SEARCH KEYWORD -- HOT POSTS



  The Giant Mafia

There is an old Chinese saying "Things of a kind come together. People of a mind fall into the same group.". In the wave of Web 2.0, there are many emerging IT giants coming out the world. And many of them are founded by a group of people who previously worked together at the same company such as PayPal and Facebook. This is called giant mafia. Let's see what people from the big IT giant have done after leaving the original company. The PayPal mafia Peter Thiel, co-founder and CEO of PayPal bef...

   Facebook mafia,PayPal mafia,Twitter mafia     2015-04-04 10:32:00

  Why TCP needs 3 handshakes

Prerequisite Knowledge First, let's look at the control bits and state machine of TCP, which form the basis for understanding the three-way handshake of TCP. TCP Packet Control Bits The control bits in the TCP packet header are used to control the status of the TCP connection and can indicate various control information such as connection establishment, termination, reset, etc. There are six common control bits: SYN (Synchronize Sequence Numbers): Requests to establish a connection (part of the...

   REASON,NETWORK,TCP,EXPLANATION,HANDSHAKE     2024-09-28 08:57:52

  Advantages and disadvantages of GoLang

GoLang is a strong typed language which means it is less flexible than interpreted languages by nature. But Go provides Any type(interface) and Reflect mechanism which make the language very close to interpreted languages on flexibility. More and more people start to learn GoLang. This post is mainly for listing down some of the advantages and disadvantages of GoLang. Advantages Performance(Machine code) GoLang is a compilation language which can be compiled to machine code and the compiled bina...

   GENERICS,GOROUTINE,GOLANG,DISADVANTAGE,ADVANTAGE     2018-11-10 20:46:45

  Understanding How is Data Stored in RDBMS

We all know that DBMS (database management system) is used to store (a massive amount of) data. However, have you ever wondered how is data stored in DBMS? In this post, we will focus on data storage in RDBMS, the most traditional relational database systems. Physical Storage Data can be stored in many different kinds of medium or devices, from the fastest but costy registers to the slow but cheap hard drives, or even magnetic tapes. Nowadays, IaaS providers such as AWS...

   RDBMS,DATABASE     2019-02-04 09:25:36

  Different types of keystore in Java -- JKS

JKS is Java Keystore, a proprietary keystore type designed for Java. It can be used to store private keys and certificates used for SSL communication, it cannot store secret keys however. The keytool shipped with JDKs cannot extract private keys stored on JKS. This type of keystore usually has an extension of jks. Next we will show how to operate the JKS keystore with pure Java code. Create JKS keystore The simplest method to create a JKS keystore to create an empty keystore. We can first get an...

   DEMO,EXAMPLE,KEYSTORE,JKS     2014-09-05 20:21:51

  How to Develop a Successful SEO Strategy for Your Startup

SEO is usually viewed as under-the-table formula manipulations and trickery, once actually it’s simply a series of core steps and actions you wish to require, to create your web site rank higher. An economical SEO strategy may be countermined to the subsequent three parts, that create the entire issue look less daunting in spite of everything.   Step 1: On-site Optimization On-site optimization strategy consists of these subsequent elements: Your Content Website Structure Layout of ...

   SEO,MARKETING     2016-03-18 15:33:37

  3 better and efficent ways of cloud to help content marketing

Content marketing has enlarged in quality over the past year, with around 88% of business-to-business (B2B) firms participating during this marketing stategy and around 90% of customers indicating that custom content is beneficial. Some businesses across industries need staff to send email newsletters, pen web log posts , draft advertisements, write grant proposals and publish white papers. flexibility to form quality content are often an important talent every  jobs However, making and mar...

   BUSINESS     2016-03-08 10:39:10

  When no need 3 handshakes in TCP?

Overview In the previous article titled Why TCP needs 3 handshakes simple answers were provided to the following three questions: Can application data be carried during the first handshake? Can application data be carried during the second handshake? Can application data be carried during the third handshake? Briefly, traditional TCP requires a three-way handshake to establish a connection, and during these three handshakes, only simple SYN and ACK packets are sent. From the perspective o...

   REASON,NETWORK,TCP,EXPLANATION     2024-09-29 03:19:35

  Memory related exception analysis in Java

Java Virtual Machine Specification divides the memory of JVM into several areas : Heap, Stack, The Program Counter register and Method area etc. In HotSpot JVM, heap is composed of Young, Tenured and Perm. There are different OutOfMemory error can happen in different memory area. Next is an overview of some of these OOM errors. StackOverflowError The JVM will allow only a specified number of stacks created nested. An JVM option -Xss can be set to determine the maximum stack size. If the num...

   Java, Memory model, Memory exception, OOM     2015-01-19 06:54:27

  Tips on Writing for Tech Blogs

If you know your stuff when it comes to tech, you might be inspired to start contributing articles to tech blogs. A friend or colleague may suggest the idea to you, or you may see an invitation for submissions, much like the one on this website. Sounds like a great idea; but what do you know about writing articles, blog posts, or other types of content? Writing is a skill, and there are also practical aspects to writing that you need to be aware of before you start creating your own pieces. Gett...

   TIPS,TECH BLOG     2019-01-14 09:25:07