SEARCH KEYWORD -- TOP SOFTWARE COMPANIES
The internals of slice in GoLang
There are 3 components of slice:a) Pointer: Points to the start position of slice in the underlying array;b) length (type is int): the number of the valid elements of the slice;b) capacity (type is int): the total number of slots of the slice. Check the following code: package main import ( "fmt" "unsafe" ) func main() { var s1 []int fmt.Println(unsafe.Sizeof(s1)) } The result is 24 on my 64-bit system (The pointer and int both occupy 8 bytes). In the next example, I will use gdb to poke t...
Bug caused by using changeable value as the default in "python method overload"​
In python we can set the passed in parameter's default value to make the function has the same running feature as the method overload in Java. Define a function like this: def testFunction(self, param1, param2=None, param3=None): Normally we use "None" as the parameter's default value. We can also use str/bool as the default value, but is it OK we use empty list [] as its default value? This is our test program: """ A test program using empty list as the passed-in parameter's default value. ...
PYTHON 2019-03-11 08:52:52
git reset vs git revert
When maintaining code using version control systems such as git, it is unavoidable that we need to rollback some wrong commits either due to bugs or temp code revert. In this case, rookie developers would be very nervous because they may get lost on what they should do to rollback their changes without affecting others, but to veteran developers, this is their routine work and they can show you different ways of doing that. In this post, we will introduce two major ones used frequently by develo...
GIT,GIT RESET,GIT REVERT 2019-02-02 08:26:39
Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
Project Design Purpose : The primary goal of this article is to explore how to deploy DeepSeek-R1 an open-source large language model (LLM), and integrate it with a customized Retrieval-Augmented Generation (RAG) knowledge base on your local machine (PC/server). This setup enables the model to utilize domain-specific knowledge for expert-level responses while maintaining data privacy and customization flexibility. By doing so, users can enhance the model’s expertise in specific technical ...
LLM,RAG,DEPLOYMENT 2025-02-10 00:17:37
Only 4G can resolve the conflicts between China Telecom Carriers and WeChat ?
Why WeChat has made the three big Chinese telecom companies uncomfortable? Let's analyze from both technical and commercial levels. From a technical point of view, Mr. Huang, Dean of China Mobile Research Institute, described the impact of "always online service" applications like WeChat. Instead of using technical terms, we will explain in simple vivid phrases. First, mobile QQ, or WeChat, will have their own "request frequency". These requests are sent to the carrier network, to check the re...
Stub Mixlib::ShellOut and shell_out in Ruby unit testing
Unit testing is part of software development to ensure the tiny component of a function can work as designed. Different frameworks and tools can be used to run unit testing for different programming languages. In Ruby, one popular unit testing framework is Rspec, or Chefspec if you are writing Chef recipes. While writing Chef recipes, some low level commands(DOS commands or shell commands) need to be executed on the managed resource to perform actions or gather information. For example, lis...
RUBY,UNIT TESTING,RSPEC,CHEFSPEC,SHELL_OUT 2016-11-11 00:14:46
Google CEO : Facebook holds its users hostage
Google CEO Larry Page claimed in a media interview recently that it’s unfortunate that Facebook has been pretty closed with their data while Google is in the business of searching dataPage has been attacking Facebook ban on the search engine to search its data. In fact, the battle between the two sides has been going on for several years, and in June 2011 Google launched its social networking service Google+ which somehow further exacerbated the tension. On Monday, Page, in an interview...
Google,Facebook,Hostage,Larry Page 2012-05-23 05:58:07
Benefits and Drawback of a Layered Architecture
Most enterprises today are application centric. But the problem with the application is that their database schemas, user interfaces, programming interfaces and object models are tightly coupled and difficult to change. If you want to add a new field to a database table and you’re lucky, the change will reflect through the entire system. But often the change needs to be replicated manually across the entire system. And as applications are difficult to change, adding business rules or proce...
JAVA, PROGRAMMING,WEB DEVELOPMENT,ENTERPRISE APPLICATION 2017-05-04 08:19:34
“Experience says it allâ€- Pentaho ETL Developers’ Comment on the Use of ETL Tools
Since months Pentaho ETL developers have been juggling with three distinct tools- Pentaho DI, SSIS, and PowerShell. Their experience has provided them new perspective on the cons and pros of every tool. In this post, they are sharing their experience with these tools and explain their significance. Before getting started, they first would like to explain ETL in brief and how the tools suits ETL landscape. ETL is Extract Transform Load. Informatica was the initial ETL tool introduced in the mid n...
Pentaho BI ETL tools 2015-05-13 01:14:57
TIOBE : Where is that next big programming language?
TIOBE has released the Programming Community Index for May 2012 a bit late. The top 3 languages do not change compared to last Month TIOBE : C overtakes Java as the No.1 programming language, they are still C,Java and C++. However, the share of Java is continuing dropping, Objective-C is steadily rising Other languages which have rising trend are Visual Basic.NET,PL/SQL and Logo.The last 8 years not much has changed in the top 10 of the TIOBE index except for Objective-C (in) and Del...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>