SEARCH KEYWORD -- font icon
Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
Project Design Purpose : The primary goal of this article is to explore how to deploy DeepSeek-R1 an open-source large language model (LLM), and integrate it with a customized Retrieval-Augmented Generation (RAG) knowledge base on your local machine (PC/server). This setup enables the model to utilize domain-specific knowledge for expert-level responses while maintaining data privacy and customization flexibility. By doing so, users can enhance the model’s expertise in specific technical ...
LLM,RAG,DEPLOYMENT 2025-02-10 00:17:37
Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
We are excited to share that the Power Grid Simulation System we developed was used as part of one red team's targeted critical infrastructure system the international cyber exercise Crossed Swords 2024 which conducted in December 2024. In this article, we will introduce one power outage attack case study which use the Power Grid Simulation System as the demo platform for OT cyber security workshop. Project Design Purpose: This case study demonstrates using the Power Grid Simulation System as a...
OT Power Grid System Development
Use PLC to Remote Control Circuit Breaker in Power Grid System Figure-00: Project Overview Diagram, version v0.0.2 (2024) Project Design Purpose: The objective of this project is to demonstrate how to utilize Programmable Logic Controllers (PLC) to remotely monitor and control circuit breakers within a power (grid/supply) system. Using a Schneider Electric circuit breaker, sensor, closer and PLC, the project will cover the physical hardware connections and provide a step-by-step guide for desig...
SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
Program Design Purpose: The purpose of this program is to develop a Graph-Based SIEM (System Information and Event Management) dashboard that visualizes network communication patterns by processing and analyzing logs from IDS, firewalls, host computers, and other security devices. This dashboard will help security analysts quickly identify and investigate potential threats by using a Cytoscape-style Node-Edge graph for intuitive data representation. The program is an angular plug in which can i...
32-bit vs 64-bit
I have knowledge on 32-bit vs 64-bit, but not very clear minded. Here is a good article I found about it. http://www.techsupportalert.com/content/32-bit-and-64-bit-explained.htm Understand there are 3 things involved: CPU, OS and application. To work on 64-bit, first thing first is: you need a 64-bit CPU. 64-bit CPU usually provide emulation for 32-bit system. Though some 32-bit application still cannot run on 64-bit OS, because they might contain 16-bit code. 32-bit system won't have com...
Polymorphism in OOP Programming
Polymorphism is the capability of an action or method to do different things based on the object that it is acting upon. This is the third basic principle of object oriented programming. Overloading, overriding and dynamic method binding are three types of polymorphism. Overloaded methods are methods with the same name signature but either a different number of parameters or different types in the parameter list. For example 'spinning' a num...
JAVA,OOP,POLYMORPHISM,OVERLOADING,OVERRI 2014-10-23 08:11:50
Convert printed document into electronic document
é¦–å…ˆä½ å¾—å…ˆæŠŠè¿™äº›æ‰“å°ç¨¿æˆ–文件通过扫æ仪扫到电脑上去,一般å•ä½éƒ½æœ‰æ‰«æ仪,如果没有也没关系,用数ç 相机æ‹ä¹Ÿè¡Œï¼Œæ‹æˆå›¾ç‰‡æ”¾åˆ°WORD里é¢åŽ»ï¼Œä¸è¿‡åœ¨äº› 之å‰ï¼Œä½ 还得装...
Printed document,Electronic document,Con 2011-07-23 23:19:42
trim() in JavaScript
In the past, JavaScript didn't define the trim() function for String object. This makes web programmers frustrated since they often need to implement this function themselves if they want to handle user inputs. The new version of ECMA-262 introduces the trim() function.15.5.4.20 String.prototype.trim ( ) The following steps are taken: 1. Call CheckObjectCoercible passing the this value as its argument. 2. Let S...
JavaScript,trim(),implementation 2012-07-19 10:58:01
Difference between sans-serif and serif font
When we design website, we will often need to choose which font to use while displaying contents on the page. Basically what's the criteria for the choice? There are two big families of fonts : sans-serif and serif. We need to first understand what the difference is between these two. The word sans is from French, the meaning of it is without. So the difference between sans-serif and serif is serif font will have lines in all ends of the character while sans-serif fonts don't have. Some examples...
Sans-serif,Serif,French 2013-06-10 05:11:57
The world's first HTML5 SIP client
This is the world's first open source HTML5 SIP client (May 12, 2012) entirely written in javascript for integration in social networks (FaceBook, Twitter, Google+), online games, e-commerce sites... No extension, plugin or gateway is needed. The media stack rely on WebRTC. The client can be used to connect to any SIP or IMS network from your preferred browser to make and receive audio/video calls and instant messages. The protocol parsers (SIP, SDP...) are highly optimized using Ragel loo...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>