SEARCH KEYWORD -- TARGET BLANK
Nokia finally announces the death of Symbian
According to Sina.com. Nokia confirmed that the 808 PureView released last year would be the last phone equipped with Symbian OS in its Q4 financial report. This means that Symbian has been officially declared dead.Nokia said in the report: "In 2012, during the process of transition to Windows Phone, we continue to sell Symbian devices. The Nokia 808 PureView launched in the middle of last year is the last Symbian device."In Q4 2012, sales of Symbian phones were 2.2 million which was equivalent...
Nokia, Symbian, Windows Phone 2013-01-24 06:45:17
A strange behavior of printing struct with nested struct in GoLang
Normally when trying to print a struct , we would use %v to show all data of the struct. It will print the default format for each field in the struct. %v the value in a default format when printing structs, the plus flag (%+v) adds field names But recently we observed a strange behavior when printing a struct with nested struct which has a String() string implemented, the %v format prints an 'unexpected' output per our understanding. Let's see the example snippet first. pa...
PROGRAMMING,GOLANG 2018-10-29 09:59:49
Use Memory Analyzer Tool in Eclipse
When developing applications, we often encounter memory issues of an application. To analyze how much memory each class takes, we need to have some specific tools to assist us. One of them is Memory Analyzer Tool on Eclipse. The Eclipse Memory Analyzer is a fast and feature-rich Java heap analyzer that helps you find memory leaks and reduce memory consumption. To use the Memory Analyzer Tool, you first need to install it on Eclipse. You can go to Help -> Install New Software.... Paste h...
Memory analyzer tool, Eclipse,heap dump, HPROF 2014-10-28 07:22:35
WeChat has 100 million international users now
Just one month ago, Tencent announced that it had 70 million international users outside of China mainland. Today, they announced that WeChat hit 100 million international users. In just one month, the international users increase by 30 million. WeChat becomes one of the most tough competitors in the international IM market. Although there are still Whatsapp, Line and some other IMs, WeChat provides many different robust features, especially in the newly released WeChat 5. The new features in W...
WeChat,Tencent,Internationalization 2013-08-20 02:38:14
A simple example of drawing bar chart with label using d3.js
D3.js is a very popular graph library to help developers draw various kind of charts using JavaScript in a webpage. It utilizes the SVG format supported by all major modern browsers and can help developers get rid of the old age of Flash or server side graph drawing libraries. In this post, we will introduce some simple examples of drawing bar chart with labels using D3.js. First, let's see what will be the final look of the graph drawn. Below is the complete source code for this example....
Using JSON in PHP
Currently JSON has become one of the most popular data exchange formats. Many website APIs support it. Since PHP 5.2, PHP provides json_encode() and json_decode() method to handle JSON encoding and decoding.1. json_encode()This function is used to transform array and objects to JSON format. First let's look one array example. $arr = array ('a'=>1,'b'=>2,'c'=>3,'d'=>4,'e'=>5);   echo json_encode($arr);the result is{"a":1,"b"...
JSON,PHP,json_decode(0,json_encode() 2012-05-06 06:04:42
Mac evolution history
Apple's WWDC is coming in a few hours. All Apple fans are expecting that Apple will release some new amazing Apple products. This year, what are we expecting? The result will be revealed in just a few hours. Before that, we can look back about the history of some Apple products such as Mac. Below is the Mac evolution history summarized by iheartapple2.com. We can take a few minutes to go through it. Reference : http://iheartapple2.com/post/52498663368...
4 ways to obtain access token in OAuth 2.0
OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...
OAUTH2,ACCESS TOKEN,REFRESH TOKEN 2019-06-29 07:12:03
Female friendly programming languages
Women are minorities among programmers. It seems programming languages are created for males, either. They are full of maths and weird jargon. Are there programming languages which are female friendly? What kind of programming languages can be considered as female friendly? Gayle Laakmann McDowel shared her views on which are female friendly programming languages. Women are 87.3% more likely to prefer languages like Ruby and Perl, because they remind us of shiny objects. All women love shiny ob...
Programming,Female 2013-09-05 09:03:36
Use pdb to help understand python program
As I have mentioned in Why do I need a debugger?: (3) Debugger is a good tool to help you understand code. So when I come across difficulty to understand vfscount.py code in bcc project, I know it is time to resort to pdb, python's debugger, to help me. The thing which confuses me is here: counts = b.get_table("counts") for k, v in sorted(counts.items(), key=lambda counts: counts[1].value): print("%-16x %-26s %8d" % (k.ip, b.ksym(k.ip), v.val...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>