SEARCH KEYWORD -- System programming
7 misunderstandings of DNS resolution
DNS resolution is generally considered as providing mapping between domain name and IP address, for example www.google.com maps to 74.125.71.103. There are two important reasons for doing DNS resolution: IP address is hard to remember, while domain name is human friendly Virtual host may access different contents according to the header of the host domain name(sub-domain name) Some webmasters may have some unreasonable requirements when doing DNS resolution. It mainly because they are not very...
DNS resolution,misunderstanding 2012-10-20 12:57:16
Java code to retrieve Bing background image path
When Microsoft presented their search engine Bing, this new design gave us some surprise, especially its background images, they are very beautiful and it will change every day. But unfortunately we cannot save the image onto our PC by right clicking the mouse. After some research on its source code, I found a feasible but not so sophisticated way to achieve this, we can retrieve the image path from the source code and then use this path we can download the image. This is just to sh...
Java,Bing,Background image path,URL,Download,Save 2012-05-02 10:51:51
5 million units of Galaxy Note II are sold until now
Samsung announced on its official website that the Galaxy Note II sales have exceeded 5 million units, the number of shipments reached 2 million in last 24 days.Galaxy Note II was officially released at the end of August and was on sale at the end of September, equipped with Android 4.1 Jelly Bean system, 5.5 inches HD Super AMOLED screen and a 1.6GHz quad-core Exynos processor.In the first 37 days on sale, Samsung Galaxy Note II had achieved 3 million units of sales,the sales is three ti...
Samsung Galaxy Note II,Sale 2012-11-26 11:19:21
Some cases where MySQL cannot be started
After installing MySQL, when we try to start MySQL, sometimes we may not be able to start it. The reasons can be different. We share some general cases where MySQL cannot be started. Case 1: Directory or file permission issue If the permission is set wrongly in MySQL's $datadir and its sub directories or files, MySQL will not be able to read and write files normally. Error message: mysqld_safe Starting mysqld daemon with databases from /usr/local/mysql/data /usr/local/mysql/bin/mysqld_safe: lin...
Guide for installing Ubuntu in VirtualBox on Windows
Have you ever tried to have two OSs installed on your PC? Do you want to try out the new Ubuntu system? If you do want to use Ubuntu when at the same time you are using Windows, you may want to install your Ubuntu in an VirtualBox. In this post, we will show you how to install Ubuntu in VirtualBox on Windows. Pre-requisites VirtualBox -- You can download it from Oracle. Ubuntu -- You can download it from here. Please note it should be an ISO file The Ubuntu used in this post is Ubuntu 12.04 LT...
Ubuntu,Windows,VirtualBox 2014-01-15 03:21:05
How deep should unit test go?
There is a question on Stackoverflow which says "How deep are your unit tests?". It is asked by a guy named John Nolan. The question is not too new, but what catches me is the Best Answer given by Kent Beck, who is the creator of Extreme programming(XP) and Test Driven Development(TDD). Let's look at the question first. The thing I've found about TDD is that its takes time to get your tests set up and being naturally lazy I always want to write as little code as possible. The first thing I seem ...
A HTTPS client and HTTPS server demo in Java
In this post, I will create a HTTPS server and HTTPS client demo which can establish HTTPS communication between a server and a client using Java. This should be very useful when we want to test our understanding about SSL communication. We will use both a detailed SSL client and a simple HttpsURLConnection as the HTTPS client. Before creating the actual HTTPS server and HTTPS client, we first need to generate the keystore and truststore to be used by the server and client. To generate the keyst...
Canonicalize XML in Java
XML canonicalization is often used when there is need to create digital signature to be sent to peers for verification. Since digital signature is created based on XML data, the XML data has to be canonicalized before its signature value can be calculated. Even an extra space may affect the signature value calculated, hence it must follow some rules to canonicalize the XML data so that it has a standard format. This is why W3C created specification Canonical XML Version 1.1. This specificat...
JAVA,XML,JAVA SECURITY 2016-01-20 01:39:45
What Is the Best VoIP Service Provider For Your Organization?
If you own an organization or a business and are looking for the most effective VoIP service provider, this is just the right place for you. You will get to know the best VoIP service provider for your needs. When VoIP services are the topic, there is no one like cNumber. cNumber is the best and a well-reputed name for VoIP services for most users and provides a lot of benefits for your business or firm. cNumber – Just The Perfect VoIP Service Provider With the cNumber cloud voice over IP ...
VOIP 2020-07-14 11:06:38
Go channel explained
In Go, a channel is a type of concurrent data structure that allows two or more goroutines (Go's term for lightweight threads) to communicate with each other. Channels provide a way for goroutines to send and receive values, and they are an essential part of Go's concurrency model. Here's a simple example that demonstrates how to use channels in Go: package main import ( "fmt" ) func main() { // Create a new channel with the `make` function ch := make(chan int) // Start a new ...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>