SEARCH KEYWORD -- Data security



  How to choose JavaScript template engine?

With the increase of density of web front end development, AJAX and JSON are used more and more frequently, it's necessary to use many tags in front end development. You may have a JSON object as below: var data={  email: 'terry.li@gbin1.com,  gender: 'male'  } Then you need to organize the JSON data into page elements. var email, gender;email= ' ' + data.email+ '; gender= ' ' + data.gender + '; $('#contentwrapper‘).append(content).append(gender); The output is very simple: ...

   JavaScript template engine,Template     2012-10-07 07:03:58

  The biggest iOS 5 bug you've never heard of

There is a huge bug when Group Messaging is disabled in iOS 5. I'm shocked Apple hasn't fixed this yet. Today a friend sent out a text message blast, announcing they got a new phone number. Shortly after, I got text messages from three random people I don't know. I was confused how these people got my number, but then I realized they were replies intended for my friend who sent out the text blast. If you've ever used the Group Messaging feature,...

   iOS5,Bug,Group Messaging     2011-12-10 06:04:39

  The Five Stages of Hosting

As a proud VPS survivor, I thought it might be fun to write up five common options for hosting a web business, ranked in decreasing order of 'cloudiness'. People who aren't interested in this kind of minutia would be wise to pull the rip cord right here. 1. The Monastery You run your site on an 'application platform' like Heroku, Azure, or Google App Engine. You design your application around whatever metaphors and APIs the service lays out, and in return you are veiled from all t...

   Website hosting,Recommendations,Stages,Advantages     2012-01-30 05:43:42

  Apple patent shows they are developing "Killer" 3D Camera

This is not the first time that Apple patent shows they have interest on 3D camera technology. In November last year, one Apple patent shows that Apple is developing advanced three-dimensional object recognition and verification technology. According to PatentlyApple report (March 30,2012) one patent released this week shows that Apple is developing a 3D camera technology for the future iOS devices. This 3D camera is described as an advanced component with advanced micro-lens, depth, chrom...

   3D Camera,Apple,Patent     2012-04-03 07:46:35

  When will resizing be triggered in Java HashMap?

HashMap is one of the most frequently used collection types in Java, it stores key-value pairs. Ideally it expects to use hash table which expects the data access time complexity to be O(1), however, due to hash conflicts, in reality, it uses linked list or red-black tree to store data which makes the worst case time complexity to be O(logn).  Although collections are using data structures like arrays and linked lists, unlike arrays, they will dynamically resize when there is not enough spa...

   JAVA,RESIZE,HASHMAP,THRESHOLD     2020-05-02 20:41:19

  Do You Make These 5 Database Design Mistakes?

Look, everyone makes mistakes. It’s true. But not all of us have the chance to make mistakes that end up costing millions of dollars in hardware and production support costs. Any one of the following five mistakes listed below will add additional costs to your company. It’s guaranteed. The costs could be hardware related (extra disk space, network bandwidth), which tend to add up quickly. The costs are also support related (bad performance, database re-design, report cre...

   Database design,Mistake,Advice,Data type,Compatibility     2012-01-03 11:25:13

  Introduction to OAuth (in Plain English)

Last week we talked about giving away your passwords and how you should never do it.  When a website wants to use the services of another—such as Bitly posting to your Twitter stream—instead of asking you to share your password, they should use OAuth instead. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password. This is a quick guide to illustrate, as simply as possibl...

   Security,OAuth,Permission,Partial access     2012-04-05 11:39:54

  Those famous Emacs users

I don't think using Emacs can improve one's programming skills, I don't think some famous people used Emacs before can provide something, either. But these famous people encouraged me to learn Emacs when I wanted to give it up. Here I created a list of famous Emacs users. Most of people in this list are not famous because they developed or used Emacs, but they are famous and also use Emacs. Joe Armstrong -- Erlang's author In The Setup, Joe mentioned that "I write books using XML markup in emacs...

   Emacs,History     2013-07-28 21:36:09

  How does MySQL handle DROP TABLE

A few days ago, when executing DROP TABLE in MySQL, all processes including DDL and DML were hung until DROP TABLE was completed. I am confused about this phenomenon. I have reviewed the source codes of MySQL to check how MySQL internally handle DROP TABLE. When user trigger DROP TABLE command: ########################MySQL SERVER drop table######################## /* Sql_table.cc  delete (drop) tables. */bool mysql_rm_table( )   /*   Execute the drop of a normal or temporary...

   MySQL,DROP TABLE     2012-09-24 11:34:05

  CASSANDRA data model

Cassandra is an open source distributed database, it combines dynamic key/value and column oriented feature of Bigtable. Features of Cassandra are: Flexible schema, no need to design schema first, it's very convenient to add or delete strings Support range search on keys High usability, extensible. The single node error will not affect the cluster. We can think Cassandra's data model as a 4 or 5 dimensional Hash. COLUMN Columns is the smallest data unit in Cassandra, it is a 3 dimensional data...

   Cassandra,database,sort     2013-06-08 22:07:40