SEARCH KEYWORD -- UNDO CHANGE
Those famous Emacs users
I don't think using Emacs can improve one's programming skills, I don't think some famous people used Emacs before can provide something, either. But these famous people encouraged me to learn Emacs when I wanted to give it up. Here I created a list of famous Emacs users. Most of people in this list are not famous because they developed or used Emacs, but they are famous and also use Emacs. Joe Armstrong -- Erlang's author In The Setup, Joe mentioned that "I write books using XML markup in emacs...
Examples of bad design
Good designs always help users solve their problems in a convenient and familiar way. It takes little or no time for users getting used to the product with a good design. In contrast, bad designs frequently introduce confusion and complexity to users. Before we design any product, we should think carefully about every aspect of the product. We share some really bad design here to show how they can affect people's life. 1. USB Connector Have you ever put one in right on the first try? We frequen...
Bad design,Usability,Web design 2013-09-25 22:57:49
The hidden risk of passing slice as function parameter
In Go's source code or other open source libraries, there are lots of cases where a slice pointer is passed to function instead of slice itself. This brings up a doubt why not passing slice directly as its internal is backed by an array pointer to point to underlying data? For example, in log package, the formatHeader function takes a parameter buf as type *[]byte instead of []byte. func (l *Logger) formatHeader(buf *[]byte, t time.Time, file string, line int) {} Let's understand the r...
GOLANG,SLICE,SLICE POINTER 2020-12-13 06:11:14
One minute to understand earnings report of IT giants in last quarter
According to Sohu IT, if you want to know the operating status of a listed technology company, then the company's quarterly earnings report should not be missed. Now it's time for companies to release earnings report for last quarter, a few large IT giants in United States have announced the previous quarter's earnings. But many ordinary readers are not interested in those professional reports with a lot of finance jargon, so we extracted and summarized some important information from Yahoo, Goo...
Earnings report,IT giant 2013-04-27 10:05:38
Password-less login
Most websites need user login in order to provide personalized content to visitors. The usual way is to request user to register an user account. Actually, this is not so appealing since if we need to remember one password for each website, it's troublesome, while for developers, it's their responsibility to protect password, once password is leaked, then it's a big headache to a website's business and reputation. So long time ago people started thinking about password-less login, this is a big ...
Password-lesslogin,Authentication 2012-11-05 12:29:55
How to commit code to OpenStack
If you want to make contributions to OpenStack, the best way to start is to help the community with blueprint or submit bug fix. To commit codes, you need to conform to some rules in the community. Work flow Register an OpenID Apply for a CLA certificate Apply for company CLA certificate Update contributor list Join OpenStack Contributors group and OpenStack group Set up SSH Keys Get a blueprint/bug git clone codes to local disk. Configure user name and user email and openid Modify codes in a l...
OpenStack,Contribution 2013-08-04 23:04:45
A mini guide to HTTP referer
In HTTP header, there is a field named Referer which is to provide the referrer of the current accessed page. In this post, we will introduce the usage of HTTP referer field. On the web, when a user visits a webpage, s/he must be from some place. This place is usually referred a s referer. This information is very important to some website operators and server owners as they want to know where they get the traffic from and this helps them provide better service for potential targeted users. In t...
HTML,HTTP REFERER,REFERRERPOLICY 2019-06-29 02:23:25
9 Outstanding Ways Artificial Intelligence Can Transform Retail
Artificial intelligence has been around for quite some time. However, Amazon was the first company to apply it in the retail industry. Now, it automates most processes on the platform, replaces the people's’ work, and increases the productivity in every possible field. Here are nine useful ideas for you to start using AI in retail. 1. Tracking the Overstock and Out-of-Stock Items It is necessary to know exactly how many items are left in stock (or whether there are any left at all). Selle...
BUSINESS,ARTIFICIAL INTELLIGENCE 2019-01-22 08:41:02
The danger of target=_blank and opener
When want to open a new page in a new tab on clicking a link on a page, the usual way of achieving this is to use target="_blank" property in a tag. However, the use of this leaves space for phishing website. Background parent and opener Before talking about the opener object, let's know a bit about parent object when using iframe. HTML provides a parent object which is used to communicate between the parent page and the embedded iframe element. This parent object can be accessed using...
HTML,TARGET BLANK,REL NOOPENER,REL NOREFERRER 2018-09-15 04:53:56
Consistency between Redis Cache and SQL Database
Nowadays, Redis has become one of the most popular cache solution in the Internet industry. Although relational database systems (SQL) bring many awesome properties such as ACID, the performance of the database would degrade under high load in order to maintain these properties. In order to fix this problem, many companies & websites have decided to add a cache layer between the application layer (i.e., the backend code which handles the business logic) and the storage layer (i.e., the SQL d...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>