SEARCH KEYWORD -- Virtual host
Binary tree iterator algorithm
Binary tree pre-order,in-order and post-order traversal are basics in algorithm and data structure.And the recursive binary tree traversal is a classical application of recursion. We define a binary tree node as : // C++ struct Node { int value; Node *left; Node *right; } In order binary tree traversal can be: // C++ void inorder_traverse(Node *node) { if (NULL != node->left) { inorder_traverse(node->left); } do_something(node); if (NULL != node->righ...
Binary tree,Iterator,Traversal 2013-07-14 21:51:09
The craziest Javascript implementations
Since its birth in 1994, Javascript has come a long way. Today it’s one of the most popular programming languages on the web because of high popularity of AJAX based web-applications. Also the rise of micro-frameworks such as jQuery (also Prototype, Moo Tools etc) which have reduced dramatically the complexity of code developers needed to write, it is well tested, has a ton of plug-ins, has a large development community and reduced development time.And lately even Server-S...
JavaScript,Crazy implementation,JVM,Turing machine 2012-01-03 12:09:42
A HTTPS client and HTTPS server demo in Java
In this post, I will create a HTTPS server and HTTPS client demo which can establish HTTPS communication between a server and a client using Java. This should be very useful when we want to test our understanding about SSL communication. We will use both a detailed SSL client and a simple HttpsURLConnection as the HTTPS client. Before creating the actual HTTPS server and HTTPS client, we first need to generate the keystore and truststore to be used by the server and client. To generate the keyst...
What was the Internet like in 1995?
The Internet evolves very fast since its birth. In 1995, a TV program called Computer Chronicles made an episode about new technology "The Internet". Now let's check out what the Internet looks like in 1995 through some video screenshots. First the host Stewart Cheifet appeared in the video where he was in a network cafe. There you can meet the real people and virtual person. That's a good thing. The first guide of us is the technology journalist from New York Times John Markoff. He said his f...
Internet,History,1995,Computer Chronicles 2013-04-10 06:30:28
Shortest command on Linux
Usually when we log in to a Linux system,. we may type some frequently used Linux commands such as pwd,ls, ps etc. All these commands are really simple but powerful with different options. But do you know what is the shortest command on Linux? The answer is w. According to Linux manual, w will show who is logged on and what they are doing on the system. w displays information about the users currently on the machine, and their processes. The header shows, in this order, the current time, how l...
Linux,w,shortest command 2014-04-30 11:07:38
Galaxy S III will be released on May 3
Samsung Galaxy S II's popularity makes people look forward to the next generation of Galaxy mobile phones. As 2012 London Olympic Games is approaching us, Galaxy S III is also near us. An anonymous message says that the Galaxy S III conference was scheduled on May 3 at London, UK, this year's Olympic Games host city.According to the information previously circulated, Samsung Galaxy S III will have a 720p high-definition display Super AMOLED, the screen size will be between 4.6 to 4.8 inches, a...
Samsung Galaxy S III,Release 2012-04-16 16:09:18
Walking through doorways causes forgetting, new research shows
We’ve all experienced it: The frustration of entering a room and forgetting what we were going to do. Or get. Or find.New research from University of Notre Dame Psychology ProfessorGabriel Radvansky suggests that passing through doorways is the cause of these memory lapses.“Entering or exiting through a doorway serves as an ‘event boundary’ in the mind, which separates episodes of activity and files them away,†Radvansky explains.“Recalling the decision...
Memory loss,Doorway,Forget,Advice 2011-11-21 10:11:19
Something you may not know about Shell
Shell is also called command line interface, it is the interface between *nix users and computer. Shell is a program which provides service to access OS kernel services. This article is to introduce some not so well known but useful and interesting knowledge about shell. Wiki shell was born almost at the same time as Unix. The first UNIX shell was written by Ken Thompson in 1971 and its name is Thompson sh. It's older than Linux kernel. The default Shell in most *nix and MacOS is bash, bash was...
Microsoft is the 17th largest contributor to Linux
The Linux Foundation has released 2012 Linux White Paper which analyzes developers and contributors of the Linux kernel from 2.6.36 to 3.2.The top ten contributors are: Red Hat, Intel, Novell, IBM, Texas Instruments, Broadcom, Nokia, Samsung, Oracle, and Google. The software giant Microsoft's contribution ranked at 17, while the company's CEO Steve Ballmer has claimed previously that Linux is a cancer. Microsoft engineers have contributed 688 patches, which are mostly related to Hyper-V vir...
Linux,Microsoft,Contribution 2012-04-05 07:43:19
A Chinese Programmer Accused of Circumventing Great Firewall Faces Confiscation of RMB 1.05 Million
Recently, a programmer posted an article on Weibo claiming that he was working for an overseas company while accessing the international internet. He was subsequently accused by the Shuangqiao Public Security Sub-bureau in Chengde, Hebei of "illegally establishing and using non-official channels for international networking" and received an administrative penalty of a fine of RMB 200 and the confiscation of "illegal gains" totaling RMB 1.05 million. This is the most severe punishment reported s...
RECENT
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- more>>