SEARCH KEYWORD -- GOOGLE API
Kubernetes Authentication & Authorization 101
If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αá½θεντικÏŒς authentikos, “real, genuine”, from αá½θÎντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...
RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES 2021-06-05 23:19:18
8 powerful Chrome extensions
Chrome is a powerful browser, one reason why it's so powerful is that it has abundant extensions. There are various extensions in Chrome Web Store. They can meet all kinds of needs you have and they are very easy to install as well. Here we share with you 8 powerful extensions on Chrome. All of them can be downloaded from Chrome Web Store Holmes A bookmark search tool, if you have lots of bookmarks and you even don't know where they are. Hplmes can help you find them in real time by matching tit...
5 good anti SOPA designs
The Stop Online Piracy Act (SOPA) is a United States bill to expand the ability of U.S. law enforcement to combat online copyright infringement and online trafficking in counterfeit goods. Its goal is to protect the intellectual-property market and corresponding industry, jobs and revenue. However since its proposal, many organizations protest against it as they believed it would threaten free speech and innovation, and enable law enforcement to block access to entire internet domains due t...
6 necessary WordPress plugins for personal blogs
WordPress is now adopted by most bloggers, it has various themes and powerful plugins. There are lots of amazing plugins can be chosen such as spam comment filers and sitemap generators. For novice WordPress users, you may be confused about which plugin to choose, here we share with you 6 necessary WordPress plugins. Akismet Akismet is a built-in WordPress comment plugin. It checks your comments against the Akismet web service to see if they look like spam or not and lets you review the spam it ...
WordPress plugin,Comment,Sitemap 2013-08-05 03:18:40
Social media sharing codes
Social media is becoming a very important traffic source to one website. We can see social media share buttons or links in most websites ranging from news website to personal blogs. It is also a very important optimization area where many SEO experts recommend. There are many social medias we can share our links to such as Facebook and Twitter. Most of these website provide share button for us to easily integrate them into our websites, but these buttons usually have default styles(fixed size, f...
Social media,Share button,Cutomize 2013-07-18 23:12:45
User experience distance
Good user experience can narrow the gap between product and users, it can also improve the user efficiency and increase satisfaction and comfort of users. Here we talk about user experience distance with different examples: 1. Floating bubble layer When users need to delete one picture,they click on the "Delete" button, then the floating bubble layer appears to prompt the user to confirm the deletion, users only need to focus on the picture which reduces the visual burden, and also no need to mo...
User experience, Design,Detail 2012-12-20 13:20:16
Service discovery with etcd
In previous post, we have talked about etcd and its usage. This post we will cover how to implement server discovery with etcd. Service discovery is to solve one of the most commonly seen scenarios in distributed system where how to find the corresponding target service to talk to. In short, it is to find some server which one can talk to based on some service name. A complete service discovery system include below three key functions: Service registration: A service must register itself to so...
ETCD,SERVICE DISCOVERY,DEMO,TUTORIAL 2021-03-08 05:36:29
Generate certificate from cert file in Java
A certificate is often used to prove the identity of a server. The certificate will contain information such as the subject and issuer of the certificate. It will also contain the validation date of the certificate. A certificate is often exported to an external cert file which is transferred over the internet. We will often see its use in SSL communication which provides secure communication between two entities. In this post, we will show how to read the data from an external certificate file ...
PKCS12,CertificateFactory,Example,Java,X509 2015-06-08 06:47:05
App Store, Most Effective Weaponry In Apple’s Armor
Apple’s most effective and effectual weaponry is its app store. Surprisingly however, the first generation iPhone did not support any Mobile apps, and Steve Jobs was actually proud of this fact. Back then, in 2007, third party mobile apps were not allowed on the iPhone. Jobs in-fact announced that Mobile app developers could use the most modern standards and write customized mobile apps for the iPhone web browser. He said, “We think we’ve got a very sweet story for you. You can...
Mobile app developers, customized mobile apps, software development kit, 2015-07-28 03:26:19
Launch Java process programmatically in Java
In some cases while working on some automation testcase, developers would like to launch Java process programmatically so that the tests can be ran without manual intervention. Java provides such methods to achieve this. ProcessBuilder can be used to build a Java process which can be launched when everything is ready. Basically it can take a list of parameters which are similar to the command line options/arguments. For example, if you want to launch a Java process, you can do followi...
JAVA,PROCESSBUILDER,COMMAND LINE 2016-04-27 04:03:30
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>