SEARCH KEYWORD -- meta description
In iOS6, no need to enter password for downloading free apps
In this coming autumn, Apple will release iOS6. User experience for downloading free apps or upgrading apps will be largely improved. Users are no longer required to enter password again when downloading free apps or upgrading downloaded apps(free or paid). This means that users only need to enter password when downloading paid apps.In iOS5, users need to enter password when they download or upgrade apps.In iOS6, if users want to download free apps, they only need to click the "Free" butto...
Will Microsoft use Windows 8 to replace Metro?
Since there is some dispute with a German company Metro AG on the word "Metro", it is said that Microsoft will abandon "Metro" in Windows 8. Then what will be the replacement of "Metro"? According to Zdnet, the answer may be Windows 8. Microsoft reminds Windows developers not to use "Metro" when they mention interface of Windows Phone or Windows 8 in their apps and recommends that the developers use New User Interface when they describe Windows 8 style interface design. Microsoft officially anno...
Build RPM package on Linux
1. Check the OS version and core version #uname -a #more /etc/redhat-release 2. Create relative directories /usr/src/redhat/SOURCES //Store source codes, patches, icons etc /usr/src/redhat/SPECS //Store specs about the process of building RPM packages /usr/src/redhat/BUILD //File after uncompressed are stored here /usr/src/redhat/RPMS //Store the binary files built with rpmbuild /usr/src/redhat/SRPMS&nbs...
First page of 2012
The tail of 2011 has gone through my heart silently, Year of 2012 is coming with mystery. Looking back to 2011 and looking forward to 2012, it's time to record something...In the past 2011, nothing specials happened in my life. At the beginning of 2011, I was a college student with full of passion, while at the end of 2011, I am an engineer with 5 month's working experience. At the beginning of 2011, I was struggling through my Final Year Project and job hunting, while at the end of 2011, I am p...
A serious security vulnerability found in MySQL/MariaDB
Recently a serious security vulnerability was found in MySQL/MariaDB. It relates to the access to the database. The issue is described below.When a user connects to MariaDB/MySQL, a token (SHA over a password and a random scramble string) is calculated and compared with the expected value. Because of incorrect casting, it might've happened that the token and the expected value were considered equal, even if the memcmp() returned a non-zero value. In this case MySQL/MariaDB would think that the p...
The difference between System.load and System.loadLibrary in Java
When writing code using native library in Java, normally the first step is loading some native library. static{   System.load("D:" + File.separator + "Hello.dll"); } JDK provides two ways to load libraries: System.load(String filename) System.loadLibrary(String libname) This post will try to explain the differences of these two ways. According to Java Doc on System.load(), it has below description. Loads the native library specified by the filename argument. The filename a...
NATIVE,JNI,JAVA,SYSTEM.LOAD,SYSTEM.LOADLIBRARY 2019-02-05 05:49:28
HTML Email Guide
Many of us may subscribe to some newsletters to get update about their site or information about a topic such as JavaScript Weekly, we may receive an email every week or every month to know what's happening there. The email we receive is just a simple HTML page but with an Email format called HTML Email. It seems it's simple to write this kind of HTML Email. But the thing is it's not so easy. It takes much effort by just designing an Email template. Whether the HTML Email can be displayed norm...
HTML Email,Guide 2013-06-16 03:38:36
Algorithm : Delete middle node from singly linked list
Questions about singly linked list are frequently asked during technical interviews. Today we will share with you one algorithm question about singly linked list. Here is the problem description. Assuming the only information you are giving is there is a pointer to a middle node of a singly linked list, no other information about the linked list is given. Please delete this node and don't affect the structure of the linked list. Initially you may think this question is easy if you know the hea...
ALGORITHM,C,LINKED LIST 2015-10-30 05:21:25
Implementation of Tower of Hanoi
The Tower of Hanoi is a mathematical game or puzzle. It consists of three rods, and a number of disks of different sizes which can slide onto any rod. The puzzle starts with the disks in a neat stack in ascending order of size on one rod, the smallest at the top, thus making a conical shape. The objective of the puzzle is to move the entire stack to another rod, obeying the following rules: Only one disk may be moved at a time. Each move consists of taking the upper disk fro...
Algorithm,Tower of Hanoi 2012-08-20 02:15:55
Understand more about Go basics with one interview question
First, let's take a look at below Go interview question: package main const s = "Go101.org" // len(s) == 9 // 1 << 9 == 512 // 512 / 128 == 4 var a byte = 1 << len(s) / 128 var b byte = 1 << len(s[:]) / 128 func main() { println(a, b) } What would be the output in your mind? The output would be 4 0. Surprising? Before getting to the output values, some concepts in Go need to be introduced and explained in more detail. len() len() is a built-in function in Go to get t...
GOLANG,CONSTANT,SHIFT OPERATION,LEN() 2020-10-10 02:52:19
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>