- AppCmd.exe
- AutoHotkey
- Availability heuristic
- What is the availability heuristic? The availability heuristic (or availability bias) is a type of cognitive bias that helps us make fast, but sometimes incorrect, assessments. It involves relying on information that comes to mind quickly or is most available to us.
- Bandizip
- Bookmarklets
- Brackets
- bzip2
- Compressing directory with bzip2
- create a tar archive, then bzip2 compress the archive:
tar -cf file.tar dir && bzip2 file.tar
- or do this in one step:
tar -cjf file.tar.bz2 dir
- Compressing directory with bzip2
- Breadcrumbs In Web Design: Examples And Best Practices
- Cross-Site Request Forgery
- Command
- C#
- C# documentation
- CSS
- Database
- [Day 17] Database Transaction & ACID - (2)
- Atomicity - each statement in a transaction (to read, write, update or delete data) is treated as a single unit. Either the entire statement is executed, or none of it is executed. This property prevents data loss and corruption from occurring if, for example, if your streaming data source fails mid-stream.
- Consistency - ensures that transactions only make changes to tables in predefined, predictable ways. Transactional consistency ensures that corruption or errors in your data do not create unintended consequences for the integrity of your table.
- Isolation - when multiple users are reading and writing from the same table all at once, isolation of their transactions ensures that the concurrent transactions don't interfere with or affect one another. Each request can occur as though they were occurring one by one, even though they're actually occurring simultaneously.
- Durability - ensures that changes to your data made by successfully executed transactions will be saved, even in the event of system failure.
- [Day 18] Transaction 併發錯誤與隔離層級 - (1)
- Dirty Read A dirty read occurs when a transaction reads data that has not yet been committed.
- Non-repeatable Read A nonrepeatable read occurs when a transaction reads the same row twice but gets different data each time.
- Phantom Read A phantom is a row that matches the search criteria but is not initially seen.
- [Day 19] Transaction 併發錯誤與隔離層級 - (2)
- Read Uncommitted – In this level, one transaction may read not yet committed changes made by other transactions, thereby allowing dirty reads. At this level, transactions are not isolated from each other.
- Read Committed – This isolation level guarantees that any data read is committed at the moment it is read. Thus it does not allow dirty read. The transaction holds a read or write lock on the current row, and thus prevents other transactions from reading, updating, or deleting it.
- Repeatable Read – This is the most restrictive isolation level. The transaction holds read locks on all rows it references and writes locks on referenced rows for update and delete actions. Since other transactions cannot read, update or delete these rows, consequently it avoids non-repeatable read.
- Serizable – This is the highest isolation level. A serializable execution is guaranteed to be serializable. Serializable execution is defined to be an execution of operations in which concurrently executing transactions appears to be serially executing.
- [Day 17] Database Transaction & ACID - (2)
- DBeaver 介面語言
- What is DBF File Extension? How to Open DBF?
- Decorator Design Pattern
- Design Pattern
- .Net
- DNS
- Docker
- Run CentOS 8 in a docker container
$docker pull centos:centos8 $docker run -it --name centos8server centos:centos8 /bin/bash
$docker exec -it centos8server /bin/bash
- Container 應用
- Run CentOS 8 in a docker container
- egrep
- Flyweight Design Pattern
- ffmpeg
# convert from 10s with duration 5s to gif $ ffmpeg -i input.mp4 -c:v gif -f gif -ss 00:00:10 -t 5 output.gif
- Golang
- grep
- git
- Hamming Code
- [jabba] (https://github.com/shyiko/jabba#usage)
- Java
- Lombok
- JVM (Java Virtual Machine) Architecture
- jq
- Javascript
- Proxy
- 8 ways to use the Spread operator in JavaScript.
- JavaScript Anonymous Functions
- 淺談 JavaScript 頭號難題 this:絕對不完整,但保證好懂
- Chain of Responsibility in JavaScript
- Object.freeze() vs Object.seal() vs Object.preventExtensions()
- 重新認識 JavaScript: Day 14 事件機制的原理
- 重新認識 JavaScript: Day 15 隱藏在 "事件" 之中的秘密
- 另外值得一提的是,很多人會在 jQuery 的 event handler 最後加上 return false 來得到 preventDefault() 與 stopPropagation() 的效果,這是沒問題的。但是在 JavaScript 的 addEventListener() 裡,最後面加上 return false 並不會有上述的的作用,只有在 onclick="return false" 的情況下會有作用。
- Lazy Quantifier
- Linux
- Command
- Merge Sort
- Middleware
- Multimedia Messaging Service(MMS)
- MySQL
- Object Pool
- Observer
- Prototype
- Python
- QR Code
- Quick Sort
- Quotes
- Coding like poetry should be short and concise. ― Santosh Kalwar
- Singleton
- SOLID Design Principles
- Open-Closed principle
- SQL
- SQL Server
- Clustered and nonclustered indexes described
- SELECT - HAVING (Transact-SQL)
- CREATE TABLE (Transact-SQL) IDENTITY (Property)
- SQL Server Table Variable Example
- Docker Express: Running a Local SQL Server on Your M1 Mac
$ docker run -e "ACCEPT_EULA=1" -e "MSSQL_SA_PASSWORD=MyPass@word" -e "MSSQL_PID=Developer" -e "MSSQL_USER=SA" -d -v $(pwd)/files:/home/mssql/files --name=mssql -p 1433:1433 mcr.microsoft.com/azure-sql-edge $ docker exec -it mssql bash
- SELECT
- Svelte
- Tmux
- TSQL
- Concate rows
DECLARE @t table
(
Id int,
Name varchar(10)
)
INSERT INTO @t
SELECT 1,'a' UNION ALL
SELECT 1,'b' UNION ALL
SELECT 2,'c' UNION ALL
SELECT 2,'d'
SELECT ID,
stuff(
(
SELECT ','+ [Name] FROM @t WHERE Id = t.Id FOR XML PATH('')
),1,1,'')
FROM (SELECT DISTINCT ID FROM @t ) t
- Vim
- Vim Cheat Sheet
- Insert space with single keystroke
- Vim has a Terminal Mode!
nnoremap <space> i<space><esc>
- Vue.js
- Quick Start
- Web3
- Windows
- xargs
- 12 Practical Examples of Linux Xargs Command for Beginners
- xargs: illegal option -- d
echo '11@22@33' | xargs -d '@' echo
echo '11@22@33' | tr '@' '\0' | xargs -0 echo # MacOS
- Y2K bug
- youtube-dl
- YAML 1.2