Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Exception



  Using MemoryMappedBuffer to handle large file in Java

When handling large files, it will largely affect the process speed while using traditional FileInputStream, FileOutputStream or RandomAccessFile since they trigger lots of read and write operations. In Java NIO, a new way of handling large file is introduced which is to use MmeoryMappedBuffer to create memory mapped file. Memory-mapped I/O uses the filesystem to establish a virtual memory mapping from user space directly to the applicable filesystem pages. With a memory-mapped file, you can pre...

   JAVA,IO,NIO     2015-11-13 01:58:08

  Stanford Computer Science '10-'11 Salary Survey Results

CS/EE UndergradsData: I received 140 responses which described 360 job offers. 95% of the job offers were primarily located in the Bay Area, 5% were from the Midwest and East Coast. 10% of the job offers were from start-ups.Salary offers ranged from $64,400 to $100,000. The average salary offer was $79,914. The median salary offer was $ 82,200.About 70% of students were offered stock options. About 80% of students were offered signing bonuses. And about 60% were offered relocation assistan...

   Stanford,Computer science,Salary,Survey     2011-12-25 00:54:41

  How to Find User Participants To Test Your Project

Image Source: Unsplash Recruiting the right participants is important to test your projects properly, but it's essential that your research participants are able to represent your target group, or the results won't translate into something you can use. Since recruiting for specific criteria can be time-consuming, follow these considerations that should make getting these types of user participants easier.  Sharply Define Recruitment Topic Criteria There needs to be a required criteria befo...

   USER RESEARCH,USER REQUIREMENT,TESTING     2020-08-26 07:53:28

  How to check whether a web page can be loaded in iframe

Sometimes you may want to load other website's page in your own website's iframe, but due to some security concerns, other website may have security configurations which prevent you from loading their pages into your iframe. In this case, if you try to load them, you would see a blank page or a text message telling that it's prohibited. Fortunately, you can detect this before you actually decide to load it. To prevent a page from being loaded by an iframe from other site, the response ...

   HTTP,HTML,IFRAME,SECURITY,X-FRAME-OPTIONS,CONTENT-SECURITY-POLICY     2018-07-27 22:36:02

  Bad code plagues business applications, especially Java ones

A new study examining 365 million lines of code in 745 applications identifies bad coding practices that affect security, performance and uptime, with Java Enterprise Edition applications having the greatest number of problems. Cast Software, which makes tools that automate the analysis of business applications, examined programs written in Java-EE, .NET, ABAP, C, C++, Cobol, Oracle Forms, and Visual Basic, used across a wide range of industries from energy and financial services to IT co...

   Program,Security,Defects,Java     2011-12-09 07:42:51

  5 comment styles should be avoided

Have you ever found some superfluous comments while checking others codes? The purpose of using comments in the code is to enhance the readability of the code, so that non-original code developers can understand them better and easier.I summarized 5 kinds of comment styles and the developers who write them. Hope you don't do the same thing as below in your application development process. 1. Arrogant comments public class Program { static void Main(string[] args) { string message...

   Code comment, comment style     2012-11-21 10:57:34

  Break down defer statements in GoLang

Basic Concepts What are the characteristics of the deferred statement defer in Go language? When is it usually used? The deferred statement(defer statement) in Go language has the following characteristics: Deferred Execution: Deferred statements are executed before the function containing them exits, regardless of whether the function returns normally or encounters an exception. Last In, First Out (LIFO): If there are multiple deferred statements, they are executed in the order of last in, f...

   DEFER,GOLANG     2024-02-10 21:56:10

  Java Cipher encryption/decryption example

In Java, Cipher is the API for doing data encryption/decryption. Many cryptographic algorithms such as AES, DES, RC4 etc can be specified when creating Cipher instance. The Cipher instance calls the underlying algorithm specific implementation to do the actual encryption/decryption.  Before doing the encryption/decryption, a key needs to be created and it will be used to do the encryption/decryption. A sample program for performing all these is : import java.security.Key; import javax.cryp...

   Java, Java Security, Cipher, Example, Sample     2015-08-14 07:07:10

  Techies: Let's Not Forget Brain Hacking

A close-up of a jellyfish

Description automatically generated with low confidence Credit: SergeyNivens via Canva The world of cyber security never fails to surprise us with bolder and more sophisticated cyber-attacks and...

   HACKING     2022-02-03 21:43:11

  Set file permission in Java

Prior to Java 6,  there is no good solution at the Java level to provide file permission management. You need to implement your own native methods or call the Runtime.exec() to invoke the system routine such as chmod in LInux. Since Java 6, Java introduces a set of methods which can be used to set the file permission at Java level. These methods include: File.setReadable(boolean); File.setWritable(boolean); FIle.setExecutable(boolean); File.setReadable(boolean, boolean); File.setWritable(bo...

   JAVA, FILE PERMISSION, POSIX,learnjava     2015-08-29 03:37:37