Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- DIRECT DEPENDENCY



  Mutli-inheritance bug between python 2.7 and 3.7

When we have run a py3.7 code under py2.x or a py2.x code under 3.x ,if a class do mutli-inheritance from 2 parent and the 2 parents also got inheritance from same parent, the different way to handle inheritance chain between python 2 and 3 will cause some running time bug: Assume we got this sample program inheritTest.py : # Purpose: Test mutli-inheritance different between python2 and 3 # Author: Yuancheng Liu # Created: 2019/05/16 class A: def getVal(self): print("cal...

   PYTHON,PYTHON 3,INHERITANCE     2019-05-16 08:33:52

  Stuff Everyone Should Do (part 2): Coding Standards

Another thing that we did at Google that I thought was surprisingly effective and useful was strict coding standards. Before my time at Google, I was sure that coding standards were pointless. I had absolutely no doubt that they were the kind of thing that petty bureaucrats waste time writing and then use to hassle people who are actually productive. I was seriously wrong. At Google, I could look at any piece of code, anywhere in Google's codebase, and I could read it. The fact that I wa...

   Programming,Code standards,Rules,Stringe     2011-08-15 07:33:02

  Inspiration vs. Imitation

Every now and then I get a really lovely email from an aspiring letterer that is about to publish a passion project of his or her own. They tell me my work was an inspiration and that they can’t wait to share their creation with the world. I feel all warm and fuzzy inside for a moment…until I click on their link and realize that much of what they intend to publish is nearly a direct tracing of my work. A lot of established illustrators and designers deal with the same ...

   Designer,Copy,Divisify,Classification,Judgement,History     2011-12-05 12:26:38

  Bad code plagues business applications, especially Java ones

A new study examining 365 million lines of code in 745 applications identifies bad coding practices that affect security, performance and uptime, with Java Enterprise Edition applications having the greatest number of problems. Cast Software, which makes tools that automate the analysis of business applications, examined programs written in Java-EE, .NET, ABAP, C, C++, Cobol, Oracle Forms, and Visual Basic, used across a wide range of industries from energy and financial services to IT co...

   Program,Security,Defects,Java     2011-12-09 07:42:51

  Cybertruck's 48V Power: Revolutionizing Automotive Standards

Tesla's Cybertruck commenced its deliveries in the United States this month, marking a significant milestone for the innovative pickup. Distinguished by its unique design, the Cybertruck features a cargo bed panel that opens to facilitate easy loading of goods. This groundbreaking vehicle has achieved numerous world-first distinctions: The world's inaugural stainless steel car, boasting a body reportedly resistant to bullets. Its angular shape adds an extra layer of safety, causing severe col...

   FORD,48V,CYBERTRUCK,TESLA     2023-12-24 17:06:59

  Video website in big data era

Big data initially means the large data set which is not able to be analyzed, but later it was derivatized to the method to analyze huge amounts of data in  order to gain great value.This is a form which gradually gets attention, It's difficult to analyze these data and it's also difficult to store these data and it needs some unprecedented way, Now in China many companies use the open source Hadoop distributed data cluster to meet the needs of data statistics. Since we can get segmented d...

   Netflix,Big data,Data mining     2013-04-11 04:20:40

  How Can Your Data Be Stolen Online?

In 2019, according to Statista, nearly 165 million sensitive records were exposed in the US due to data breaches. Unfortunately, data theft is not going anywhere. Hackers are using increasingly sophisticated methods to steal information, but thankfully there are measures you can take to ensure your data stays safe. Here are some of the most common ways people get their data stolen online and how you can take precautions against the methods cybercriminals use. Human Error Hacking is one of the m...

   DATA SECURITY,PROTECTION KID     2021-01-27 19:46:05

  Is Ubuntu becoming a big name in enterprise Linux servers?

Summary: Mark Shuttleworth says yes, Ubuntu is now competitive with Red Hat Enterprise Linux in the enterprise space. Since last summer, Ubuntu has been more popular than Red Hat as a Web server. When you think of Ubuntu Linux, what do you think of? I would guess you think about the Linux desktop. While Ubuntu is certainly a big player—maybe the biggest—when it comes to the Linux desktop, Mark Shuttleworth, founder of Canonical, the c...

   Linux,Ubuntu,Daat center,Server     2012-04-15 01:22:53

  Will nil == nil be true in GoLang

There is some interview question may ask whether nil == nil be true in GoLang. Wil it be true. false or compilation error? To know the answer, some knowledge about nil in GoLang needs to be explained first. nil definition According to Go's official documentation, the definition of nil is // nil is a predeclared identifier representing the zero value for a // pointer, channel, func, interface, map, or slice type. var nil Type // Type must be a pointer, channel, func, interface, map, or slice type...

   GOLANG,NIL,NIL EXPLANATION     2021-08-08 02:54:15

  Open Source Needs a New UI

As a freelance web developer, I’ve seen and used my fair share of open source web applications (and desktop software), and I’d like to point out something that I see all too often in open source projects: the user interface almost always lets the project down. Let me explain… The Problem I’ve used a considerable amount of open source software (web-based and desktop), and I feel that a large portion of them are let down by their UI. The functionality is brill...

   Open source,Problem,UI,New paradign     2011-12-09 07:53:19