SEARCH KEYWORD -- image-set
Meta tag in HTML header
In server response, we can use response.setHeader() to set the meta information in header of a HTML page. The usage is response.setHeader(name,context); meta is used to simulate the response header of HTTP protocol in HTML page. It should be put between the <head> and </head> tag. 1. <meta name="Generator" content="" > <!--This is to specify the tool which generates this page such as Microsoft FrontPage 4.0 etc --> 2. <meta name="keywords" content=""> <!-- To tel...
Screen recording in Windows 10
Have you ever wondered how to take screen recording easily on Windows? Normally you would think to download some software online and install it on your machine such as Camtasia. However, many of them are either non-free or uneasy to use. Fortunately, there is a built-in tool provided in Windows 10 which can be used to take simple screen recording plus audio recording. The tool is called the Game Bar which is primarily intended for gamers to take screenshots of their plays and achievements. Don't...
WINDOWS 10,GAME BAR,SCREEN RECORDING 2018-03-06 11:42:07
2D Indoor CQB Robot Simulation
Program Design Purpose: The integration of robots in Close Quarters Battle (CQB) represents a significant advancement in modern military and law enforcement tactics. These robots, designed to navigate tight spaces, gather real-time intelligence, and engage threats, are invaluable assets in high-stakes scenarios. Our goal is to develop a 2D tactical board simulation system, similar to a computer game, that can load building floor blueprints, display CQB squad (robot) positions, enemy locations, ...
Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
Project Design Purpose : The primary goal of this article is to explore how to deploy DeepSeek-R1 an open-source large language model (LLM), and integrate it with a customized Retrieval-Augmented Generation (RAG) knowledge base on your local machine (PC/server). This setup enables the model to utilize domain-specific knowledge for expert-level responses while maintaining data privacy and customization flexibility. By doing so, users can enhance the model’s expertise in specific technical ...
LLM,RAG,DEPLOYMENT 2025-02-10 00:17:37
Essential Rules To Protect Your Credit Card When Shopping Online
You have to protect yourself and your credit card online while shopping. There are a number of ways to do this, but some prove more technical than others. Your basic best defense includes sensible use and layers of protection. The best way to do this is to pick and choose which stores at which you charge purchases. You can reduce the chance of losing your card details to a thief by declining to allow the retailer to store your credit card. Use a password manager to save your passwords and make a...
SECURITY,CREDIT CARD,MASTERCARD 2019-10-09 08:40:07
Time to think about supporting max/min functions for integers in GoLang
Sometime back we wrote a post explaining why there is no max/min function support for integers in GoLang, one of the reasons is that no overloading is supported and the function name has been used for other numeric types float64. To solve this problem and make max/min function support integer as well, either GoLang should support overloading like in Java or the same set of functions need to be created in a different package other than standard math. These don't look like good options as overload...
Want to make your Eclipse run faster? Try this
Lots of us may find that our Eclipse takes a long time to launch, remember how many times you want to close this heavy machine and shout "F**K". Do you know why Eclipse launches slowly? Is it because we have too many plugins installed or we have created too many projects? No, it's not. Sometimes, it's because we don't have the correct configuration. So where to start? Go to eclipse.ini. First, you may want to add below line in your eclipse.ini configuration file: -Xloggc:gc.log This is to show w...
Eclipse,optimization,speed 2014-06-10 05:31:11
Hide a file in a picture
Sometimes if you want to hide some important files on your computer which you don't want others to see, how would you do that? Find a professional tool? Set password for some folders? Change the file properties to hidden? They are possible, but they may not be so convenient or so secure. Here we share with you how to hide a file in a picture. Prerequisites 1 picture for example : test.jpg 1 test file, for example : test.txt WinRAR Steps Prepare the picture test.jpg and test file test.txt Use ...
Trick,Picture,Fil hiding,WinRAR 2012-09-13 19:36:36
Big Corporate Layoffs Hit Shenzhen IT Manufacturing Business
At 11:00 on March 29, 3 employees were ready to jump from Shenzhen Foxconn's longhua building G14. According to witnesses, those 3 employees were negotiating with company regarding the “Foxconn diversion plan”. Liu Kun, Foxconn public speaker, told reporters that many employees are working negatively to resist this plan, but Foxconn does not agree or support their actions in this way. " Company like Foxconn with large-scale labor-intensive manufacturing enterprises in Shenzhen, is f...
Can a === 1 && a === 2 && a === 3 be true in JavaScript?
Lots of you may be aware that there is famous interview question which asks whether a == 1 && a == 2 && a == 3 can be true in JavaScript. And the answer to this question is YES. The reason is that == will do a non-strict comparison which will evaluate a to a number and this provides the possibility of dynamically return the value when every time a is accessed. Have you ever wondered whether a === 1 && a === 2 && a === 3 can be true? At first glance, it seems this ...
JAVASCRIPT,===,STRICT COMPARISON 2018-04-06 12:17:29
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>