SEARCH KEYWORD -- VERTICAL ALIGN
Memory related exception analysis in Java
Java Virtual Machine Specification divides the memory of JVM into several areas : Heap, Stack, The Program Counter register and Method area etc. In HotSpot JVM, heap is composed of Young, Tenured and Perm. There are different OutOfMemory error can happen in different memory area. Next is an overview of some of these OOM errors. StackOverflowError The JVM will allow only a specified number of stacks created nested. An JVM option -Xss can be set to determine the maximum stack size. If the num...
Java, Memory model, Memory exception, OOM 2015-01-19 06:54:27
The Greatest Regex Trick Ever (Simplified)
There is a post which is really hot recently which showcased a best ever regular expression trick. In this post, it provides a trick which can be adapted to situations where one wants to match some patterns desired and exclude the patterns undesired. In simple, the trick is : Pattern not desired | (Pattern desired) Then taking the group 1 match of the capturing group of matched. This group will contain the strings matching the desired patterns. Have to say this trick is really neat and brilliant...
REGULAR EXPRESSION,PROGRAMMING,JAVA 2015-10-01 21:59:05
What can we do about Facebook?
Around 4 years ago, we have posted an article Is Facebook becoming Tencent like? to analyze the strategy Facebook adopted to build its technology empire at that time. Today, we would continue this discussion since the story seems not end there. Facebook is still on the way of copying others. The latest victim being copied is Snapchat where lots of its new features have been copied by Instagram -- an app owned by Facebook. This has helped Instagram acquired lots of active users, especi...
Microsoft is going to redesign Bing again
On 10 May,2012, Microsoft announces in San Francisco they will redesign its search engine Bing, and it will cooperate with Facebook, Twitter etc to build a new search service.Bing now is the second largest search engine in the world, but compared to Google, Bing is always the second city of search. Bing these years has always been putting effort on improving its service and the accuracy of search results. Unfortunately, it still cannot gain market share from Google. Today, Microsoft is goi...
Bing,Social network,Integration,Sidebar 2012-05-11 05:26:11
JavaScript cross domain request solution
1. What is cross domain? We may often using AJAX to request data from other domain, now we will have cross domain request issues. It's because JavaScript only allows to request data from the same domain because of security consideration. In short, same domain strategy means a piece of code can read data from the same source, the same source here means the combination of the same domain, protocol and port number. For example: URLDescriptionAllow communication? http://www.a.com/a.js http:/...
AJAX,cross domain,security 2013-03-13 20:04:52
North Korea Government website costs only $15
Wired reports that the North Korean government is not occlusion as people imagine. Recently, some users found that the North Korean government has an official website in English, URL is www.korea-dpr.com. The Korean government hopes to launch an official website to carry forward its "ideology".The site design looks very good and fully functional. It has big improvment relative to their news release website Korea News.The report also pointed out that the official website was developed by the Nor...
Nprth Koreea,Website,Price 2012-04-20 01:43:34
Do Not Be Misled by ‘Build an App in 5 Minutes’: In-Depth Practice with Cursor
In August this year, I tried out Cursor and was thoroughly impressed, prompting me to write an introductory article about it. Soon after, I transitioned my daily work environment entirely from GitHub Copilot + JetBrains to the paid version of Cursor. After several months of use, it has felt incredibly smooth. While using it myself, I’ve often recommended Cursor to colleagues and friends. However, many of them still have questions, such as: What advantages does it have over native ChatGPT ...
ARTIFICIAL INTELLIGENCE,GUIDE,CURSOR,CODE EDITING,WINDSURF,DISCUSSION 2024-12-17 21:30:22
How to find which process a file is being written by in Linux?
Some people ask a file is being written by one process and they want to check this process, but they cannot find the process even with sof. This question is very common and there are many solutions, here we introduce a straightforward method. In Linux, each file will be stored on one device and of course there will be a relative inode, then we can use vfs.write to know who is writing the inode on one specified device continuously. Luckily there is inodewatch.stp in the installation package of s...
Linux,process,file write 2013-03-16 21:44:35
NIO vs IO in Java
Java 1.4 provides a new API for handling IO -- NIO. This is a non-blocking and buffer oriented IO API. Below are main differences between the NIO and IO in Java. IO NIO Stream oriented Buffer oriented Blocking IO Non-blocking IO N/A Using selector Stream oriented vs Buffer oriented The main difference is that IO is stream oriented where the data is read byte by byte and the data will not be buffered normally.This means there is no pointer to move forward and backward in the stream. I...
How small should a function be?
"The well-designed functions are often relatively small, large function design is often a mess or there is a lot of room for optimization."Maybe you think there is no need to discuss the size of functions, because the nature of the function design is cohesive, its size is only its manifestations. But it is necessary to discuss about the size of function because the statement above .First let's understand the concept of minimum code processing unit : a basic operation (assignment, comparison, etc...
Function size,Optimization 2012-12-18 13:58:07
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>