SEARCH KEYWORD -- Work from home
How to harness company’s resource?
As an employee, it is no doubt that we should spare no effort to contribute to your employer since it pays us salary. But at the same time, we should also consider how to utilise the company's resource to enrich ourselves. After all, only if we become more competent and brilliant, the company can benefit more from us, and this will be a definitely win-win situation. In this post, I will illuminate how to take advantage of company's "hardware" and "software" resource. (1) “Ha...
combining dwarf failed: unknown load command 0x80000034 solution in GoLang
In case there is below error encountered while running some go program: combining dwarf failed: unknown load command 0x80000034 This may be due to that you are running go 1.16 on a Mac M! machine. If you go to check go version, it may tell you that you are running an arm version of go. go version go1.16.10 darwin/arm64 In such cases, you can try below methods to workaround the issue. Try to upgrade the go version to 1.17 and run the code again. If this is not an option for you because you have t...
GO 1.16,0X80000034 2021-11-25 07:11:28
SD Cards: Why Order Them In A Bulk?
Backing up important data is an undeniable aspect of the technologically advanced modern world. Be it photographs, videos, movies or other significant data, they all need to be stored properly for future use. SD card or Secure Digital card is one such device that will help store all the relevant materials securely. As the name suggests, it secures all digital data. To understand why we should order bulk SD cards, we need to know why they are so beneficial. They are extremely compact,...
What has Google done on improving programming languages
Google is now becoming the most innovative IT company in the world. Every now and then they would deliver one revolutionary product to us such as Google Glass, Google Fiber, Automatic Mobile Cars etc. All these great products are backed up by the powerful software system built into. Google has used many programming languages to develop these software and they have put much resource in improving the programming languages they use and we use today. What has Google done in improving programming lan...
Google,Programming 2014-02-21 09:36:34
5 Mistakes Developers Should Avoid before Launching Their API
Time is money in the API industry, and everyone wants to be timely for the API’s milestone event: its eventual launch. Delays in this event can be very costly, so the sooner the API can be integrated, the better. Many developers start their work knowing quite well that the clock is ticking. But prioritizing a quick launch—at the cost of everything else—can do a lot of damage in the long run. A rushed launch may result in unstable integration, a host of errors and bugs, lower en...
TIPS,API DESIGN 2020-05-18 07:08:22
People Detection Radar [IoT] : Build a Raspberry PI Xandar Kardian IoT People Count Radar
Program Design Purpose: People detection sensors and radars are utilized in various applications across multiple fields such as security and surveillance, healthcare, building automation, smart cities, transportation and autonomous manufacturing systems. This project aims to develop a prototype IoT device for an indoor people counting using the Xandar Kardian people detection radar and a Raspberry Pi. The device will be network-ready and easily integrated with other systems. The Python-based I...
System programming is still there
System programming is the practice of writing system software. System software lives at a low level, interfacing directly with the kernel and core system libraries. Your shell and your text editor, your compiler and your debugger, your core utilities and system daemons are all system software. But so are the network server, the web server, and the database. These components are entirely system software, primarily if not exclusively interfacing with the kernel and the C library. But nowadays more...
System programming 2014-02-27 05:46:48
5 Pro Tips Social Media Managers Swear By
Digital marketing is ruling the world, and rightly so. It's cost-effective, it increases business growth and helps in building a brand reputation. But to get successful results, it is important to target the right audience. This is where a social media manager’s experience helps. Social media managers create and manage a brand’s promotion strategy by monitoring the activity of their core audience. They are responsible for handling social media accounts and running marketing campaigns...
SOCIAL MEDIA 2021-05-02 06:51:18
do {...} while (0) in macros
If you are a C programmer, you must be familiar with macros. They are powerful and can help you ease your work if used correctly. However, if you don't define macros carefully, they may bite you and drive you crazy. In many C programs, you may see a special macro definition which may seem not so straightforward. Here is one example: #define __set_task_state(tsk, state_value) \ do { (tsk)->state = (state_value); } while (0) There are many this kind of macros which uses do{...}while(0)...
bcrypt: Safeguarding Passwords with Strong Hashing and Adaptive Security
Introduction In today's digital world, passwords play a crucial role in protecting personal privacy and information security. Passwords are the most commonly used means of authentication because they are simple yet effective. Password security is the cornerstone of cybersecurity and plays a fundamental role in safeguarding the information security of individuals and organizations. However, with the increasing frequency and complexity of cyberattacks, traditional password hashing algorithms like ...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>