SEARCH KEYWORD -- update
Signature sign/verification demo in Java
Digital signature is commonly used in areas where data authentication and integrity are required. It is extremely important to have signature while transferring sensitive data from one peer to other peers through network since there might be malicious applications or man-in-the-middle attacks which may alter the data along the way. Java provides some APIs to generate and verify digital signature. One important class is Signature. When generating the signature, a private key needs to be pa...
Reset submodule to checkout state in git
Sometimes there would be a submodule or some submodules within one git repository, in some cases the submodule may be out of sync with the checkout state as some files in submodule may be changed unexpectedly. How to reset the submodule to be the same as the original checkout state? Let's take an example that we have a git repository A and there is a submodule called ruby-gems under it. Assuming the submodule at remote origin has commit a. And on our local environment, the repository A has a la...
GIT RESET,GIT SUBMODULE 2020-09-05 08:30:57
Understand Virtual DOM
With the popularity of React, the internals and implementation of Virtual DOM has becoming top discussed topic in tech communities and interviews. This post will give an introduction of Virtual DOM and how to implement a simple Virtual DOM logic. How to understand Virtual DOM In early days, front end developers would update a webpage view based on the data status change(usually after making AJAX call). But it brings performance penalties when there is frequent update as it would cause page reflo...
JAVASCRIPT,DOM,VIRTUAL DOM 2019-12-07 23:43:04
Maybe we need //Comment comment
Do we need comment in our programs? Depends, if we can write a program which can clearly tell s the reader what the program does, then we had better to avoid unnecessary comments. However, if the program we develop is complex enough and it involves some uncommon logic which needs more explanation, then we have to add comment and make sure the comment we add can correctly tell the readers what we do. The worst scenarios is not you forget or you don't want to add comment, it's that you add comment...
comment,programming 2014-07-23 04:38:04
The requirements of DevOps development
DevOps has become a popular and commonly adopted software development model in IT industry in recent years. Its popularity is partially because it advocates it could improve software development efficiency, delivery speed and cost saving. This is especially favored by managers who become the main force to promote this type of development model in their companies. However, we must be cautious about DevOps model as well. With their advantages, they also bring challenges to development teams and th...
Sorry, I don't want to download your fucking app
You should not claim yourself as a mobile Internet service provider if your product doesn't have an App nowadays. The topic cannot get away from App when we talk on bus, restaurant. Recently it becomes a little bit quiet, but the app wind does not seem to stop, it seems every website may have an App. According to data released by Apple a couple of days ago, its application store app downloads already exceeded 50 billion. However some people are not happy with this.Some people created a blog ...
App,Update,Force download 2013-05-19 02:50:02
Expectations, Desperation And Anticipation All You Need To Know About iOS 9.3
With so much anticipation filled among the audience, iOS 9.3 on contrary came out to be as a blooper. All the users were filled with a lot of enthusiasm about the latest advancements in the software, but the final release went to several crest and troughs. iOS 9.3 was quite important for the users when it comes to mobile OS update, however this did not go as it was expected to be for the iOS. The latest software in some cases is locking users. Along with the users this has also creased the eye ...
IPHONE APP DEVELOPMENT,IPHONE APP DEVELOPER,IOS DEVELOPER,IOS APP DEVELOPMENT,IPHONE APP DEVELOPERS 2016-04-11 03:05:15
Get Bluetooth back on my ASUS Zenbook UX31A
A strange thing occurred to me a few days ago after I installed some routine Windows updates on my ASUS Zenbook UX31A, my Bluetooth was gone and I could not have my Bluetooth speaker connected to my PC and listen my favorite music. It's just like a ghost, everything disappears all of a sudden. Everything was tried to find where my Bluetooth went but no luck. Below is what my device manager shows: No Bluetooth is found, usually if there is some issue with the Bluetooth driver, the device m...
Bluetooth,Windows 8.1,ASUS Zenbook, Bluetooth driver 2014-12-11 09:17:11
Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
In an Ethernet environment, all data is ultimately sent in the form of a Layer 2 Ethernet Frame, which includes the Src MAC, Dst MAC, and other headers such as CRC, etc. Ethernet will then deliver the data to the destination. When we program, we often specify the IP and Port, but rarely specify the MAC address. So, how is the Frame sent out? This is done by the operating system. If the system does not know the MAC address corresponding to an IP, it will send a broadcast ARP request (since this r...
The first 30 tweets on Twitter
Six years ago, we didn't know what a tweet was. But now, there are 340 million tweets posted every day. Looking back, do you know what are the earliest tweets on Twitter when it was released? Let's check them out. Before that, let's check Twitter's background first. Six years ago, Twitter was called twttr (similar to Flickr), the earliest version was similar to an SMS broadcast service, i.e sending short message to friends to tell them what I am doing. It was put online on 22nd October, 2006, J...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>