SEARCH KEYWORD -- character set
Learn how to tell a story before building your own start-ups
Imagine one day you become a successful start-up founder like Mark Zuckerberg, then somebody will come and find you and want to shoot a movie for you with your start-up story. If you are not successful yet, then this story should be written by yourself. For start-up founders, learn how to tell a story will not only promote yourself among investors, users and medias but also can create a macro development plan for your start-ups by explaining various unexpected things will happen. Pixar storyboa...
Processing Unicode Data in Python - A Primer to Understand Non-English Data Processing
Introduction: Currently we live in a world where people of diverse cultures/backgrounds use electronic devices to express their ideas, do their daily work that earns them their daily bread, and entertain themselves using content that is created using their own language and so on. Naturally, in order to make all these things happen, any computational instrument, be it a laptop or a desktop computer, or a smartphone, or something else, should be capable enough to serve all of these things in a man...
PYTHON,UNICODE,UTF-8,NON-ENGLISH DATA,ASCII CODE 2019-04-10 00:55:19
String.length() vs String.getBytes().length in Java
In Java, String.length() is to return the number of characters in the string, while String.getBytes().length is to return the number of bytes to represent the string with the specified encoding. By default, the encoding will be the value of system property file.encoding, the encoding name can be set manually as well by calling System.setProperty("file.encoding", "XXX"). For example, UTF-8, Cp1252. In many cases, String.length() will return the same value as String.getBytes().length, but in some ...
Permutation implementation in Java
Permutation is a very basic and important mathematic concept we learned in school. It has very practical applications in real world. For example, in football. In simple, permutation describes all possible ways of doing something. For example, there are six permutations of the set {1,2,3}, namely: (1,2,3), (1,3,2), (2,1,3), (2,3,1), (3,1,2), and (3,2,1). In general, for n items, there are n! number of permutations to arrange these items. How can we implement this algorithm in programming programm...
Permutation,Implementation,Java,Sample 2015-03-26 02:18:14
A simple example on implementing progress bar in GoLang
Sometimes when handling a long running process, there would be need to track the progress so that people know something is still running instead of doubting something goes wrong. In this case, a progress bar which indicates the current status and progress would be desired. This post will show an example on how to implement progress bar using GoLang. Let's take a look at the final outcome first before jumping into the implementation detail. The key in the implementation is actually just the \r ...
TUTORIAL,EXAMPLE,GOLANG,PROGRESS BAR 2020-08-08 23:53:15
How to use xargs command in Linux
What is the xargs command? The xargs command constructs and executes commands provided through standard input. It takes input and converts it into command arguments for another command. This functionality is particularly useful in file management and can be combined with commands like rm, cp, mkdir, and others. Using the xargs command When used alone, the xargs command prompts the user to enter a text string and then passes it to the echo command. This example demonstrates the input provided an...
Data as code
What is a good command line parser API? A good command line parser should consider below 5 aspects: Support convenient help information generation Support sub commands, for example, git has push,pull,commit sub commands. Support single character option, word option, flag option and option with parameter. Support default option, for example, if no -port is set, set it as 5037 Support usage model, for example, tar's -c and -x is mutually exclusive, they belong to different usage models. Here are...
Command line,API 2013-08-08 22:40:36
Cool HTML5 matrix effect
Do you still remember the movie The Matrix? Do you still remember the cool matrix effect in that movie? How is that effect achieved? Shaun Dunne shared a piece of HTML5 code which displays a cool matrix effect. The matrix demo can be found here. Below is the code which he achieves this effect: with var s = window.screen; var width = q.width = s.width; var height = q.height = s.height; var letters = Array(256).join(1).split(''); var draw = function () { q.getContext('2d').fillStyle='rgba(0,0,...
25 worst passwords in 2012
Weak password is a serious security vulnerability, but the majority of network users still use some universal simple character sequences as the password. SplashData recently announced the world's worst password list in 2012. "password","123456" and "12345678" are still at top places, while others have varying, some new passwords like "welcome" "Jesus" "ninja","mustang"and "password1 "are in the list. With the risk of password loss, SplashData CEO Morgan Slain said we hoped netw...
Welcome the new Google logo
Google today changed their logo, the new logo adopts the flat design with a lighter color scheme. Apart from these, there are no major changes on the font style, character color etc. Old logo New logo Along with the new logo, Google also released a new navigation menu that sits next to the Share and account info. The launcher, which looks just like the app launcher on Chrome OS, brings up an App grid with your favorite Google services. Actually, Google wanted to replace the top black navigati...
Google logo,Chrome OS,App menu 2013-09-19 23:06:36
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>