SEARCH KEYWORD -- System programming
How small should a function be?
"The well-designed functions are often relatively small, large function design is often a mess or there is a lot of room for optimization."Maybe you think there is no need to discuss the size of functions, because the nature of the function design is cohesive, its size is only its manifestations. But it is necessary to discuss about the size of function because the statement above .First let's understand the concept of minimum code processing unit : a basic operation (assignment, comparison, etc...
Function size,Optimization 2012-12-18 13:58:07
First Touch on OpenAI API
It’s been a while since ChatGPT launched, and I’ve been meaning to try out the OpenAI API. Recently, I finally took the plunge, so here’s a walkthrough of my initial experience using it. Objective: I’ve previously used ChatGPT’s interface for language translation tasks between Chinese and English. For this API experiment, I aimed to set up a simple translation function using the OpenAI API. Step 1: Getting the API Key First, to access the API, I created an OpenAI ac...
TUTORIAL,API,TRANSLATION,OPENAI,FREE ACCOUNT 2024-11-11 22:25:07
Difference between localhost and 127.0.0.1
Lots of people would think what the address 127.0.0.1 is when first seeing this address. In fact, 127.0.0.1 is a loopback address which refers to the local machine. It is generally used for local testing. When typing ping 127.0.0.1 on local command console, it will send network packets to local IP/TCP layer to test whether IP/TCP works properly or not. To those who are used to use localhost, it is actually mapped to 127.0.0.1 by default. There are hosts files in the system which store this...
LINUX,NETWORK,LOCALHOST,127.0.0.1,LOCALHOST VS 127.0.0.1 2018-09-29 22:11:12
How to apply Domain Level Group Policy
As a system administrator, you may often need to create a Windows domain of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database (called a directory service). Also one or more domain controllers need to be deployed to enable managing the domain. In this post, we will show you how to apply Domain Level Group Policy. There are lots of posts which have covered how to promote a Windows server to a Domain Controller. ...
Group Policy,Domain Controller,Account Policy, GPO 2015-03-19 03:46:34
Latest : Asp.Net 5 Beta 7 Is Now Available
Asp.net developers can now use the latest update asp.net 5 Beta 7 on both NuGet and Visual Studio 2015 to make good asp.net development practices. The update also has the first public preview of .Net Execution Environment for Linux and Mac without any need of Mono. To know how to use asp.net 5 beta 7, read this article further. You need to install the update first to use its features with Visual Studio 2015. You can download and install it from Microsoft’s official site. The update brings ...
ASP.NET 5 BETA 7 2015-09-18 06:33:54
Different types of keystore in Java -- BKS
BKS is a keystore format provided by the popular third party Java cryptographic library provider -- BouncyCastle. It is a keystore similar to the JKS provided by Oracle JDK. Before starting to use BKS, the BouncyCastle provider has to be downloaded and installed. To download the provider, please go to BouncyCastle download page. The provider can be installed by adding an entry in the java.security file. security.provider.N=org.bouncycastle.jce.provider.BouncyCastleProvider N means the pr...
JAVA,KEYSTORE,BOUNCYCASTLE,BKS 2016-07-03 03:00:18
10 design flaws of JavaScript
JavaScript's design took only ten days. Moreover, the designer didn't want to design it initially, he just wanted to complete the task assigned by company. It is now a very powerful client side programming language used in almost all the websites. It's an excellent language, but it also has some flaws. 1. Not suitable for large projects JavaScript doesn't have namespace, it's hard to be modular, there is no standard for putting codes in multiple source files. It allows defining functions with th...
JavaScript, Design flaw, Object 2012-11-29 11:39:35
Is Mobile App Required For Your Business?
Having a mobile app for your business is the latest trend. Every business, large or small is aiming for developing a mobile app to attract customers and boost the sales. Products or services offered by the business do not matter in this case. The main purpose is to keep your users updated and engaged. An app is a perfect tool for generating new customers too. The statistics reveals that numbers of mobile internet users are more than the desktop users. It clearly means that businesses must ...
App Development Services, Outsource Android App Development, Android App Development Experts 2015-03-05 00:47:46
Using Java keytool programmatically
Java provides a command line tool to access and operate different keystore which store keys and certificates. This tool is named keytool and is located at \bin. On command line, you can issue below command to generate a keystore named mytest.jks which contains a private key and certificate chain. keytool -genkeypair -alias mykey -keyalg RSA -sigalg SHA256withRSA -dname CN=Java -storetype JKS -keypass password -keystore mytest.jks -storepass password Sometimes, in testing purpose, w...
How to install Oracle database on Linux using response file
There are two ways to install Oracle database on Linux :1). Using GUI; 2). Using response file. In this post, the method for using response file will be introduced. To install Oracle, please first get the Oracle database installation file ready. It can be downloaded from Oracle OTN. You need to have an Oracle account before you can download them. And there are three major components of the Oracle database installation : 1). The installation itself; 2). The network configuration; 3). Database cre...
LINUX,HOW TO,ORACLE DATABASE 2017-06-03 04:15:49
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>