SEARCH KEYWORD -- Front end development
Breakdown Kubernetes Container Runtime
Keeping on learning Kubernetes piece by piece and having a deeper understanding of its advantages, I am no longer shocked at its rapid development and popularity. Though backed by big companies like Google is undoubtedly the push, its design, features, and convenience are the biggest attraction. Most of all, it disintegrates the monolithic Internet system governance and lifecycle and offers a new management method. Kubernetes is a set of concepts, including various resource types like Pod, Deplo...
KUBERNETES,CONTAINER 2021-05-15 04:06:48
Easy Ways To Make Sure Your Website Is Ready For Mobile First Users
Websites are no longer a novelty or a useful complement to a brick and mortar store. They are an essential part of everyday life. The average American is spending up to ten hours every day online. Businesses exist solely online, entrepreneurs with great ideas can start up online with very little help and even the most casual of users know what looks good. Consumers aren’t likely to forgive mistakes. If your website isn’t completely user-friendly, they know they ...
SEO,MOBILE SEO,MOBILE DEVELOPMENT,MOBILE USABILITY 2018-09-17 03:57:15
How to create a language in one day
About a year ago I worked on a very interesting project which involved creating a unique world with all its history, people, physics, metaphysics and so forth. I like fictional worlds that are thoroughly created and I have always marveled at people like Tolkien or Richard Garriot who go such great lengths and even create languages for their worlds. I have since many years felt that it would be awesome to create my own language and I’m probably not alone in feeling that.When I started stud...
Language,Develop,Short period,Programming language 2011-10-19 14:15:24
How to Prevent a Data Breach: Guide For Businesses
The consequences of a data breach are nothing to joke about. From reputation damage to regulatory fines, it is a disaster for any business. So you should always strive to do your best to prevent it. But with so many steps to take, where do you even begin? Businesses of all shapes and sizes should follow this 8-step approach: 1. Outline Your Assets Your assets, whether digital or physical, should always remain in your sight. It should be the very first step you take. Picture anything that might r...
DATA SECURITY 2020-03-04 08:16:44
How to Create Custom Textures using Filters & Layers?
Textures are an important and integral part of the design world. You would find textures in every nook and corner of your life, in every space across your home. For a long time people have looked at Photoshop as a tool to manipulate photos and make them look the way you want it to appear. But, that’s not all to Photoshop. You can create interesting textures, and create amazing design works using Photoshop too. All you need is a design hand, and some basic understanding of how to use it. He...
Photoshop 2014-08-01 05:46:07
Workaround size limit of phpMyAdmin import sql file
When doing website development with MySQL, we often need to do database backup and restore. For website, the data in database will grow quickly, so when we back up the database, the size of the generated sql file may be over 80MB which is the max allowed size when we want to import a sql file for restoring our database using phpMyAdmin. To workaround this limit, we need to review the documentation of phpMyAdmin. Fortunately, I found an online article written by David Pratt which gave us a ...
MySQL,phpMySQLAdmin,80M,import,solution,limit 2014-08-14 09:59:27
Generating CSR using Java
A CSR(Certificate Signing Request) is a kind of request generated by an application and is to be sent to a Certificate Authority to create a signed certificate which can be distributed. It usually contains certificate information such as subject name, public key info and signature info. In Java, keytool can be used to generate a certificate request with option -certreq. But sometimes if an application wants to create a CSR programmatically, keytool will not do a favor, instead you should u...
JAVA,SECURITY,CSR,CERTIFICATE REQUEST 2016-05-25 04:49:17
Programming: the benefits of taking a break
This post lists several benefits of taking a break during programming.You work smarter, not harder. Once, I worked really hard on a feature. For two weeks, 12 hours a day, I put in a lot of effort. After those two weeks, I took a break and came up with several ideas that made much of the work unnecessary.You think more clearly. Being tired has a similar effect as being drunk. At the end of a day, I often kid myself that I’ll just get this one thing finished quickly to have a fre...
Programming,Break,Rest,Refresh,New idea 2011-11-08 08:50:45
Essential Rules To Protect Your Credit Card When Shopping Online
You have to protect yourself and your credit card online while shopping. There are a number of ways to do this, but some prove more technical than others. Your basic best defense includes sensible use and layers of protection. The best way to do this is to pick and choose which stores at which you charge purchases. You can reduce the chance of losing your card details to a thief by declining to allow the retailer to store your credit card. Use a password manager to save your passwords and make a...
SECURITY,CREDIT CARD,MASTERCARD 2019-10-09 08:40:07
An experience of fixing a memory-corruption bug
During the last 4 months, I was disturbed by a memory-corruption bug, and this bug will cause program crash. Until last Monday, I found the root cause and fixed it. This debug process is a difficult but memorable experience, so I will share it in this article. My program works as a SMS Hub. When it receives a SMS, it will allocate a structure in heap memory like this: typedef struct { ...... int *a[8]; ...... } info; After processing the SMS, the program will free the m...
c, debug, unix, solaris, multi-thread 2014-05-04 03:52:43
RECENT
- The Ultimate Guide to Implement Function Overloading in Python
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- more>>