SEARCH KEYWORD -- character set
Privacy & Security What Is the Difference?
When we discuss the internet today, there are two terms that we frequently here: privacy and security. While you may think that these two terms mean the same thing and are thus interchangeable, this isn’t true. As such, you’ll want to take a moment to learn the difference between these two terms. Understanding the Difference Between Privacy and Security When you open a checking account you share your p...
SECURITY,PRIVACY,CYBERSECURITY 2018-12-27 00:29:57
Recent Online Scams You Need to Know About
It’s easy to forget that the internet is a dangerous place and that it’s easy to become a victim. Everyone wants to think that they’re too smart to fall for online scams or obvious fraud. Yet actions speak louder than words, and 97% of people still struggle to identify a phishing scam. Awareness is critical in beating the cybercriminals. So here are examples of the latest online scams and tips on how to avoid becoming a victim of similar attacks. What are Online Scams? Online s...
DATA SECURITY,VPN 2019-12-12 07:18:36
A mini post on GoLang context
In a GoLang web server, every request coming in will be handled by a goroutine. In the request handler, the logic may also need to create new goroutine to handle other tasks like RPC call. When the request is processed and response is returned, these goroutines created need to be exited so that no goroutine leak should happen. package main import ( "fmt" "log" "net/http" ) func main() { http.HandleFunc("/echo", func(w http.ResponseWriter, r *http.Request) { fmt.Println(&r) w.Write(...
Let's talk about JSON.stringify()
JSON has been used in lots of places to exchange data among different services/systems. Nowadays all mainstream programming languages have built-in library support of JSON data parse and stringify. In this post, let's talk about JSON.stringify() in JavaScript. Let's first take a small example of Object conversion handling. There is a requirement to convert below object const todayILearn = { _id: 1, content: '今天å¦ä¹ JSON.stringify(),我很开心ï¼', ...
JAVASCIPT,JSON,JSON.STRINGIFY 2020-02-22 04:25:08
Mobile devices are facing new threats
More and more companies allow employees to use smartphones and tablet PCs in workplace, but they are facing a new potential threat - malware embedded in games and applications.Dan Hoffman, network security company Juniper Networks mobile security director, said the application store is quickly becoming the main delivery mechanism of infected applications. Consumers purchase applications for their equipments through an online application store.As the consumers are free to download applicatio...
Mobile device,Data security,Malicious software 2012-04-05 13:00:57
A Sip of Go Log
Logging is indispensable in any code that we need its support both in debugging and in statistics. However, a package that filled withfmt.Println/fmt.Printf printing various messages can never be considered a read-to-be-adopted package, which can be optimized by a simple change, using Golang’s native log package to print information to standard output or to a file. Then, how to apply the log package? Are there any limitations? If so, can we seek open-source packages? Let&rsq...
5 Exemplary Material Design Frameworks That Are Worth Knowing
Google unveiled Material design last year, and it has inevitably created a great buzz among the designers' community, including both web and mobile designers across the globe. Today, you can observe many mobile and web applications are steadily deploying this design approach and overhauling their UI designs. Material design undoubtedly offers a refined and best approach to create a modern UI design. It embraces polished design principles that have been comprehensively described by Google in its ...
material design, mobile app 2015-06-18 04:35:20
Write Your Own R Packages
Introduction A set of user-defined functions (UDF) or utility functions are helpful to simplify our code and avoid repeating the same typing for daily analysis work. Previously, I saved all my R functions to a single R file. Whenever I want to use them, I can simply source the R file to import all functions. This is a simple but not perfect approach, especially when I want to check the documentation of certain functions. It was quite annoying that you can’t just type ?func&n...
DATA SCIENCE,R PROGRAMMING,DATA ENGINEERING 2019-10-19 07:20:52
How does computer boot up?
The whole boot process of computer can be summarized in 4 phases. 1. BIOS In the 70's read-only memory(ROM) was invented. The boot program is written into ROM, the first thing the computer does is to read and execute this program when it's powered on. The program in this chip is called "Basic Input/Output System" (BIOS). 1.1 Power-On Self-Test The BIOS will first check whether the computer hardware can fulfill the basic conditions for booting up, this process is called Power-On Self-Test...
Guide to Help Launch Your Startup Faster
You try, you fail you learn you succeed. It is not as easy as it seems to be because startup is not just an idea; it is a series of processes. Turning the idea into a profitable business and leading all the way through cannot be achieved overnight. An astounding 90% of startups fail to lift their business off the ground. While only a few manage to achieve success and survive for many years. The reason for failure is that most of the entrepreneurs do not know how to take business from start to e...
STARTUP SOLUTIONS,STARTUP DEVELOPMENT ,MVP DEVELOPMENT ,MVP SOLUTIONS 2017-09-14 04:40:43
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>