SEARCH KEYWORD -- pre-order
Office 2013 RT for Windows RT tablets may rule out macros and VBA
Office 2013 RT is the office suite optimized for Windows RT system running on ARM tablet PC, Microsoft plans to release a preview version later this year. However, according to TheVerge, Microsoft may remove some features in this version of the Office suite.The so-called optimization, certainly require some changes to Office based on ARM tablet architecture. To remove some features may be because of battery life and machine reliability considerations. Macrso, third-party add-ons, and VBA will be...
Office 2013,Macro,Window RT 2012-08-07 14:17:53
Cool things you can do with iPhone
Nowadays smart phones have plenty of cool features you can get to know without reading the manuals. But do you know there are some useful but less well known features which can ease our life? In this post, we will share with you some cool features on iPhone. If you have an iPhone with, go and get a try. 1. Use Google Map as free GPS While traveling abroad, you can use Google Maps as a free GPS without an international data plan by making use of it's hidden offline maps feature.You can use this f...
Understand GoLang WaitGroup internals and how it works
Background Before getting into the main content, let me give a brief introduction to WaitGroup and its related background knowledge. Here, the focus is on the basic usage of WaitGroup and the fundamental knowledge of system semaphores. For those who are familiar with these, you can skip this section directly. WaitGroup WaitGroup is one of the most common concurrency control techniques in Golang, and its function can be roughly compared to the join() in concurrency control of other languages' mul...
GOLANG,WAITGROUP,SOURCE CODE 2023-04-26 08:02:01
Use Memory Analyzer Tool in Eclipse
When developing applications, we often encounter memory issues of an application. To analyze how much memory each class takes, we need to have some specific tools to assist us. One of them is Memory Analyzer Tool on Eclipse. The Eclipse Memory Analyzer is a fast and feature-rich Java heap analyzer that helps you find memory leaks and reduce memory consumption. To use the Memory Analyzer Tool, you first need to install it on Eclipse. You can go to Help -> Install New Software.... Paste h...
Memory analyzer tool, Eclipse,heap dump, HPROF 2014-10-28 07:22:35
Java Concurrency Basics: CountDownLatch and CyclicBarrier
CountDownLatch CountDownLatch can be used in synchronizing behavior among threads, it makes one or more threads wait for some actions in other threads to be completed. It has a property count which defines how many countDown() need to be called before other threads which called await() to be waked up. When a thread calls CountDownLatch.await(), the thread will be blocked until the value of count becomes 0. The initial value of count can be specified when creating the CountDownLatch instanc...
JAVA,JAVA CONCURRENCY,COUNTDOWNLATCH,CYCLICBARRIER 2018-03-25 07:02:40
Mock Solutions for GoLang Unit Test
In Go development, Unit Test is inevitable. And it is essential to use Mock when writing Unit Tests. Mock can help test isolate the business logic it depends on, enabling it to compile, link, and run independently. Mock needs Stub. Stub function replaces the real business logic function, returns the required result, and assists the test. I involved the related test code for Controllers while writing Kubernetes Operator recently, and there would be mocks for GRPC and HT...
Encrypting and decrypting PGP file or text on MacOS
When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...
TUTORIAL,ENCRYPTION,DECRYPTION,PGP,GPG 2020-10-29 05:06:09
5 Great Hacks to Learn Before Launching a Startup
Maybe months or years have gone planning for a startup and finally you are ready to enter into the world of small business. Excited enough to hit the “Launch” button. As the bulk of your business is good, so the rest of it must be the same. You think like that, right? But hey, you are wrong there. You may be selling the next big thing, but it does not matter until you have frozen your brand name in the niche market and gained a decent amount of credibility. But you can do that...
SOFTWARE,STARTUP, ENTREPRENEUR 2016-06-21 09:33:05
SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
Dashboard for Summarizing SG National Cyber Threats in Critical Infrastructure Program Design Purpose: The purpose of this program is to develop a comprehensive Angular web dashboard plugin for a Security Information and Event Management (SIEM) system, focusing on the effective monitoring, categorization, summarization, and visualization of cyber threat events targeting Singapore's critical infrastructure. This dashboard will provide researchers and security managers with a clear, concise view ...
Big Corporate Layoffs Hit Shenzhen IT Manufacturing Business
At 11:00 on March 29, 3 employees were ready to jump from Shenzhen Foxconn's longhua building G14. According to witnesses, those 3 employees were negotiating with company regarding the “Foxconn diversion plan”. Liu Kun, Foxconn public speaker, told reporters that many employees are working negatively to resist this plan, but Foxconn does not agree or support their actions in this way. " Company like Foxconn with large-scale labor-intensive manufacturing enterprises in Shenzhen, is f...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>