SEARCH KEYWORD -- Big Data Analytics Solutions



  How Query Optimizer Works in RDBMS

In a previous post, we discussed how the various relational operators are implemented in relational database systems. If you have read that post, you probably still remember that there are a few alternative implementations for every operator. Thus, how should RDBMS determine which algorithm (or implementation) to use? Obviously, to optimize the performance for any query, RDBMS has to select the correct the algorithm based on the query. It would not be desirable to always use the same algori...

   DATABASE,DATABASE DESIGN,DATABASE OPTIMIZATION     2019-04-20 07:26:32

  Different types of keystore in Java -- Windows-MY

Windows-MY is a type of keystore on Windows which is managed by the Windows operating system. It stores the user keys and certificates which can be used to perform cryptographic operations such as signature verification, data encryption etc. Since it's a kind of native keystore, Java doesn't have a general API to access it. To help Java applications access the keys and certificates stored in Windows-MY keystore, Java provides a separate API -- SunMSCAPI. The SunMSCAPI provider is ...

   JAVA,KEYSTORE,WINDOWS-MY,SUNMSCAPI     2016-01-09 05:45:59

  Landing page optimization : Less is more

There is a question on Quora : Why doesn't Quora show interesting questions/answers on their landing page? Why is it this? not this? Quora's product manage gives his answer to this question, it's agreed by many users in this community. Here is his answer: The logged out homepage is pretty sparse now mostly because it hasn't been given much treatment since the initial product launch. But we have plans on redesigning it and testing different variations (some with less info on the page, some with...

   Landing page,Optimization,Principle     2012-11-03 01:50:07

  What Makes A Successful Cryptocurrency?

The cryptocurrency landscape today is a little bit of a maze. There seem to be countless cryptos available — thousands of them, by some estimates — and unless you’re particularly well versed in this technology, it can be difficult to tell what differentiates them. To cut through some of the confusion, we decided to take a closer look at cryptocurrencies. We won’t simply list the most prominent ones, the way so many sites already have. Instead, we’re going to look i...

   BITCOIN,CRYPTOCURRENCY     2020-08-25 05:13:22

  MySQL Index Merge Optimization Practices

In production environment databases, it is often seen that some SQL where conditions include: equal condition on a normal index + primary key range query + order by limit Although using a normal index would be more efficient, the system chooses to use index merge instead in some cases. This article explores such index merge situations. Index Merge Official Introduction   The Index Merge access method retrieves rows with multiple range scans and merges their results into one. Generall...

   INDEX MERGE,MYSQL,PRIMARY INDEX,SECONDARY INDEX     2024-09-10 04:52:26

  Create cron job on CentOS

These two days, I am building a website and deploying it on a VPS server which uses CentOS 5. I don't have cPanel or Plesk for my account, so I need to install and configure everything myself including Apache, PHP, MySQL and FTP server, also today's topic cron job. Since my website has a ranking algorithm to calculate the rankings of each link and update the ranking on database and I need to calculate the rankings every 5 minutes, so I think to use cron jobs. Here are what I have done which may ...

   cron job,crontab,CentOS,linux,php,example     2012-06-11 09:23:45

  Top 10 Tell Tale Signs Your Computer Has a Virus

The true genius of the 'computer' is its ability to make human lives easier. This is only achieved from the ability of running software such as word processing, number crunching with Excel or learning from the worlds largest source of knowledge, via web browsers. Today being connected to the internet is fundamental to leading a productive modern life. While internet is a boon it comes with its own share of problems. As internet users increase so does the instance of com...

   COMPUTER VIRUS, INTERNET SECURITY, DATA SECURITY, ANTIVIRUS, COMPUTER REPAIR     2017-03-19 21:05:12

  Google's Business Operations in China Amid Antitrust Scrutiny

Google's journey in China has been complex, marked by strategic retreats and limited re-engagements. As of February 2025, while many of Google's consumer services remain inaccessible within mainland China, the company maintains a presence through specific business operations. However, Google's standing in China faces fresh challenges as the Chinese government recently launched an antitrust probe into the company's activities. This move comes amid rising tensions over trade and technology between...

   GOOGLE,BUSINESS,CHINA,ANTI-TRUST     2025-02-12 09:33:05

  2D Indoor CQB Robot Simulation

Program Design Purpose: The integration of robots in Close Quarters Battle (CQB) represents a significant advancement in modern military and law enforcement tactics. These robots, designed to navigate tight spaces, gather real-time intelligence, and engage threats, are invaluable assets in high-stakes scenarios. Our goal is to develop a 2D tactical board simulation system, similar to a computer game, that can load building floor blueprints, display CQB squad (robot) positions, enemy locations, ...

       2024-08-11 08:40:31

  Power Grid Simulation System 02 : FDI Power Outage Attack Case Study

We are excited to share that the Power Grid Simulation System we developed was used as part of one red team's targeted critical infrastructure system the international cyber exercise Crossed Swords 2024 which conducted in December 2024. In this article, we will introduce one power outage attack case study which use the Power Grid Simulation System as the demo platform for OT cyber security workshop. Project Design Purpose: This case study demonstrates using the Power Grid Simulation System as a...

       2025-01-11 07:35:45