SEARCH KEYWORD -- Hardware issue
Using Java keytool programmatically
Java provides a command line tool to access and operate different keystore which store keys and certificates. This tool is named keytool and is located at \bin. On command line, you can issue below command to generate a keystore named mytest.jks which contains a private key and certificate chain. keytool -genkeypair -alias mykey -keyalg RSA -sigalg SHA256withRSA -dname CN=Java -storetype JKS -keypass password -keystore mytest.jks -storepass password Sometimes, in testing purpose, w...
How many programmers does it take to screw in a lightbulb?
There seem to be a lot of “How many programmers does it take to screw in a lightbulb?” jokes floating around the Internet, but none aimed specifically for us SQA folk. I have decided (perhaps mistakenly) that this is no longer acceptable. If this decision is a mistake, I'm sure that someone else in QA will report it up as a bug and assign it to me. For better or worse, there is now an SQA set of these jokes, thanks to me. Now, without further ado, let the pun...
Ruby net-scp cannot scp multiple files with asterisk(*)
net-ssh/net-scp is a Ruby gem which can be used to scp files between different *nix machines. It's similar to how the *nix scp command. It can be used to scp a file or a directory. However, it seems it has some problem to scp multiple files using pattern *. For example, below script is supposed to download all files from remote directory to local directory: require 'net/scp' host = 'testmachine' login = 'testaccount' password = "testpassword" remote_path = '/tmp/remote...
NET-SCP,RUBY,ASTERISK,MULTIPLE FILES 2016-10-20 03:00:13
Traditional recursion vs Tail recursion
Recursion is a frequently adopted pattern for solving some sort of algorithm problems which need to divide and conquer a big issue and solve the smaller but the same issue first. For example, calculating fibonacci accumulating sum and calculating factorials. In these kinds of issues, recursion is more straightforward than their loop counterpart. Furthermore, recursion may need less code and looks more concise. For example, let's calculate sum of a set of numbers starting with 0 and st...
ALGORITHM,RECURSION,TAIL RECURSION,TRADITIONAL RECURSION 2016-09-23 23:54:09
Resolve git issue git@github.com: Permission denied (publickey)
Sometimes when clone a remote repository from github.com, you may see below error. D:\Project\Playground\GitBisect>git clone git@github.com:bradleyboy/bisectercise.git Cloning into 'bisectercise'... git@github.com: Permission denied (publickey). fatal: Could not read from remote repository. Please make sure you have the correct access rights and the repository exists. The issue occurs when there is no key on your machine which is associated with your github account. To fix the issue, please ...
GIT,GITHUB,PERMISSION DENIED,PUBLIC KEY 2019-07-12 10:10:49
The "C is Efficient" Language Fallacy
I came across an article yesterday about programming languages, which hit on one of my major peeves, so I can't resist responding. The article is at greythumb.org, and it's called Programmer's rant: what should and should not be added to C/C++. It's a variation on the extremely common belief that C and C++ are the best languages to use when you need code to run fast. They're not. They're good at things that need to get very close to the hardware - not in the efficiency sense, but in the...
C,GCC,Fallacy,Evolvement 2012-01-09 08:54:46
How does computer boot up?
The whole boot process of computer can be summarized in 4 phases. 1. BIOS In the 70's read-only memory(ROM) was invented. The boot program is written into ROM, the first thing the computer does is to read and execute this program when it's powered on. The program in this chip is called "Basic Input/Output System" (BIOS). 1.1 Power-On Self-Test The BIOS will first check whether the computer hardware can fulfill the basic conditions for booting up, this process is called Power-On Self-Test...
Why We Moved Off The Cloud
Cloud computing is often positioned as a solution to scalability problems. In fact, it seems like almost every day I read a blog post about a company moving infrastructure to the cloud. At Mixpanel, we did the opposite. I’m writing this post to explain why and maybe even encourage some other startups to consider the alternative.First though, I wanted to write a short bit about the advantages of cloud servers since they are ideal for some use cases.Low initial costs. Specifically, you...
Cloud,Cloud computing,Mixpanel,Get off,Disadvantage,Drawback 2011-10-28 10:22:32
Is The Cloud Finally Catching Up With Mighty Oracle?
Oracle for years has seemed impervious to cloud computing. First Larry Ellison dismissed it. Then he sort of touted it, his version at least. But all along, Oracle was growing nicely. The industry chatter didn’t seem to matter. Big companies buy big software systems. Something changed this winter. Oracle’s software license sales limped up just 2% in December, and the company blamed customer budget cuts and fears over the European debt crisis. Sales to Europe, Africa and...
Cloud,Oracle,Incorporation,Trend 2012-02-23 07:17:03
Get Facebook, Twitter and YouTube back
Facebook, Twitter and YouTube have become part of many people's daily network life. People hang around these sites to network with known and unknown friends, to know about the latest news and to relax with fancy video clips. But what will you feel if all of a sudden you cannot access them? Want to experience this? Go behind the GFW(Great Firewall) of China. Just a joke, but it's real. Huh, you are out of China? Don't worry. Change your DNS server to those located in China. I just experienced it,...
DNS spoofing, GFW, YouTube, 37.61.54.158 2014-12-20 21:41:34
RECENT
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- more>>