SEARCH KEYWORD -- Work place
Techies: Let's Not Forget Brain Hacking
Credit: SergeyNivens via Canva The world of cyber security never fails to surprise us with bolder and more sophisticated cyber-attacks and...
HACKING 2022-02-03 21:43:11
Tricks with Direct Memory Access in Java
Java was initially designed as a safe managed environment. Nevertheless, Java HotSpot VM contains a “backdoor†that provides a number of low-level operations to manipulate memory and threads directly. This backdoor – sun.misc.Unsafe – is widely used by JDK itself in packages like java.nio or java.util.concurrent. It is hard to imagine a Java developer that uses this backdoor in any regular development because this API is extremely dangerous...
Java,Directly memory access,Tricks,JVM 2012-02-13 05:31:19
Why Android Will Always Be Laggier Than iOS
One of the things that really stands out using an iPhone is just how smooth it feels compared to using Android. Where as Android is laggy, with a measurable interim between when you touch the screen and when the OS responds, iOS almost seems to anticipate what you want to do before your finger touches the display.How has Apple managed this incredible feat? A better question might be: “How has Google managed to screw up Android’s multitouch so much?†According to Andrew M...
C++ Versus Objective-C
What will programming in Objective-C mean to the C++ programmer Different Object Oriented Languages Almost all of us have heard the term object oriented programming, and most of us have used C++. How will Apple's purchase of NeXT, and NeXT's framework using Objective-C affect us as we develop software? If we know C++ already, how hard will it be to get up to speed on Objective-C? Many people will agree that once they understand the concepts of object oriented programming it doesn't matter...
C++,Objective-C,OOP,Comparison,Methods,Philosohpy 2011-12-12 07:51:40
Set file permission in Java
Prior to Java 6, there is no good solution at the Java level to provide file permission management. You need to implement your own native methods or call the Runtime.exec() to invoke the system routine such as chmod in LInux. Since Java 6, Java introduces a set of methods which can be used to set the file permission at Java level. These methods include: File.setReadable(boolean); File.setWritable(boolean); FIle.setExecutable(boolean); File.setReadable(boolean, boolean); File.setWritable(bo...
JAVA, FILE PERMISSION, POSIX,learnjava 2015-08-29 03:37:37
How to commit code to OpenStack
If you want to make contributions to OpenStack, the best way to start is to help the community with blueprint or submit bug fix. To commit codes, you need to conform to some rules in the community. Work flow Register an OpenID Apply for a CLA certificate Apply for company CLA certificate Update contributor list Join OpenStack Contributors group and OpenStack group Set up SSH Keys Get a blueprint/bug git clone codes to local disk. Configure user name and user email and openid Modify codes in a l...
OpenStack,Contribution 2013-08-04 23:04:45
The Book That Every Programmer Should Read
No, it’s not Knuth’s “The Art of Programmingâ€. I’m talking about quite an easy-to-read (compared to TAoP) book, which, in fact, does not require any engineering or mathematical background from the reader.I am talking about C. Petzold’s “CODEâ€. It is a truly remarkable book about how computers work. Let me explain why I think this book is so awesome.The book starts from the very beginning, from explaining what code is, bringi...
Programmer,Book,Must read,CODE,C. Petzold 2011-10-31 10:43:58
Some tips for writing proper emails
Email is now becoming one necessity of working. We may receive hundreds of emails everyday, they may from our colleagues, friends or clients. We need to exchange ideas, arrange meetings , asking for help etc though email in our work. A proper email can help us achieve what we want to achieve. Here we share some tips for writing a proper email.At the beginning of an email : Thank the reader is a good way to start the email, thank the reader may make the reader feel happy, especially when you ask ...
What are some popular myths in software development?
This article is summarized from a question on Quora .The question is What are some popular myths in software development?Here is the answer which received most votes given by a guy named Lee Semel,. Some of the most prevalent myths are:The Waterfall Method of design, the idea that it is both possible, efficient and good practice to completely specify a system before building it, and to execute the steps of a software project sequentially rather than iter...
Software design,Myths,Waterfall model 2012-05-02 04:52:01
Learning to Eat Well and Stay Healthy
Back in mid-2006, I documented my fairly dramatic weight loss in a series of blog postings. I went from a high of 224 pounds to a low of 164, which made for a total loss of 60 pounds (I’m about 6 feet tall). It’s interesting to go back and re-read what I wrote back then: Diet Tips or How To Lose Weight with a Spreadsheet and a Web SiteThe Diet Plan and The Three HabitsThe Diet SpreadsheetDiet Tips: How To Eat Less Fast forward to January of 2011, and I had gained back about h...
RECENT
- Fix Surface Keyboard not Working Issue
- Python Process Protection Watchdog
- The Strange Behavior of the void Type in TypeScript
- MySQL Index Merge Optimization Practices
- Applying Large Language Models (LLMs) to Solve Cybersecurity Questions
- Everyone Can Write Tech Blogs
- Python SSH Connection Tools
- Revolutionize Your Event Planning with Interactive Presentation Templates
- New Unreal Engine 5 and Nvidia Technology in Black Myth: Wukong
- 10-32 rack screws
- more>>