SEARCH KEYWORD -- DATA ENGINEERING
The Pitfall of WebSocket Disconnections Caused by Browser Power-Saving Mechanisms
Preface Recently, while using WebSocket (WS) connections, we encountered frequent disconnection issues, occurring hundreds of times per day for a single user. Although using the auto-reconnect feature of socket.io allowed us to quickly restore connections after disconnections, it did not guarantee that every reconnection would successfully receive WS messages. Therefore, we conducted several investigations and tests. Ultimately, we identified the root cause of the issue: the browser's power-savi...
WEBSOCKET,JAVASCRIPT,POWER SAVING,TROUBLESHOOTING 2024-06-23 01:19:39
How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
According to statistics, the average cost of a data breach reached $4.88 million in 2024, marking the highest recorded average to date. Moreover, 68 percent of data breaches in 2024 involved a human element. Cyber-attacks are no longer rare events—they’re an everyday risk for businesses. When a business isn’t prepared, even a minor attack can lead to costly downtime, disrupt operations, and harm its reputation. The good news is that businesses can reduce these impacts with pro...
CYBER SECURITY ,CYBER ATTACK 2024-11-14 02:38:42
How to Find User Participants To Test Your Project
Image Source: Unsplash Recruiting the right participants is important to test your projects properly, but it's essential that your research participants are able to represent your target group, or the results won't translate into something you can use. Since recruiting for specific criteria can be time-consuming, follow these considerations that should make getting these types of user participants easier. Sharply Define Recruitment Topic Criteria There needs to be a required criteria befo...
USER RESEARCH,USER REQUIREMENT,TESTING 2020-08-26 07:53:28
Dates in PHP and MySQL
I see a lot of people on forums and on my training courses asking about the best way (or any way) to manage dates stored in a MySQL database and used in PHP. Three options follow, but first the problem.PHP uses unix timestamps for all its date functionality. It has methods to convert these timestamps into pretty much any text format you could want but internally it uses the timestamp format. A timestamp is simply an integer. Specifically, it’s the number of seconds that have ela...
PHP,MySQL,Date format,Date,Comparison,Date compare 2011-10-17 14:00:57
GoLang Interview Questions
Below lists some frequently asked GoLang interview questions and their corresponding answers based on the author's experience. The list is updated frequently with new understandings. Stay tuned. What is the GMP model of GoLang? GoLang uses goroutine to achieve concurrency and it is famous for high concurrency support as the language defines its own goroutine dispatching and processing system which is well known as GMP model. How it works is that M is normally defined as the OS thread being spawn...
MEMORY,CONCURRENCY,INTERVIEW QUESTION,GOLANG 2024-05-25 03:08:18
iPhone App Development: What’s New For Developers In iOS 11
A curiosity ends with the introduction of iOS 11 on 5th of June 2017. It is the next-generation version of iOS. This update takes the best and most advanced operating system and turns it up to 11. But with iOS 11 was released to the public on 19 September 2017 and since then, there have been two distinct updates to iOS 11.02 which fixed the earpiece noise during phone calls; and the major iOS 11.1. iOS 10 was an operating system update that largely ignored the iPad, but Apple made up for it in ...
Android Security
Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an alternative to Apple’s iOS, is now slowly eating into the market share of Apple and is of primary concern to the company. Let’s have a brief introduction about android and then look into the security concerns and vulnerabilities that need to be focused on. Android Introduction: Android was deve...
Android security,Input validation 2013-04-16 12:19:37
A HTTPS client and HTTPS server demo in Java
In this post, I will create a HTTPS server and HTTPS client demo which can establish HTTPS communication between a server and a client using Java. This should be very useful when we want to test our understanding about SSL communication. We will use both a detailed SSL client and a simple HttpsURLConnection as the HTTPS client. Before creating the actual HTTPS server and HTTPS client, we first need to generate the keystore and truststore to be used by the server and client. To generate the keyst...
How Serious Is Facebook About Search?
An article in BusinessWeek suggests that Facebook is planning a deeper push into search. Will that be limited to improving search for the site — or will it be something more comprehensive? It’s clear that Facebook needs better internal search. Right now the search function at the top of the page is not very useful. Improving Facebook site search seems to be the first objective of an internal team, led by former Googler Lars Rasmussen, according to BusinessWeek; Searching...
Facebook,Search,Internal search 2012-03-31 03:31:12
Change password of postgres account in Postgres
When installing Postgres on Windows, there is some default account created for user to login. One of them is postgres, but we often don;t know what's the password for this account when we first login using this account. We need to change the password for this account. How to change it? Step 1. Modify the pg_hba.conffile Go to the /data/ and open the pg_hba.conf. # TYPE DATABASE USER ...
Postgres,password, user account 2013-03-04 01:51:02
RECENT
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- more>>