UFC录像两段
作为外行看到的技术
肘击
用肘夹住对方的头,膝盖顶头
击打对方关或颈部,目的似乎是使颈部受力,而失去平衡
用腿夹住对方的腰,使自己在地面时保持住,或使自己控制地面的对方
力量很重要,速度和耐力也很重要。
Author: 杨 贵福
MIT开放课程 Structure and Interpretation of Computer Programs video下载
MIT开放课程 Structure and Interpretation of Computer Programs video下载:
教材Structure And Interpretation Of Computer Programs - Mit Press,
使用Scheme语言
有免费工具MIT Scheme,
在[ http://ocw.mit.edu/OcwWeb/Electrical-Engineering-and-Computer-Science/6-001Spring-2005/Tools/detail/Guide-to-MIT-Scheme.htm],
支持Windows和Linux。
视频下载:
1.flash或mp4
MIT OCW - 6.001 Structure and Interpretation of Computer Programs (1986)
[http://www.archive.org/details/MIT_Structure_of_Computer_Programs_1986]
或
[ http://ia350602.us.archive.org/3/items/MIT_Structure_of_Computer_Programs_1986/]
2.avi(Divx)或mpg, bit torrent supported
[http://swiss.csail.mit.edu/classes/6.001/abelson-sussman-lectures/ ]
感谢刘典先生推荐[Structure And Interpretation Of Computer Programs - Mit Press],
他告诉我这本书能帮助确定"机制与策略"的分离。
感谢李粲先生同意刘典先生推荐这本书,李粲先生与刘典先生一同指出《Unix程序设计艺术》中的"机制与策略"正符合我所说的原则。
感谢不记得什么时间谁请的烤牛肉,它让我们的交流很畅快。
We Live in a Time Division Universe(转载)
[http://www.quantummotion.org/index.html]
我正在读的:
Everyone Can Understand Quantum Mechanics: Motion is random and discontinuous
We Live in a Time Division Universe
The deepest implication of random discontinuous motion lies in that it entangles the world into an inseparable whole in a form of time division. Our universe is time-divided by God in a completely random way. Everything, from atoms to stars, lives in the time division universe. It looks as if the whole world is composed of many sub-worlds, each one of which occupies one tiny part of the continuous time flow, and the occupying way is discontinuous and random in essence. Schrodinger's cat in the time division universe No doubt the new picture will lead to a profound shift in our world view. It implies that our universe is not a mere aggregate of independent existences, but an entangled inseparable whole in the time division form. We live in a time division universe in reality. More »
Total Commander - Addons分类
Total Commander - Addons:
"Plugins
Packer plugins
Packer plugins offer additional pack formats inside of Total Commander, or allow access to special file formats like CD-ROM images, or list files.
File system plugins
File system plugins allow access to whole file systems via the Network Neighborhood, e.g. to a PocketPC device or a Linux file partition.
Lister Plugins
Lister-Plugins allow to show specific file types via F3, e.g. program code with syntax highlighting.
Content Plugins
Content plugins allow to extract specific data from files, like mp3 tags or photo information (e.g. exposure time). This data can be displayed in file lists, or used in the search and multi-rename functions."
对面向对象设计原则的总结(转载)
[http://dev.csdn.net/author/hotmailmsn/67b483ad2819482682f1cd2f542bcd67.html#]
对面向对象设计原则的总结 - 其他 - CSDN技术中心
Coding Horror: Maximizing The Value of Your Keystrokes
[http://www.codinghorror.com/blog/archives/000854.html]
Coding Horror: Maximizing The Value of Your Keystrokes
May 03, 2007
Maximizing The Value of Your Keystrokes
I met Jon Udell this year at MIX. I was reading through his excellent blog to flesh out some of the topics we talked about, when I was struck by the powerful message of this particular entry:When people tell me they're too busy to blog, I ask them to count up their output of keystrokes. How many of those keystrokes flow into email messages? Most. How many people receive those email messages? Few. How many people could usefully benefit from those messages, now or later? More than a few, maybe a lot more. From this perspective, blogging is a communication pattern that optimizes for the amount of awareness and influence that each keystroke can possibly yield. Some topics, of course, are necessarily private and interpersonal. But a surprising amount of business communication is potentially broader in scope. If your choice is to invest keystrokes in an email to three people, or in a blog entry that could be read by those same three people plus more -- maybe many more -- why not choose the latter? Why not make each keystroke work as hard as it can? [converting an email to a blog entry] can have powerful network effects. To exploit them, you have to realize that the delivery of a message, and the notification of delivery, do not necessarily coincide. Most of the time, in email, they do. The message is both notification and payload. But a message can also notify and point to a payload which is available to the recipient but also to other people and processes in other contexts. That arrangement costs hardly any extra keystrokes, and hardly any extra time. But it's an optimization that can radically expand influence and awareness.
I covered similar ground in When In Doubt, Make It Public, but Jon's entry is even more compelling. It's a specific example of how you can adapt your behavior to have a much broader impact. What Jon's describing happens to me all the time. I'll be in the middle of composing an email when I suddenly realize that there's no reason to silo this information in a private email exchange. I convert that email into a blog entry. Now, anyone who is interested in the topic can find it and have a public conversation with me-- and everyone else-- about it. The next time you find yourself typing more than a few sentences on your keyboard, stop and ask: are you maximizing the value of your keystrokes?
Coding Horror: When In Doubt, Make It Public
[http://www.codinghorror.com/blog/archives/000840.html]
Coding Horror: When In Doubt, Make It Public
When In Doubt, Make It Public
Marc Hedlund offered some unique advice to web entrepreneurs last month:
One of my favorite business model suggestions for [web] entrepreneurs is to find an old UNIX command that hasn't yet been implemented on the web, and fix that.
To illustrate, Marc provides a list of UNIX commands with their corresponding web implementations:
talk, finger | ICQ |
LISTSERV | DejaNews |
ls | Yahoo! directory |
find, grep | |
rn | Bloglines |
pine | Google Mail |
mount | Amazon S3 |
bash | Yahoo! Pipes |
wall |
Jason Kottke noted that most successful "new" business models on the web aren't new at all -- they're simply taking what was once private and making it public and permanent :
Blogger = public email messages. (1999) Instead of "Dear Bob, Check out this movie." it's "Dear People I May or May Not Know Who Are Interested in Film Noir, check out this movie. If you like it, maybe we can be friends." Flickr = public photo sharing. (2004) Flickr co-founder Caterina Fake said in a recent interview: "When we started the company, there were dozens of other photosharing companies such as Shutterfly, but on those sites there was no such thing as a public photograph -- it didn't even exist as a concept -- so the idea of something 'public' changed the whole idea of Flickr." YouTube = public home videos. (2005) Bob Saget was onto something. Twitter = public IM. (2006) I don't think it's any coincidence that one of the people responsible for Blogger is also responsible for Twitter.
But you don't have to found a new Web 2.0 company to benefit from the power of public information. Even brick and mortar companies are finally realizing that the age-old principle of "secret by default" may not be the best policy today :
Companies used to assume that details about their internal workings were valuable precisely because they were secret. If you were cagey about your plans, you had the upper hand; if you kept your next big idea to yourself, people couldn't steal it. Now, billion- dollar ideas come to CEOs who give them away; corporations that publicize their failings grow stronger. Power comes not from your Rolodex but from how many bloggers link to you - and everyone trembles before search engine rankings.
Power, it seems, comes from public information. Secrets are only a source of powerlessness. Just ask Brad Abrams, who poses this rhetorical question :
If no one knows you did X, did you really get all the benefits for doing X?
I think Brad is being a bit too cautious here. I'll go one step further. Until you've..
- Written a blog entry about X
- Posted Flickr photos of X
- Uploaded a video of X to YouTube
- Typed a Twitter message about X
.. did X really happen at all? This is not to say we should fill the world with noise on every mundane aspect of our existence. But who decides what is mundane? Who decides what is interesting? Everything's interesting to someone, even if that someone is only you and a few other people in the world. It's my firm belief that the inclusionists are winning. We live in a world of infinitely searchable micro-content, and every contribution, however small, enriches all of us. But more selfishly, if you're interested in deriving maximum benefit from your work, there's no substitute for making it public and findable. Obscurity sucks. But obscurity by choice is irrational. When in doubt, make it public.
How To Make a Plastic Bag Keeper
[http://www.curbly.com/DIY-Maven/posts/1315-How-To-Make-a-Plastic-Bag-Keeper]
How To Make a Plastic Bag Keeper
In an effort to reduce and reuse plastic bags, how about making a plastic bag keeper? Chances are you already have everything you need to make one for free. Or you can buy one at The Container Store for 4.99 plus 6.50 s & h. Your choice.The Props A 2 quart plastic bottle (I used a Juicy Juice bottle, which worked particularly well.)Box cutter and/or scissorsSharpieDurable tape Excess plastic bagsThe Procedure Mark your bottle on top and bottom as shown. Use box cutter to punch hole in marked areas and then switch to the scissors to cut out openings. (Using a scissors will greatly reduce the odds of cutting off one of your fingers.)Apply tape around openings, if plastic edges are sharp. Punch or drill a hole in the bottle's cap and add twine to hang, if desired. As you get them, shove bags in the top hole; as you need them, pull them out of the bottom hole. (I fit 15 medium-sized bags in my bottle.) Having the plastic bags at hand–my keeper will be hanging by my back door–should encourage reusing them. Plus, they look a lot neater packed in that bottle.
不使用backtick处理参数
backtick, the grave accent ( ` ) is a diacritic mark [wikipeida]。
如果使用backtick,那么在unix shell中,可以方便地用'cat ini_file.ini'把配置文件中的内容取出,对于配置文件只有一行的情况。如果配置文件有多行,也可以使用shell工具取出某行的数据。
放弃backtick方案。 仍使用GUI部分从配置文件读入参数,再作为批处理的命令行参数。配置文件准备使用多个,每个参数一个文件,方便使用fstream读入,避免使用windows api。
放弃backtick方案的原因如下。
需要重写所用已用批处理实现的场景 ;
已经与袁福宇一起测试了可行性。
1.在shell中的使用方法。不是原文引用,可能有错。
>test.exe -para `cat device_name.txt`
等同于执行
>test.exe -para .EmeterDevice0
其中,'.EmeterDevice0'是device_name.txt的内容。
需要注意当前目录、配置文件目录。
2.在shell之外,由GUI调用的方法。
----引用开始
d:msys1.0bin>sh
sh-2.04$ exit
exit
d:msys1.0bin>sh test.sh
ok
d:msys1.0bin>cat test.sh
echo ok
d:msys1.0bin>
----引用结束
备忘,免得哪天又把这个方案想起来,然后再花上大半天否定它。