SEARCH KEYWORD -- DATA ENGINEERING
Text editor vs IDE
A meaningless editor war Many people like to debate which editor is the best. The biggest controversy is between Emacs and vi. vi supporters like to say: "Look it's very fast to type in vi, our fingers no need to leave the keyboard, we even no need to use the up,down,left and right keys" Emacs supporters often downplayed this and said: "What's the use of typing fast if I just need to press one key and it equals to dozens keys you type in vi?"In fact, there is another group of people who like to ...
Editor,IDE,Structured editor,vi 2013-05-20 12:03:39
Google releases new app to improve the accuracy of indoor positioning
Google Maps, Bing Maps, and some map providers have offered indoor map service such as in the airport, major shopping malls and stadiums for some time. The problem is that these indoor maps can not precisely tell you which floor you are on a map, the GPS obviously can not work very well in this environment, WiFi and GPRS positioning is not very precise. Google announced the improvement program of Google Maps for accurate indoor positioning. The current owners of these places will cooperat...
Google Map,Indoor service,Positioning 2012-04-08 09:46:53
4 ways to obtain access token in OAuth 2.0
OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...
OAUTH2,ACCESS TOKEN,REFRESH TOKEN 2019-06-29 07:12:03
What Makes A Great Programmer?
I remember it like it was yesterday. It was the year 2000, Dr. Pargas was standing at the front of our data structures class talking about some data structure-y topic while an SSH session was projected on the wall in front of us. Someone asked a question, and he said something along the lines of "Well, if you want to be a real computer scientist you need to start using vi". I think he was smiling as he said it, and in hindsight his statement wasn't even slightly true, but being young and ...
Programmer,Great programmer,Character 2012-02-15 06:14:04
Use Delve to debug GoLang program
If you don't know how to debug program, you are not a real programmer. gdb can be used to debug go program, but according to golang website, delve is a better option. Note that Delve is a better alternative to GDB when debugging Go programs built with the standard toolchain. It understands the Go runtime, data structures, and expressions better than GDB. Below is a simple go program. package main type Person struct { Name string Age int } func main() { var me Person me.Nam...
Do American teenagers hate Facebook?
PewInternet released latest survey report about Internet and life. The report shows that Facebook is still the favorite social network of American teenagers, but it's also the most criticized one. Although some people enjoyed staying on Facebook, most people are complaining that there are more and more adult contents and negative social interactions on Facebook. The key findings are: Teens are sharing more information about themselves on social media sites than they did in the past. Teen Twitte...
American teenage,Facebook,Survey 2013-05-26 10:37:40
All I Know About Certificates -- Certificate Authority
One of the crucial steps in the TLS handshake is for the server to prove its identity to the client. While there is plenty of content explaining the principles of the handshake, there's less information about certificates, which are a critical component of TLS/SSL. This series of articles aim to explain what certificates are used for, how Google prevents others from impersonating Google, and why certificate issues frequently arise, among other topics. (Postscript: It took me a full 10 hours to w...
CLIENTS,WEBSITE,CERTIFICATE,SSL CERTIFICATE 2024-07-26 22:22:28
Php Class to Retrieve Alexa Rank
Alexa is a service acquired by Amazon which offers a web traffic report for websites. They retrieve the data from toolbar that can be installed in different browsers, centralize the data and display reports to anyone. The most important indicator is the Alexa Rank. It represents the rank of a webpage in a list of all the websites. It’s not the 100% accurate but it gives a good indication.Alexa does not offer any free API to obtain Alexa Rank. However there is a simple method to obtain it ...
PHP,Alexa,Alexa rank,API,Retrieve Alexa rank 2011-10-25 11:28:55
Generate certificate with cRLDistributionPoints extension using OpenSSL
In an X509 certificate, the cRLDistributionPoints extension provides a mechanism for the certificate validator to retrieve a CRL(Certificate Revocation List) which can be used to verify whether the given certificate is revoked. A cRLDistributionPoints extension can contain one or more DistributionPoints where the CRL can be retrieved from. Each DistributionPoint consists of three fields,each of which is optional: distributionPoint : it contains either a SEQUENCE of general...
X509,OPENSSL,CERTIFICATE,CRLDISTRIBUTIONPOINT,EXTENSION 2015-10-22 03:41:11
ARM adopts 64-bit architecture
ARM has disclosed technical details about its new v8 architecture - the first to include a 64-bit instruction set - at ARM TechCon 2011 in Santa Clara, California.The next-gen architecture will expand the reach of ARM processors in the consumer and enterprise markets where extended virtual addressing and 64-bit data processing are required.According to ARM CTO Mike Muller, ARMv8 architecture consists of two main execution states: AArch64 and AArch32. 

The AArch64 execution state int...
ARM,Processor,64 bit,Architecture,v8,Nvidia 2011-10-28 10:31:52
RECENT
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- more>>