# 添加删除.svn,cvs右键菜单的注册表 以及解锁问题

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shell\DeleteCVS]
@="Delete CVS Folders"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shell\DeleteCVS\command]
@="cmd.exe /c \"TITLE Removing CVS Folders in %1 && COLOR 9A && FOR /r \"%1\" %%f IN (CVS) DO RD /s /q \"%%f\" \""

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shell\DeleteSVN]
@="Delete SVN Folders"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shell\DeleteSVN\command]
@="cmd.exe /c \"TITLE Removing SVN Folders in %1 && COLOR 9A && FOR /r \"%1\" %%f IN (.svn) DO RD /s /q \"%%f\" \""

cd 到svn项目目录下，然后执行如下命令
del lock /q/s

# xml带冒号属性怎么获取

dom4j 的el.attributeValue是无法取到名空间类型的属性，简单点说就是带冒号的属性。

<a xmlns="http://www.w3.org/xxx" xml:lang="en"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.w3.org/xxx http://www.w3.org/xxx.xsd" >

xmlns是名空间Element.getNamespaceURI()可以获得

xmlns:xsi   --> Element.getNamespaceForPrefix("xsi").getURI()

xsi:schemaLocation --> el.selectSingleNode("@xsi:schemaLocation").getText()

# maven 导致文件损坏的问题

1 ：gzip格式打包时被损坏:

2：编译时图片（主要是png图片）资源拷贝损坏：

microcomputer) or as much as $10 million (for a mainframe) and much more for supercomputer. Continue reading it-e-01 four kinds of computers # it-e-02 web harvesting As the amount of information on the Web grows, that information becomes ever harder to keep track of and use. Search engines are a big help, but they can do only part of the work, and they are hard-pressed to keep up with daily changes. Consider that even when you use a search engine to locate data, you still have to do the following tasks to capture the information you need: scan the content until you find the information, mark the information (usually by highlighting with a mouse), switch to another application ( such as a spreadsheet, database or word processor), paste the information into that application. A better solution, especially for companies that are aiming to exploit a broad swath of data about markets or competitors, lies with Web harvesting tools. Web harvesting software automatically extracts information from the Web and picks up where search engines leave off, doing the work the search engine can't. Extraction tools automate the reading, copying and pasting necessary to collect information for analysis, and they have proved useful for pulling together information on competitors, prices and financial data or all types. There are three ways we can extract more useful information from the Web. The first technique, Web content harvesting, is concerned directly with the specific content of documents or their descriptions, such as HTML files, images or e-mail messages. Since most text documents are relatively unstructured (at least as far as machine interpretation is concerned), one common approach is to exploit what's already known about the general structure of documents and map this to some data model. The other approach to Web content harvesting involves trying to improve on the content searches that tools like search engines perform. This type of content harvesting goes beyond keyword extraction and the production of simple statistics relating to words and phrases in documents. Another technique, Web structure harvesting, takes advantage of the fact that Web pages can reveal more information than just their obvious content. Links from other sources that point to a particular Web page indicate the popularity of that page, while links within a Web page that point to other resources may indicate the richness or variety of topics covered in that page. This is like analyzing bibliographical citations— paper that's often cited in bibliographies and other paper is usually considered to be important. The third technique, Web usage harvesting, uses data recorded by Web servers about user interactions to help understand user behavior and evaluate the effectiveness of the Web structure. General access—pattern tracking analyzes Web logs to understand access patterns and trends in order to identify structural issues and resource groupings. Customized usage tracking analyzes individual trends so that Web sites can be personalized to specific users. Over time, based on access patterns, a site can be dynamically customized for a user in terms of the information displayed , the depth of the site structure and the format of the resource presented. Continue reading it-e-02 web harvesting # 读The Definitive ANTLR Reference 没看的很明白，摸出来的。 lexer?parser?tree?token? token以大写字母开头，对应目标语言的静态字段。 rule以小写字母开头对应目标语言的实例方法。 token里面的连接表现和rule里面的连接表现是不一样的。 TOKEN: 'h' 'i' //匹配hi rule: 'h' 'i'//匹配h i,不匹配hi[中间有空格的区别] 子rule用()包含 action用{}包含，使用目标语言写 ANTLR中表示字符要用“’”单引号括起来，用‘(’ ‘)’来表示括号字符 channel: 解析的token放在不同的channel,由你来设定。 token序号是整体排序的 The token buffer preserves the relative token order regardless of the token channel numbers. skip()小心用。 WS : (' ' |'\t' |'\r' |'\n' )+ {skip();$channel=HIDDEN;} ; //这样将匹配丢到hidden chennel可行，那么不行需要再写其他的rule时总是要写WS匹配。例: WS?'hello' WS+ 'how' WS+ 'are' WS+ 'you' -->'hello' 'how' 'are' 'you'.

Method skip( ) in an embedded lexer rule action forces the lexer to throw
out the token and look for another.运行结果似乎是视而不见【抛弃】。

fragment

line 12:15 no viable alternative at input 'xxx'

12行15字碰到没有定义的输入xxx【定义中没有列举这样的输入情况】

1:对于无引号token不知如何识别，如果使用

TOKEN=CHAR+

rule = TOKEN+

2：对于递归语法不知如何识别，例如

[[...] [...]] 和 ((...) (...))

Continue reading 读The Definitive ANTLR Reference

# it-e-03 Computer hardware

Computer hardware has four parts: the central processing unit (CPU) and memory, storage
hardware, input hardware, and output hardware.
The part of the computer that runs the program is known as the processor or central processing
unit (CPU). In a microcomputer, the CPU is on a single electronic component, the microprocessor
chip, within the system unit or system cabinet. The CPU itself has two parts: the control unit and
the arithmetic-logic unit. In a microcomputer, these are both on the microcomputer chip.
The Control Unit The control unit tells the rest of the computer system how to carry out a
program's instructions. It directs the movement of electronic signals between memory and the
arithmetic-logic unit. It also directs these control signals between the CPU and input and output
devices.
The Arithmetic-Logic Unit The arithmetic-logic unit, usually called the ALU, performs
two types of operations—arithmetic and logical. Arithmetic operations are, as you might expect,
the fundamental math operations: addition, subtraction, multiplication, and division. Logical
operations consist of comparisons. That is , two pieces of data are compared to see whether one is
equal to, less than, or greater than the other.
Memory Memory is also known as primary storage, internal storage, it temporarily holds
data, program instructions, and information. One of the most important facts to know about
memory is that part of its content is held only temporarily. In other words, it is stored only as
long as the computer is turned on. When you turn the machine off, the content immediately
vanish. The stored contents in memory are volatile and can vanish very quickly.
Storage Hardware [1]The purpose of storage hardware is to provide a means of storing
computer instructions and data in a form that is relatively permanent, that is, the data is not lost
when the power is turned off—and easy to retrieve when needed for processing.There are four
kinds of storage hardware: floppy disks, hard disks,optical disk,andmagnetic tape.
Floppy Disks Floppy disks are also called diskettes, flexible disks, floppies, or simply

disks. The plastic disk inside the diskette cover is flexible, not rigid. They are flat, circular pieces
of mylar plastic that rotate within a jacket. Data and programs are stored as electromagnetic
charges on a metal oxide film coating the mylar plastic.
Hard Disks Hard disks consist of metallic rather than plastic platters. They are tightly
sealed to prevent any foreign matter from getting inside. Hard disks are extremely sensitive
instruments. The read-write head rides on a cushion of air about 0.000001 inch thick. It is so thin
that a smoke particle, fingerprint, dust, or human hair could cause what is known as a head crash.
A head crash happens when the surface of the read-write head or particles on its surface contact
the magnetic disk surface. A head crash is a disaster for a hard disk. It means that some or all of
the data on the disk is destroyed. Hard disks are assembled under sterile conditions and sealed
from impurities within their permanent containers.
Optical Disks Optical disks are used for storing great quantities of data. An optical disk can
hold 650 megabytes of data—the equivalent of hundreds of floppy disks. Moreover, an optical disk
makes an immense amount of information available on a microcomputer. In optical-disk technology,
a laser beamalters the surface of a plastic or metallic disk to represent data. To read the data, a laser
scans these areas and sends the data to a computer chip for conversion.
Magnetic Tape Magnetic tape is an effective way of making a backup, or duplicate, copy of
your programs and data. We mentioned the alarming consequences that can happen if a hard disk
suffers a head crash. You will lose some or all of your data or programs. Of course, you can always
make copies of your hard-disk files on floppy disks. However, this can be time-consuming and may
require many floppy disks. Magnetic tape is sequential access storage and can solve the problem
mentioned above.
Input Hardware Input devices take data and programs people can read or understand and
convert them to a form the computer can process. This is the machine-readable electronic signals
of 0s and 1s. Input hardware is of two kinds: keyboard entry and direct entry.
Keyboard Entry Data is input to the computer through a keyboard that looks like a
typewriter keyboard but has additional keys. In this method, the user typically reads from an
original document called the source document. The user enters that document by typing on the
keyboard.
Direct Entry :Data is made into machine-readable form as it is entered into the computer,
no keyboard is used. Direct entry devices may be categorized into three areas: pointing devices
(for example, mouse, touch screen, light pen, digitizer are all pointing devices), scanning devices
(for example, image scanner, fax machine, bar-code reader are all scanning devices), and
voice-input devices.
form. Common output devices are monitors, printers, plotters, and voice output.
Monitors Monitors are also called display screen or video display terminals. Most monitors that
sit on desks are built in the same way as television sets, these are called cathode-ray tubes. Another type
of monitor is flat-panel display, including liquid-crystal display (LCD), electroluminescent (EL) display

and gas-plasma display. An LCD does not emit light of its own. Rather, it consists of crystal molecules.
[2]An electric field causes the molecules to line up in a way that alters their optical properties.
Unfortunately, many LCDs are difficult to read in sunlight or other strong light. A gas-plasma display is
the best type of flat screen. Like a neon light bulb, the plasma display uses a gas that emits light in the
presence of an electric current.
Printers There are four popular kinds of printers: dot-matrix, laser, ink-jet, and thermal.
Dot-Matrix Printer Dot-matrix printers can produce a page of text in less than 10 seconds
and are highly reliable. They form characters or images using a series of small pins on a print
head. The pins strike an inked ribbon and create an image on paper. Printers are available with
print heads of 9, 18, or 24 pins. One disadvantage of this type of printer is noise.
Laser Printer The laser printer creates dotlike images on a drum, using a laser beam light
source. [3]The characters are treated with a magnetically charged inklike toner and then are
transferred from drum to paper. A heat process is used to make the characters adhere. The laser
printer produces images with excellent letter and graphics quality.
Ink-Jet Printer An ink-jet printer sprays small droplets of ink at high speed onto the
surface of the paper. This process not only produces a letter-quality image but also permits
printing to be done in a variety of colors.
Thermal Printer A thermal printer uses heat elements to produce images on heat-sensitive
paper. Color thermal printers are not as popular because of their cost and the requirement of
specifically treated paper. They are a more special use printer that produces near photographic
output. They are widely used in professional art and design work where very high quality color is
essential.
Plotters Plotters are special-purpose output devices for producing bar charts, maps, architectural
drawings, and even three-dimensional illustrations. Plotters can produce high-quality multicolor
documents and also documents that are larger in size than most printers can handle. There are four types
of plotters: pen, ink-jet, electrostatic, and direct imaging.
Voice-Output Devices Voice-output devices make sounds that resemble human speech but
actually are pre-recorded vocalized sounds. Voice output is used as a reinforcement tool for
learning, such as to help students study a foreign language. It is used in many supermarkets at the
checkout counter to confirm purchases. Of course, one of the most powerful capabilities is to
assist the physically challenged.

# xshell配置导出备份

xshell配置文件可通过如下方式找到：

# skype4java :

skype4java 地址:

http://skype.sourceforge.jp/index.php?Skype%20API%20For%20Java%20%28English%29

Win32Connector::protected void initializeImpl() 方法有些问题，其意图是如果没又找到skype库就从包里面解压缩skype.dll到临时文件夹下，但是我不知道为什么作者要用zip遍历，而不是使用类加载器获得资源来解压缩。

try {
} catch(Throwable e) {
try {
if(!ConnectorUtils.checkLibraryInPath(LIBFILENAME)) {
String dllPath;
String tmpDir = System.getProperty("java.io.tmpdir");
if(!tmpDir.endsWith("" + File.separatorChar)) {
tmpDir = tmpDir + File.separatorChar;
}
dllPath = tmpDir + LIBFILENAME;
File dll = new File(dllPath);
if(!dll.exists()) {
extractDll(dll);
if(!dll.exists()) {
throw new RuntimeException("can't load " + dllPath);
}
}
}
} catch(Exception e1) {
throw new RuntimeException(e1);
}
}

private void extractDll(File destFile) {
FileOutputStream output = null;
try {
output = new FileOutputStream(destFile);
byte[] buffer = new byte[1024 * 4];
long count = 0;
int n = 0;
while(-1 != (n = input.read(buffer))) {
output.write(buffer, 0, n);
count += n;
}
} catch(Exception e) {
throw new RuntimeException(e);
} finally {
try {
if(null != input) {
input.close();
}
} catch(IOException e) {
}
try {
if(null != output) {
output.close();
}
} catch(IOException e) {
}
}
}

winp.jar 检查是否running

swt.jar 借用OS基础功能

# [转]未来五年可能流行的十大网络技术

10。IP语音

9。网络安全技术

8。IPv6

IPv6的CIDR使用了完全不同的地址符号，采用16进制代码代替了我们所熟悉的4个八位的10进制IPv4代码。对于IT管理员来讲，学习新的只是有些困难，但在转变全面来临之前，我们必须掌握IPv6技术。

7。虚拟化

6。SaaS（软件即服务）

5。支持移动用户

4。远程用户支持

3。无线技术

2。混合网络

1。统一通信

PS:

802.11b 2.4g频段 最大11m/s 一般6.5m/s。
wi-fi与802.11x不是一个概念，虽然有关联。

Powered by Hydejack v6.6.1