No doubt everybody knows that iPhone 8 & iPhone X appear on the market. A feature called FaceID draws my attention. It's really a revolution of recognition and a new way to unlock and authenticate. Like Apple says, "Your face is now your password…
This article is available in Serbo-Croatian,  Japanese and German. (Translations in Serbo-Croatian by Jovana Milutinovich, Japanese by @noradaiko and German by Jonas Pencke (@jonaspencke).) Translations in other languages are welcome! How awesome wou…
Thanks for joining me for the second part of this two-part series on crash reporting services! The first part introduced you to the architecture of crash reporting services, including storage, symbolication, and server-side management. As well, I pro…
Believe it or not, developers are not perfect, and every once in a while you might have a (gasp!) bug in your app. You will try your best to ship your apps with no bugs in them, but more often than not you realise afterwards that a bug has slipped th…
Source: Connected Brain Figure above: Bullmore E, Sporns O. Complex brain networks: graph theoretical analysis of structural and functional systems.[J]. Nature Reviews Neuroscience, 2009, 10(3):186-198. Graph measures A graph G consisting of a set of…
Query #13 SQL Server Error Log(FC) -- Shows you where the SQL Server failover cluster diagnostic log is located and how it is configured SELECT is_enabled, [path], max_size, max_files FROM sys.dm_os_server_diagnostics_log_configurations WITH (NOLOCK)…
Description Meanwhile, the kingdom of K is getting ready for the marriage of the King's daughter. However, in order not to lose face in front of the relatives, the King should first finish reforms in his kingdom. As the King can not wait for his daug…
Introduction In the software development life cycle, testing and defect fixing take more time than actually code writing. In general, debugging is a process of finding out defects in the program and fixing them. Defect fixing comes after the debuggin…
Sound card based RFID sniffer/emulator (Too tired after recon.cx to do draw the schematics better than that :) Stay tuned for the next version including Tag emulation.) baudline FFT signal analyzer for sniffing LF RFID tags using our sound card based…
来自:http://www.jesperdj.com/2016/01/08/scala-access-modifiers-and-qualifiers-in-detail/ Just like Java and other object-oriented programming languages, Scala has access modifiers to restrict access to members of classes, traits, objects and packages.…