SEARCH KEYWORD -- Unknown width
20 bit operations programmers should know
While talking about bit operation, programmers usually think about its efficiency. In embedded programming and system core optimization, appropriate use of bit operations is always a fascinating. When finding a job, it will help you a lot if you use bit operations when writing codes. Mastering simple bit arithmetic skills is necessary. 1. Get maximum int value int getMaxInt(){ return (1 << 31) - 1;//...
Bit operation, Tips 2012-12-19 12:53:33
Install Google services on Huawei MatePad
Since the trade war between China and US, lots of services are not allowed to be used on Huawei devices as a series of procedures enforced by US government to restrict China. These services include the Google Play services which are used for downloading Android apps on Android devices. This has brought big trouble to Huawei users as they are not able to download apps available for all other Android devices. Fortunately, there are ways for people to get Google services installed on Huawei d...
GOOGLE,PLAY STORE ,HUAWEI MATEPAD 2020-02-02 05:20:43
Google Allo - Changing the way people chat
Google released a new smart messaging application a couple of weeks ago -- Google Allo. At first glance, it has no much difference than other mature messaging applications on the market such as What's App, Line, WeChat. It has a concise and easy to use user interface and comes with stickers, doodles, and HUGE emojis & text. But do we really need a new messaging application which is similar to others in most aspects? The answer is MAYBE. From its description, it claims it's a SMAR...
GOOGLE,AI,GOOGLE ALLO,GOOGLE ASSISTANT 2016-10-03 09:44:51
One Way to Quickly Locate SQL with High CPU Usage in MySQL
When the CPU usage of a MySQL database rises abnormally, it's necessary to quickly identify the problematic SQL statements. In this post, we try to provide one way to achieve this. Below are the actual steps. 1. Use the top command to find the threads with the highest CPU usage in the MySQL process. # Find the MySQL process ID ps -ef | grep mysql # Use the process ID to find the thread IDs with the highest CPU usage: top -H -p In top, press P to sort by CPU usage. Note the thread ID, fo...
MYSQL,DEBUG,HIGH CPU,SLOW QUERY 2024-08-01 21:25:48
Lots of Chinese users experienced Samsung phone crashes
Starting from 23 May morning(Beijing time), lots of Samsung phone users in China suddenly experienced system crashes and couldn't use the phone anymore. The symptoms the users saw were that the phone started to restart infinitely and the screen turned into dark screen and nothing can be done to get it recovered. Based on the reports, the impacted models include Samsung Galaxy S8, S9, S10 and S20 series, Other models don't receive many reports yet. After receiving the reports,...
SAMSUNG,SAMSUNG GALAXY,SYSTEM CRASH,AUTO UPDATE,NEWS 2020-05-23 05:23:55
Interesting Hello World
Hello world is the beginning of everything. When you first learn a new programming language, the first program you write is to print the "Hello world" string on the console with that language. For example: So who invented "Hello world"? It's Brian Kernighan, a canadian computer scientist and author of The C Programming Language and The Unix Programming Environment. In his books, he used to write "Hello world" which changed the whole world. Also programmers like to use foo and bar as variable n...
Programming,History 2013-08-29 11:31:00
Applying Large Language Models (LLMs) to Solve Cybersecurity Questions
In this document, we will introduce some test, experiment and analysis conclusion about applying Large Language Models (LLMs) to solve cybersecurity questions. Introduction Large Language Models (LLMs) are increasingly used in education and research for tasks such as analyzing program code error logs, help summarize papers and improving reports. In this project, we aim to evaluate the effectiveness of LLMs in solving cybersecurity-related questions, such as Capture The Flag (CTF) challenges, ...
CSS Overflow Property Utilization
Sometimes when we do CSS on HTML elements. We may want to hide some text when the text in a specified box overflows. Usually, we can use a CSS property overflow:hidden to hide the text so that the format of the whole element will not be affected. But will it always work? I believe some of us may encounter problems when we want to hide some text in a table td cell with specified width. If we use td { overflow:hidden;}, it is supposed to hide the text if the text in a td cell overflows. But the fa...
Fix issue "cannot load such file -- bcrypt_ext (LoadError)"
bcrypt() is a sophisticated and secure hash algorithm designed by The OpenBSD project for hashing passwords. The bcrypt Ruby gem provides a simple wrapper for safely handling passwords. However, sometimes the rails application would fail to start after installing the bcrypt gem on Windows. The error would look similar to below. The issue is that it fails to load the bcrypt_ext which is the native built extension, the reason may be the library is wrongly built. To fix this issue, below steps can...
RUBY,SOLUTION,RUBY ON RAILS,BCRYPT,LOAD ERROR 2017-03-05 00:21:10
Jack Ma's interviews during Alibaba's IPO at NYSE
Alibaba has been listed on NYSE on 19 September. It becomes the largest IPO ever in the history of US stock exchange, larger than Facebook then the largest one. And after the trading closed on Friday, its share price closed at $93.89 per share, this makes it the second largest Internet company in the world following Google. Jack Ma, the founder of Alibaba, also becomes the richest person in China with a total wealth of $18.1 billion. He accepted interviews from different media during the IPO. Le...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>