SEARCH KEYWORD -- DATA ENGINEERING
JavaScript cross domain request solution
1. What is cross domain? We may often using AJAX to request data from other domain, now we will have cross domain request issues. It's because JavaScript only allows to request data from the same domain because of security consideration. In short, same domain strategy means a piece of code can read data from the same source, the same source here means the combination of the same domain, protocol and port number. For example: URLDescriptionAllow communication? http://www.a.com/a.js http:/...
AJAX,cross domain,security 2013-03-13 20:04:52
Will IBM fall?
IBM has over 100 year's history and it faced many tough challenges along the way but every time it came back successfully. This time its revenue dropped 6 quarters consecutively, with the popularity of cloud computing and big data, IBM seems lag behind and is heavily hit by the storm. Its current technologies are only suitable for serving traditional companies 15 years ago but not companies now. Can IBM go though this challenge and come back again? It seems IBM doesn't want to be left out. Th...
IBM,transformation,Watson 2014-01-27 08:01:41
Browser market share in June
Recently, the Internet research firm Net Application announced the browser market share report in June, IE's global market share grows to 56.15% in June from 55.99% in May, an increase of 0.16%. However, Firefox drops by 1.48%, its market share is 19.15% in May. Chrome grow by 1.43% to 17.17% in June. Meanwhile, Safari increases by 0.09% to 5.55%, Opera drops 0.19% to 1.58%. For different versions of IE browsers, IE10's global market share is 13.52%, monthly market share increases by 4.26% in J...
Browser market share,June 2013,Chrome 2013-07-02 03:20:08
How to Encrypt Your Online Conversations
Do you ever get the feeling that somebody might be listening to or reading your private conversations? You're not crazy. Online platforms don’t hide that they use data from chats, searches, emails, and other places for targeted advertisements. Aside from being a massive invasion of privacy, it also puts your security at risk. But it is possible to prevent people from snooping on you. All you need is a little encryption. Check out these different ways you can add encryption into...
DATA SECURITY,VPN 2020-01-30 07:33:29
Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java
Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...
JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION 2023-04-28 21:22:10
Call of Duty Elite Has Amazing Security
I had tried to register for Elite yesterday, and the servers were being funny, so I wasn't sure if I'd registered. I just now tried to reset my password, and I got the following:Hello JoshForgot your password? These things happen. Access your account with the password below:{Actual Unencrypted Password}Really? They're storing hundreds of thousands of passwords in plain text??EDIT: Not sure what the downvotes are for, surely it's not because huge companies like Steam and Sony never get hacked, an...
Game,Elite,Call of duty,Defect 2011-11-15 12:42:50
How Cloud Computing is changing the Face of Business
The world of information is getting bigger and bigger and so does the need for cloud computing is felt broadly across various industries and platforms. The ever growing popularity and adoption are due to the fact that cloud computing is efficient, reliable and secure than any other business model. However, the way cloud computing is adopted across different enterprises may vary. How cloud computing has been adopted worldwide by companies- let us have a look at few statistics that would blow you...
CLOUD COMPUTING,SOFTWARE DEVELOPMENT,CLOUD SERVICES,CLOUD SOLUTION,SOFTWARE SOLUTIONS 2017-08-22 02:49:53
Mock Solutions for GoLang Unit Test
In Go development, Unit Test is inevitable. And it is essential to use Mock when writing Unit Tests. Mock can help test isolate the business logic it depends on, enabling it to compile, link, and run independently. Mock needs Stub. Stub function replaces the real business logic function, returns the required result, and assists the test. I involved the related test code for Controllers while writing Kubernetes Operator recently, and there would be mocks for GRPC and HT...
Understanding PGO in GoLang 1.20
Background The Go 1.20 version was officially released in February 2023, it introduced the PGO(Profile Guided Optimization) mechanism. The basic principle of PGO can be divided into the following two steps: First, profiling is performed on the program to collect data about the program's runtime and generate a profiling file. When compiling the program, enable the PGO option, and the compiler will optimize the program's performance based on the content in the .pgo file. When compiling a program...
CSS DIV position analysis
When using CSS to set the position of DIV, we may often get confused with the 4 position properties : static, relative, absolute and fixed. If we don't understand them correctly, we may often get unexpected result. Here we make some analysis to them.The definitions of these 4 properties:static : The default position property. It has no position actually. The element will appear where it should be (top, bottom, left, right or z-index has no use here)relative : This one will position relati...
RECENT
- The Ultimate Guide to Implement Function Overloading in Python
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- more>>