Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- CONSOLE.LOG



  5 comment styles should be avoided

Have you ever found some superfluous comments while checking others codes? The purpose of using comments in the code is to enhance the readability of the code, so that non-original code developers can understand them better and easier.I summarized 5 kinds of comment styles and the developers who write them. Hope you don't do the same thing as below in your application development process. 1. Arrogant comments public class Program { static void Main(string[] args) { string message...

   Code comment, comment style     2012-11-21 10:57:34

  Server monitoring shell scripts

There are many open source server monitoring software such as cacti and nagios. Besides these, can we write our own shell scripts to monitor them? The shell scripts written by ourselves can fulfill our special requirements better and have a more detailed coverage. Below are some commonly used shell scripts used by Evangelist, an Oracle DBA. 1. Check network gateway traffic #!/bin/bash #network #Mike.Xu while : ; do time='date +%m"-"%d" "%k":"%M' day='date +%m"-"%d' rx_before='...

   Server monitor,CPU,memory,shell     2013-08-30 21:56:14

  Nimbula 'cloud operating system' spans data centers

Nimbula – the build-your-own-cloud outfit founded by Amazon's former vice president of engineering – has announced a new release of its Director platform, saying it will allow businesses to run a unified "infrastructure cloud" across geographically separate data centers. In short, this means that those using such a cloud can log into a single console to tap computing resources served up from disparate physical locations. Nimbula says that Director is the first "cloud OS" t...

   Nimbula,Cloud computing,Data center,Arch     2011-08-23 08:06:39

  How to reset root password in MySQL 8

The user password in MySQL is stored in the user table, the password reset is actually to change the value of record in this table. To change the password in case the password is forgotten, the idea is to bypass the authentication of MySQL and get into the system and update the record password value with SQL command. In MySQL 5, one can start MySQL service with --skip-grant-tables option, this option will tell the service to skip loading the grant tables when starting, hence the root user can lo...

   MYSQL,PASSWORD,MYSQL 8     2018-12-24 21:27:13

  Alibaba Cloud was down again just after Singles' Day promotion

On November 12th, several popular Alibaba platforms and services experienced technical issues, causing widespread disruption and becoming hot topics on Weibo, the Chinese equivalent of Twitter. These services include Taobao, Xianyu, DingTalk, Aliyun Drive etc. Users took to social media to report instances of "Taobao crashing." Some encountered code display errors on the shopping page, while others faced a blank screen. However, a few users claimed they were still able to shop without any prob...

   ALIBABA CLOUD,ALIYUN,DOWN     2023-11-12 21:44:16

  9 reasons to use Zsh

Like majority *nix users, I have been using bash for many years. Sometimes I feel uncomfortable with bash. I tried use some other shells as well such as ksh, tcsh and zsh which I am going to talk about. A few days ago, I found an open source project ranking in the 6th named oh-my-zsh on Github, I downloaded it and had a try with it. It's amazing. We should use zsh to replace bash now. Why do we need to use zsh? Here is a 4 minutes YouTube video which shows many reasons why we should switch from ...

   zsh, advantage, command     2012-09-28 12:46:39

  Frequently used Git commands

Git configuration git config --global user.name "robbin" git config --global user.email "fankai@gmail.com" git config --global color.ui true git config --global alias.co checkout git config --global alias.ci commit git config --global alias.st status git config --global alias.br branch git config --global core.editor "mate -w" # Configure Editor to use textmate git config -l #List all configurations User's git configuration file : ~/.gitconfig Frequently used Git commands Check、add...

   Git,Command     2013-03-11 19:41:06

  GDC 2012: How Vector Unit made the leap from console to mobile games

Matt Small, creative director at independent developer Vector Unit, thought his small studio would focus on consoles forever when it was working on Hydro Thunder Hurricane for Xbox Live Arcade. But then the smartphone and tablet market picked up, and mobile devices started to offer increasing amounts of processing power. That increase in power opened up new opportunities for the people at Vector Unit, which had years of developing for consoles. So the studio worked with Tegra chipmaker Nv...

   Advice,Game design,Palm,Phone,Change     2012-03-14 13:46:22

  37 powerful Linux shell commands

To work on Linux platform, you cannot avoid using shell commands to complete some tasks. These tasks can be as simple as list files in some directories or find some text in some file, or can be as complex as monitoring processes. In this post, we will share 37 powerful Linux shell commands.   Task Commands 1 Delete file with 0 byte(empty file) find . -type f -size 0 -exec rm -rf {} \;find . type f -size 0 -delete 2 Check process memory consumption ps -e -o "%C : %p : %z : %a"|sort -k...

   Linux command,List     2013-09-16 07:47:16

  Service discovery with etcd

In previous post, we have talked about etcd and its usage. This post we will cover how to implement server discovery with etcd. Service discovery is to solve one of the most commonly seen scenarios in distributed system where how to find the corresponding target service to talk to. In short, it is to find some server which one can talk to based on some service name. A complete service discovery system include below three key functions: Service registration: A service must register itself to so...

   ETCD,SERVICE DISCOVERY,DEMO,TUTORIAL     2021-03-08 05:36:29