends Life". Path call themselves "private social network" because Path is based on e-mail addr...
Path,Social network,Funding round 2012-04-17 06:50:10
Mutli-inheritance bug between python 2.7 and 3.7
When we have run a py3.7 code under py2.x or a py2.x code under 3.x ,if a class do mutli-inheritance from 2 parent and the 2 parents also got inheritance from same parent, the different way to handle inheritance chain between python 2 and 3 will cause some running time bug: Assume we got this sample program inheritTest.py : # Purpose: Test mutli-inheritance different between python2 and 3 # Author: Yuancheng Liu # Created: 2019/05/16 class A: def getVal(self): print("cal...
PYTHON,PYTHON 3,INHERITANCE 2019-05-16 08:33:52
Weibo is testing an Instagram like app called Lvzhou
Weibo, the Chinese version of Twitter, is testing an Instagram like app called Lvzhou(Oasis in English). Now only invited people can access the app. You can download the app on App Store if you are an iPhone user or you can download online if you are an Android user. The vision of this app is to allow users to discover beautiful world, users can post photos or short videos and share with the rest of the world. Before you can access the app, you have to obtain an invitation code shared by y...
GitHub is to raise fund
Popular social coding and code hosting site GitHub is close to make an fund raising agreement with venture capital firm Andreessen Horowitz. After this round of fund raising, GitHub's market value will be around $500-800million.GitHub is a very popular social coding website, the major clients are programmers from big IT companies. Recently, GitHub even becomes a platform for some big companies to recruit new programmers, some HR managers are more willing to read applicant's GitHun profile instea...
GitHub,Fund raising,Socail coding 2012-05-22 05:22:55
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>