SEARCH KEYWORD -- Network programming
Another Chinese Siri : Baidu launched phone voice assistant
Today, Baidu launched their own phone voice assistant "Baidu voice assistant Baidu claims it as the first apply the depth neural network (DNN) to speech recognition products in China, it reduces recognition error rate by 25%.Similar to other voice assistants, Baidu voice assistant can be roughly divided into the function of the phone calls, information querying and voice communication. Users can use voice to make phone call, send SMS and set the alarm etc. Similarly, Baidu voice assistant suppo...
Baidu voice assisstant, Google Now, Apple Siri 2012-12-25 02:16:27
Why I love Common Lisp and hate Java
“Common what?†is a common reply I get when I mention Common Lisp. Perhaps rightly so, since Common Lisp is not all that common these days. Developed in the sixties, it is one of the oldest programming languages out there. In its heydays it was used mostly for Artificial Intelligence research at MIT, Stanford, Carnegie Mellon and the like, and therefore has a lingering association with AI. People not in AI shy away from Lisp. Common Lisp is a powerful and versatile program...
Lisp,Java,Comparison,Common Lisp 2012-01-30 05:48:16
Permutation implementation in Java
Permutation is a very basic and important mathematic concept we learned in school. It has very practical applications in real world. For example, in football. In simple, permutation describes all possible ways of doing something. For example, there are six permutations of the set {1,2,3}, namely: (1,2,3), (1,3,2), (2,1,3), (2,3,1), (3,1,2), and (3,2,1). In general, for n items, there are n! number of permutations to arrange these items. How can we implement this algorithm in programming programm...
Permutation,Implementation,Java,Sample 2015-03-26 02:18:14
Using public key authentication in SSH
SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc. To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...
LINUX,DEBUG,SSH,PUBLIC KEY 2016-09-10 05:55:46
Learning Ruby and Ruby vs Lisp
The company I work for has a lot of legacy Ruby code, and as Ruby has become kind of a mainstream language, I decided to get a book about it and learn how it works. As my learning resource, I chose The Ruby Programming language by David Flanagan and Yukihiro Matsumoto as that receives great customer reviews, covers Ruby 1.8.7 and 1.9 and is authoritative because the language creator is one of the authors. The book makes a good read in general. There are plen...
Ruby,Feature,Functional,OOP,Lisp,Difference 2011-12-12 07:42:01
Guide to Implement an SSH Client Using Golang
SSH, short for Secure Shell, is a network protocol used for securely remote logging into other computers on a network. I believe most backend developers are familiar with SSH. Common shell tools used for logging into servers, such as Xshell, SecureCRT, and iTerm2, are all based on the SSH protocol. In Golang, the crypto/ssh package provides functionality for implementing an SSH client. In this article, we will explain in detail how to implement an SSH client using Golang. Creating SSH Client Con...
SSH CLIENT,GUIDE,SSH,GOLANG 2023-11-11 09:19:29
Google+ is sick
Google says that Google+ now has over 170million registered users, but according a new research report of Fast Company about Google+, Google+ is just a virtual ghost town.This research selected a sample of 40,000 random Google+ users. The result is :The average post on Google+ has less than one +1, less than one reply, and less than one re-shareRoughly 30% of users who make a public post never make a second oneEven after making five public posts, there is a 15% chance that a user will not ...
"Programmer" is an Overgeneralization
"Beware of bugs in the above code; I have only proved it correct, not tried it." - Donald Knuth Earlier today, I came across a post during a google-fu session that claimed that no one should use the C++ standard library function make_heap, because almost nobody uses it correctly. I immediately started mentally ranting about how utterly ridiculous this claim is, because anyone whose gone to a basic algorithm class would know how to properly use make_heap. Then I started thinking about all the ...
Programmer,Overgeneration,Overload 2012-03-13 08:13:16
Roundup on Parallel Connections
A lot of blogging and follow-up discussion ensued with the announcement that IE8 supports six connections per host. The blogs I saw: IE8: The Performance Implications IE8 speeds things up IE8: 6 Connections Per Host IE 8 and Performance Testing IE8.s Connection Parallelism IE 8 Connection Parallelism Issues It’s likely that Firefox 3 will support 6 connections per server in an upcoming beta release, which means more discussion is expected. I wanted to pull all the facts into one place an...
Browser,Concurrent connection,Persistent 2011-09-05 01:51:44
Programming Languages for Machine Learning Implementations
Machine learning algorithms have a much better chance of being widely adopted if they are implemented in some easy-to-use code. There are several important concerns associated with machine learning which stress programming languages on the ease-of-use vs. speed frontier.Speed The rate at which data sources are growing seems to be outstripping the rate at which computational power is growing, so it is important that we be able to eak out every bit of computational power. Garbage collected la...
Programming language,Machine learning,Development 2011-11-16 08:22:17
RECENT
- Common Pitfalls When Handling JSON in Golang
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- more>>