SEARCH KEYWORD -- character set
CASSANDRA data model
Cassandra is an open source distributed database, it combines dynamic key/value and column oriented feature of Bigtable. Features of Cassandra are: Flexible schema, no need to design schema first, it's very convenient to add or delete strings Support range search on keys High usability, extensible. The single node error will not affect the cluster. We can think Cassandra's data model as a 4 or 5 dimensional Hash. COLUMN Columns is the smallest data unit in Cassandra, it is a 3 dimensional data...
Traditional recursion vs Tail recursion
Recursion is a frequently adopted pattern for solving some sort of algorithm problems which need to divide and conquer a big issue and solve the smaller but the same issue first. For example, calculating fibonacci accumulating sum and calculating factorials. In these kinds of issues, recursion is more straightforward than their loop counterpart. Furthermore, recursion may need less code and looks more concise. For example, let's calculate sum of a set of numbers starting with 0 and st...
ALGORITHM,RECURSION,TAIL RECURSION,TRADITIONAL RECURSION 2016-09-23 23:54:09
Do designers need code?
So many problems in software occur because programmers and designers don't communicate well all the time. Why don't more designers learn to code themselves or have engineers build abstractions better suited to them? People's minds work in different ways, they can process thoughts differently, solve problems in completely different but equally valid ways. It's a mistake to assume everyone should possess the same skill set. Also not everyone should be a full stack engineer although full stac...
Guide to Implement an SSH Client Using Golang
SSH, short for Secure Shell, is a network protocol used for securely remote logging into other computers on a network. I believe most backend developers are familiar with SSH. Common shell tools used for logging into servers, such as Xshell, SecureCRT, and iTerm2, are all based on the SSH protocol. In Golang, the crypto/ssh package provides functionality for implementing an SSH client. In this article, we will explain in detail how to implement an SSH client using Golang. Creating SSH Client Con...
SSH CLIENT,GUIDE,SSH,GOLANG 2023-11-11 09:19:29
YouTube’s Policy Change: All Set to Take Down Hate Videos
Owing to a major policy change, YouTube is introducing new changes in the ways the videos are streamed on its channel. YouTube being the giant video sharing website is all set to work on a long list of policies regarding the content of videos on its channel. The shift in the policies has been introduced by the Google so that hate speech videos can be taken down by the channel. The most important concern behind the policy shift is to eliminate the videos that are influential in nature. The...
GOOGLE,YOUTUBE,YOUTUBE POLICY,GOOGLE POLICY,TECHNOLOGY 2017-12-27 07:56:02
QScrollArea Scrollbar Display Solution
Qt framework is a popular C++ GUI framework developed by Nokia. And it is also cross platform compatible. Many developers are using Qt to develop C++ GUI programs. In Qt, some important components are deserved our close attention. Many developers faced the problem when they put some widgets in a QScrollArea widget and they want it to display scroll bars when the widgets inside the QScrollArea overflows. After many experiments, I propose a way which can show scroll bars as you expected. The...
C++,Qt,GUI,QScrollBar,ScrollBar,Not display,Solution 2012-03-03 07:48:36
Why exception would be thrown when deleting element while looping through HashMap in Java
HashMap and other Collection types are frequently used in Java application programming. This post will explain why exception would be thrown when deleting element with Map.remove() while looping through a Map using Iterator. This issue would also occur to other Collection types such as Set, List. Below is a sample code snippet demonstrating the exception thrown. Map<String,String> map = Collections.synchronizedMap(new TreeMap<String,String>()); map.put("key1","value1"); map.put("ke...
JAVA,HASHMAP,CONCURRENTMODIFICATIONEXCEPTION 2018-06-30 12:49:09
What will the value of Integer.valueOf(127) == Integer.valueOf(127) be in Java?
Do you really understand how Java does the integer comparison? OK, ignore the statements in the post title. What we are interested in is another set of comparison statements. Let's first see below code snippet. public class IntegerComparison { public static void main(String[] args) { Integer a = 127, b = 127; Integer c = 128, d = 128; System.out.println(a == b); System.out.println(c == d); } } What do you think the output will be? Are they both displaying true? You will find out t...
It looks like TechCrunch blocks GoDaddy server access
Recently, I encountered an issue with an app I maintain—it suddenly stopped pulling RSS feeds from TechCrunch. At first, I suspected that the RSS feed URL might have changed. However, after further investigation, I discovered a different story. The URL itself was unchanged, but the results varied depending on where the request was coming from. To troubleshoot, I started by setting up a local web server and running a test with my script to see if it could still pull the RSS feed. The script...
TECH CRUNCH,GODADDY,AI,BLOCK ACCESS 2024-08-17 12:31:52
Mark Zuckerbeg's hacker way
According to TechCrunch, Facebook CEO Mark Zuckerberg wrote codes for the latest mobile IM application : Poke, the tone played when receiving push notifications is from the mouth of Zuckerberg. This approach reflects the way pursued by Zuckerberg : hacker way.As one of the earliest features of Facebook the "Poking" is invented by Zuckerberg, it is not surprising that Zuckerberg involves in Poke's development.Zuckerberg recorded his own voice on the phone initially just for fun. But he was later ...
Poke,Facebook,Snapchat, Mark Zuckerberg 2012-12-24 12:01:52
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>