SEARCH KEYWORD -- Strict mode. Introduction
Breakdown Kubernetes Container Runtime
Keeping on learning Kubernetes piece by piece and having a deeper understanding of its advantages, I am no longer shocked at its rapid development and popularity. Though backed by big companies like Google is undoubtedly the push, its design, features, and convenience are the biggest attraction. Most of all, it disintegrates the monolithic Internet system governance and lifecycle and offers a new management method. Kubernetes is a set of concepts, including various resource types like Pod, Deplo...
KUBERNETES,CONTAINER 2021-05-15 04:06:48
When and How to Use the Go Channel
Go’s concise structure and powerful native library enable us to hit the ground running easily. It is more efficient than Java or Python when implementing the same functions, especially its concurrent programming, which is very handy and widely admired due to its goroutine and channel. goroutine and channel has much to dig into, and let’s start with channel, which I used to consider narrowly as a message queue to transfer data between gorouti...
Cleansing data with Pig and storing JSON format to HBase with Pig UDF
Introduction This post will explain you the way to clean data and store JSON format to HBase. Hadoop architect experts also explain Apache Pig and its advantages in Hadoop in this post. Read more and find out how they do it. This post contains steps to do some basic clean the duplication data and convert the data to JSON format to store to HBase. Actually, we have some built-in lib to parse JSON in Pig but it is important to manipulate the JSON data in Java code before store to HBase. Apache Pig...
JSON,HADOOP ARCHITECT,APACHE HBASE,PIG UDF 2016-06-10 01:13:41
New Unreal Engine 5 and Nvidia Technology in Black Myth: Wukong
In this article, we explore the cutting-edge Unreal Engine 5 and Nvidia GPU technologies used in the highly anticipated AAA game Black Myth: Wukong this year to enhance its game graphical quality. Our insights are based on an interview article of the technical lead of Game Science Interactive Technology, Geekerwan's experimental analysis, and Nvidia's official Black Myth: Wukong showcase featuring the RTX 40xx series. As a software engineer, my perspective may differ from that of a game develop...
SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
Dashboard for Summarizing SG National Cyber Threats in Critical Infrastructure Program Design Purpose: The purpose of this program is to develop a comprehensive Angular web dashboard plugin for a Security Information and Event Management (SIEM) system, focusing on the effective monitoring, categorization, summarization, and visualization of cyber threat events targeting Singapore's critical infrastructure. This dashboard will provide researchers and security managers with a clear, concise view ...
SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
Project Design Purpose: In a Security Information and Event Management (SIEM) system, effective monitoring and visualization of scam events is crucial to detecting and responding to cyberattacks. Cybercriminals often use deceptive methods to exploit individuals or organizations, aiming to steal sensitive information, financial assets, or disrupt operations. This project seeks to develop a web plugin dashboard to help cybersecurity researchers and managers better understand the scope and impact ...
A walk through of different ways accessing Kubernetes application
When a web application is deployed on KUbernetes, to access the application, there must be some set up needs to be done so that external users can access the resource within the Kubernetes clusters. IN this post, we will walk through different ways to access application from outside. Before exploring different ways, let's set up a simple nginx eb application which will just serve the nginx welcome message when loading. # deployment.yaml apiVersion: apps/v1 kind: Deployment metadata: name: ngin...
KUBERNETES,PORT FORWARD,SERVICE,CLUSTERIP,NODEPORT,LOADBALANCER,INGRESS 2021-05-31 00:20:27
Why (offset, limit) is slow in database select?
Starting from a problem Five years ago when I was working at Tencent, I found that MySQL request speed was very slow in the pagination scenario. With only 100,000 data, a select query on a single machine took about 2-3 seconds. I asked my mentor why, and he asked in return, "In an indexing scenario, what is the time complexity to get the nth largest number in MySQL?" The pursuit of the answer Confirming the scenario Assuming there is an index on the "status" column, a query like "select * from t...
10 Best Android Apps of 2016
The year 2016 has been gone with all its good and bad memories. But in the field of information technology, this year was another boost in which the field rapidly grew and explores some more essentials for the ease of users. In the field of mobile apps, specially users of Android OS, the year 2016 was awesome because in this year, they got many useful apps created by the highly qualified app developers of the world.Experts of Android OS rounded up a lot of apps created in the year 2016 and they ...
MOBILE APP DEVELOPMENT COMPANY,CUSTOM MOBILE APP DEVELOPMENT COMPANY 2017-01-10 14:07:32
Your Ultimate Guide to Restoring Database Backups in SQL Server 2012
Summary: Let’s learn how to restore a SQL Server database backup for SQL Server 2012. There are various methods of taking database backups, which include using T-SQL code, SQL Server Management Studio, or third-party applications. These backups taken are purposely saved to be restored when the database becomes corrupt or crashes, migrating the database, making a copy of the database, and other business requirements. In this crash course, we will be focusing on how to restore SQL Server da...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>