SEARCH KEYWORD -- Must read



  What and what not to log while debugging

Log is a critical part of an application. It serves as an eye to the programmer on how the application is working while debugging. Especially for applications running on production environment, if the application encounters problem and the problem cannot be reproduced on other environments, log will be extremely useful. While log is essential, but developers have to log smartly. Because if don't put log smartly, you may not get what you want while debugging or you may get too many...

   PROGRAMMING,DEBUG,LOG,SUPPORT     2016-03-14 08:09:03

  Will Google+ be a "Ghost City"

Just now, I read an article about Google+’s status quo. The key point of this article is that it states that Google+ is now a “Ghost City”. According to the article, users of Google+ spend only 3 minutes per month on Google+, this is a very low participation rate for a social network website. After reading this, I wonder whether Google+ is really a Ghost City now, I cannot give my answer. Since it was released just around 8 months ago, so the user base is not very large. ...

   Google+,Social fayigue,User base,Ghost City     2012-02-28 09:44:39

  Alibaba subreddit has been banned from Reddit

The subreddit of Alibaba, the biggest e-commerce giant in China, has been banned from Reddit.The reason given is that this community has violated the Reddit rules. But no details about what rules are violated given by Reddit. If we now try to access https://www.reddit.com/r/alibaba, we will see below page. From the page, it says this subrredit has been banned 6 months ago. It's unknown whether this subreddit was created by Alibaba Group or by some other people. And it's unclear w...

   CHINA,ALIBABA,REDDIT     2015-09-28 03:20:12

  How does JGSS read Windows native TGT credential?

MS LSA is a protected subsystem that authenticates and logs users onto the local system. The user credential is stored at the native credential cache of LSA on Windows. This kind of credential is often used to authenticate the user to the server, one of the authentication methods is Kerberos. JGSS has provided a native interface which can read the native TGT credential and use it to get the TGS of a service. But how does JGSS read the native TGT credential? Here is a sample code for reading nati...

   KERBEROS,JGSS,MS LSA,NATIVE CREDENTIAL,TGT,SESSION KEY TYPE     2015-03-25 03:42:32

  Create temp file in Bash using mktemp and trap

When working on Linux Bash, sometimes there is need to create temporary file. A common way of creating temp file on Linux is creating some file in /tmp directory. However there is security risk when creating temp file in /tmp directory. This post will show how to securely create temp file in Linux Bash. When creating file in /tmp directory, there are some security risks. This directory can be accessed by any user on the system, any user can write data into this directory as well. The files creat...

   LINUX,MKTEMP,TRAP,TEMP FILE     2019-12-30 23:28:23

  Engineer mindset in internet companies

This post tries to list down how we keep engineer mindset while doing development work. We engineers are the ones deliver the actual product by writing each and every line of the code, in order to deliver high quality and less buggy code, we should keep reminding ourselves what needs to be paid attention to during our daily development work.  So what is engineer mindset? Engineer mindset is that we should keep in mind that each and every line of code we write should serve the purpose well a...

   ENGINEER MINDSET,INTERNET COMPANY     2021-10-07 04:09:08

  Format JSON data on Ubuntu

JSON now becomes a very popular data format because of its simplicity and light-weight. Nowadays many RESTful APIs will offer a choice of exchanging JSON data between the server and client. Sometimes the data may not be formatted and it cannot be easily read by human beings. It's frequently desired that the unformatted JSON data should be formatted before read. Today we will show a few ways to format JSON data on Ubuntu. Assume we have a json file test.json with below content. { "title": "Test"...

   RUBY,PYTHON,NODEJS,JSON,JQ,PERL,LINUX,UBUNTU,YAJL     2016-08-17 11:05:09

  Nielsen : Google ranks No.1 web brand

Nielsen released the 2012 digital industry rankings report, The report said Google continued to rank No.1. for web brand From January 2012 to October 2012, the average monthly unique visitors reached 172 million. Followed by Facebook which has 153 million average monthly unique visitors. In 2012, the online video service continues to grow, YouTube is still the largest online video site, an average annual 132 million unique visitors. Top 10 U.S. Web Brands of 2012 For the details of other ranks ...

   Nielsen, Web brand,2012     2012-12-22 10:02:05

  Access control in Java -- doPrivileged

Previously we have introduced how Java performs permission check to protect resource access. What if sometimes we need to give some class the temporary access to some resource which it initially doesn't have? AccessController provides six doPrivileged methods to fulfill this requirement. These six methods have below signatures : static T doPrivileged(PrivilegedAction action)static T doPrivileged(PrivilegedAction action, AccessControlContext context)static T doPrivileged(PrivilegedExceptionA...

   JAVA,SECURITY,DOPRIVILEGED     2016-03-08 05:46:42

  Google releases Analytics real time API

According to Tech Crunch, Google finally released its Analytics real time API. Although this feature was launched two years ago, there was no convenient way for webmasters to adjust the data so that they can be viewed properly. Now developers can use the API to get what they want and utilize these data to do what they want to. Developers need to apply for using the API now. Once you get access to this API, then you can search your own real time data and utilize these data as you want to. For ex...

   Google Analytics,API,Real time     2013-08-02 00:05:56