Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Login with Amazon



  Coming back, Nokia?

Nokia officially unveiled an Windows Phone 8 phone model Lumia 920T in cooperation with China Mobile in yesterday's Global Developer Conference of China Mobile. This is the first to support China Mobile's TD-SCDMA 3G mobile phone network standard in the Windows Phone ecosystem, it that Windows Phone is available in TD camp. Meanwhile, as China Mobile's official custom models, Lumia 920T will be sold using China Mobile's sales channel, this may further promote the sales of Nokia Windows Phone dev...

   Nokia, China Mobile, Lumia 920T,TD-SCDMA     2012-12-06 13:17:24

  Google feels the threat from Samsung

In response to Apple's iOS system, Google and Samsung stood on the same side. But with the increase of market share of Samsung Android devices, Google begins to feel the threat from Samsung.On MWC in Barcelona, a group of business executives said Google increasingly worried about Samsung after a private party. Because its equipment has occupied 40% of the Android devices, which could erode the Google advertising service. Google hopes manufacturers such as HTC and HP can challenge Samsung.It is r...

   Google,Samsung,Android     2013-02-27 21:12:17

  Understanding How is Data Stored in RDBMS

We all know that DBMS (database management system) is used to store (a massive amount of) data. However, have you ever wondered how is data stored in DBMS? In this post, we will focus on data storage in RDBMS, the most traditional relational database systems. Physical Storage Data can be stored in many different kinds of medium or devices, from the fastest but costy registers to the slow but cheap hard drives, or even magnetic tapes. Nowadays, IaaS providers such as AWS...

   RDBMS,DATABASE     2019-02-04 09:25:36

  SSH Security and You - /bin/false is *not* security

Backstory While at RIT around 2004 or 2005, I discovered that a few important machines at the datacenter allowed all students, faculty, and staff to authenticate against them via ssh. Everyone's shells appear to be set to /bin/false (or some derivative) on said machines, so the only thing you'll see after you authenticate is the login banner and your connection will close. I thought to myself, "Fine, no shell for me. I wonder if port forwarding works?" ...

   Linux,Security,/bin/false,SSH     2012-02-06 07:46:29

  Do you have this kind of comments in your source code?

Writing runnable code is the essential skill of a programmer, writing understandable comment is also a skill a programmer should acquire. There is some famous saying that bad comment is worth than no comment. Usually your code will be maintained by other people, if you provide them some difficult to understand or misguided comments, this will be nightmare to them. While at some other time, programmers may put some funny comments in their codes which may make others laugh. Today we...

   COMMENT,HUMOR     2016-08-01 10:25:14

  There are no free lunches on the internet

Hot data: An IT technician checks the network servers at a data farm. Alamy Photograph: Juice Images/AlamyPhysics has Newton's first law ("Every body persists in its state of being at rest or of moving uniformly straight forward, except insofar as it is compelled to change its state by force impressed"). The equivalent forinternet services is simpler, though just as general in its applicability: it says that there is no such thing as a free lunch.The strange thing is that most use...

   Free lunch,Facebook,Google,Privacy information     2011-11-21 03:03:31

  Difference between Beijing and Silicon Valley on innovation

The fundamental difference between Beijing and Silicon Valley is not the sky color, but the fact that on one side the young people are talking about buying a new house, a new car and getting married, while on the other side young people are talking about how to change the world. Now and then we can read from the newspaper or the Internet that a Silicon Valley company is valued over 1 billion US dollars. Also we can see many famous US IT brands on the Internet such as Google, Facebook,Twitter, Am...

   China,Silicon Valley,Innovation, Comparison     2013-06-24 03:09:54

  Must read C++ book list

Every programmer should read some books to enhance their understanding about the language before the start to practice. But some of us often wonder what books we should read and in what order. Some books may not be suitable for beginners and some books may cover the similar topics. Here I summarize a C++ book list we should read.Stage 1"Essential C++" : It is short but powerful and it can enhance our understanding of C++'s features.This book is specifically designed to bring you up to speed in a...

   C++,Book list,Read,Effective C++     2012-05-23 13:03:30

  About HTML semantics and front-end architecture

A collection of thoughts, experiences, ideas that I like, and ideas that I have been experimenting with over the last year. It covers HTML semantics, components and approaches to front-end architecture, class naming patterns, and HTTP compression. We shall not cease from exploration And the end of all our exploring Will be to arrive where we started And know the place for the first time. T.S. Eliot — “Little Gidding” About semantics Semantics is the study of the relationshi...

   HTML,SemanticsCSS,OO CSS     2012-03-16 08:42:55

  SQL Server: Removing Deprecated Code and Future Proofing your Queries

New features are added with every release of SQL Server and as a result, some features get removed or deprecated. Deprecated features are features that are still operational (for backward compatibility) but will be removed in a future version. Deprecated features can be of two types: those that will be deprecated in a future version and those that will be deprecated in the next version.In this article, we will explore how to track deprecated code and correct it. I will also share our observation...

   SQL Server,Microsoft,MS SOL,Proof query,Remove redundancy     2011-10-17 11:14:49