SEARCH KEYWORD -- Start address
Google open sources its Collaborative IDE
July 9, 2012 news, Google engineer Scott Blum published an article on Google+ which revealed that Google would open source the Collaborative IDE. The project was named "Collide" (collaborative IDE), which is a Web collaborative code editor. Google hopes that Collide can serve as a catalyst for improving the state of web-based IDEs.Caution Collide does not have any proper auth, SSL support, or user account management just yet. Please consider that fact when running instances that expose important...
Google,Open source,Collide IDE 2012-07-09 10:55:20
Install and setup vsftpd on AWS server
When developing websites, frequently we may need to upload source codes to the remote server. To ease of thew work, many website developers set up FTPs to upload the files. This post is a tutorial on how to install and setup vsftpd on a server. vsftpd is a very popular FTP service on Unix-like systems. Open command terminal, then install the vftpd by issuing command yum install vsftpd or sudo apt-get install vsftpd After installing the vsftpd, the config file needs to be updated based on the ope...
The 10 most expensive domains on the Internet
Domain name is the name which we usually type on the web browser address bar. For example, we may type http://www.apple.com on the address bar, here www.apple.com is the domain name. Can you imagine that this domain is worth millions of dollars? We believe that most domains are initially for starting related business and easy for users to remember. But with the popularity of the business, some of the domains become valuable and they are more expensive than some small companies. Below are some mo...
Domain name,Price 2013-01-01 10:32:06
Subdomain Configuration
Subdomain ConfigurationA subdomain configuration is very similar to a domain name configuration. The only difference is that the subdomain entry is tied to the corresponding domain name lookup. A request for the subdomain (e.g. http://content.websitegear.com) will be routed to a DNS server containing the DNS information for the parent domain (websitegear.com). Once the DNS record for the subdomain is resolved to a particular IP address, the request is sent to the web server listening on that IP ...
Domain,Subdomain,Configuration,Setup 2011-10-09 09:23:16
Some tricks and tips for using for range in GoLang
GoLang provides two major ways to loop through elements of array, slice and map. They are for and for range. Many people find that for range is very convenient when don't care about the index of the element. In this post, some tricks and tips would be talked about regarding for range. 1. Loop and get pointer of each element Assume there is a code snippet like below which is to get the pointer of each element in an array and create a new array with the corresponding pointer. arr := [2]int{1, 2} r...
Some geek mats to welcome guests
Geeks are mostly otaku, they like surfing the Internet, playing games. Perhaps not everyone is a programmer, but most of them have some understanding of programming. It is undoubtedly very necessary to have a specific pattern mat at the door as a glorious proud geek, what mat should you use? 1. Binary Floor/Door Mat There are 10 kinds of people in the world, one is understanding binary code, the other one who doesn't understand binary code. The above binary mat is the binary codes of " welcome"...
Mat,Geek,Entertainment 2012-10-05 19:39:24
Taking Precautions to Avoid Shady VPN Providers
VPNs or virtual private networks are virtual tunnels that obscure your IP address, routing your internet traffic through a server located in a country of your choice, in an encrypted and anonymous way. Using a VPN allows you to: secure your sensitive data from hackers obscure the IP address so you can see content not available in your country avoid websites you routinely surf (e.g., Facebook) noticing a different IP address when you are traveling, and asking you to verify your identity bypass t...
VPN,NETWORKING 2019-02-19 07:26:26
Chrome 23 supports Do Not Track now
Google has upgraded its browser to Chrome 23, released for Windows, Mac, Linux and Chrome framework. New features brought by Chrome 23 include GPU video decode acceleration, more convenient site permissions management and start supporting DNT agreement. The most important feature of this version upgrade is the support for "Do Not Track (DNT)". As one of the solutions to address online privacy issues, DNT protocol allows Internet users to control how their privacy information can be tracked, als...
Chrome 23, Do Not Track,DNT 2012-11-07 11:27:26
Tricks with Direct Memory Access in Java
Java was initially designed as a safe managed environment. Nevertheless, Java HotSpot VM contains a “backdoor†that provides a number of low-level operations to manipulate memory and threads directly. This backdoor – sun.misc.Unsafe – is widely used by JDK itself in packages like java.nio or java.util.concurrent. It is hard to imagine a Java developer that uses this backdoor in any regular development because this API is extremely dangerous...
Java,Directly memory access,Tricks,JVM 2012-02-13 05:31:19
An example of SQL outer join
SELECT MEMBER.Name, MEMBER.Address, ORGANIZER.phoneNo, TRAVEL.Tour_Name, TRAVEL.Start_Date, TRAVEL.End_Date FROM TRAVEL RIGHT JOIN ((MEMBER LEFT JOIN ORGANIZER ON MEMBER.Member_ID=ORGANIZER.memberID) LEFT JOIN PARTICIPATION ON MEMBER.Member_ID=PARTICIPATION.MemberID) ON TRAVEL.TravelID=PARTICIPATION.TravelID;...
Access,SQL,Outer join 2011-03-20 09:08:11
RECENT
- What Is The Best SaaS CRM In 2024?
- Common Pitfalls When Handling JSON in Golang
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- more>>