SEARCH KEYWORD -- NON-ENGLISH DATA
All I Know About Certificates -- Websites
In last article, we know the role of clients and their responsibilities for certificate verification. Finally, let's talk about websites. We've discussed many potential issues between CAs and clients concerning certificates, but the most frequent issue is with websites—many websites have faced this problem: certificate expiration. Websites need to ensure two things: Ensure their certificate does not expire. Protect their private key from being leaked. If someone else obtains the priv...
CLIENTS,WEBSITES,SSL CERTIFICATE,CERTIFICATE AUTHORITY,CA 2024-07-26 22:33:29
Use cases of Java enumeration
JDK 1.5 introduces a new type -- enumeration. In Java, it's just a small feature, but it can bring us much convenience.Here we summarize some use cases of Java enumeration. 1. Constant Prior to JDK 1.5, we can define constant as public static final..., now we can use enumeration to group all constants in one enum variable and it also provides some useful functions. public enum Color { RED, GREEN, BLANK, YELLOW } 2.In Swit...
Java, Enum,enumeration 2013-01-05 09:15:30
Ruby WinRM undefined method `split' for nil:NilClass
WinRM service is a service provided by Windows to enable remote access a Windows system. It is similar to what SSH is for *nix. And it is frequently used in applications which want to automate process or accessing remote Windows system and perform actions on them. Ruby also provided the WinRM gem which is an implementation of the WinRM service. When using WinRM gem, one may often want to use :negotiate as the transport protocol for authentication. This transport will negotiate using d...
Essential skills any web developer should have
As a web developer, besides writing HTML code, there is much more to do before the site can go live. You may consider about user experience, device compatibility, security etc. To be a good web developer, you should acquire some essential skills for web development. Below we list some of them. Some of them you may be familiar with a long time ago, but definitely some of them you may not be so familiar with or even never hear about before. Interface and User Experience Be aware that browsers imp...
Web development,User experience 2014-03-21 06:44:49
4 deployment modes of Redis
As a high-performance in-memory database, Redis is widely used in current mainstream distributed architecture systems. To improve system fault tolerance, using multiple instances of Redis is also inevitable, but the complexity is much higher than that of a single instance. This article mainly introduces the four deployment modes of Redis and their advantages and disadvantages. Standalone Standalone mode is to install a Redis, start it, and business connects to it and that's all. The specific ...
REDIS,STANDALONE,MASTER-SLAVE,SENTINEL,CLUSTER 2023-03-03 21:35:09
A journey to investigate a goroutine leakage case
In Go, creating goroutines is straightforward, but improper usage may result in a large number of goroutines unable to terminate, leading to resource leakage and memory leaks over time. The key to avoiding goroutine leaks is to manage the lifecycle of goroutines properly. By exporting runtime metrics and utilizing pprof, one can detect and resolve goroutine leakage issues. This post will go through one real case encountered by the author. The author maintains a service that connects to a targe...
TIMEOUT,SSH,GUIDE,DEBUG,LEAK,GOROUTINE,PPROF,GOLANG 2024-03-16 11:00:23
Is Toutiao taking general content creators seirously?
Tiktok is now very popular among the Z-generation around the world. This is an app created by the Chinese company ByteDance. In China, the Chinese version of Tiktok called Douyin is not the only popular app created by ByteDance, there are a few other apps created by ByteDance are also popular such as Jinri Toutiao, a news app famous for its recommendation algorithm similar to Tiktok, also Huoshan Video, another video app similar to YouTube. This Toutiao app encourages general people to create co...
JINRI TOUTIAO,CONTENT CREATION,TOUTIAO,BYTEDANCE 2021-10-03 01:10:27
Top 25 Must Have Wordpress Plugins for 2016
There are nearby 30 thousand WordPress plug-ins available in the market. But you must know the plug-ins, that are worthy for you according to your business & requirements. Here is the list of top 25 WordPress plug-ins according to me & my team that may helpful for you. 1. WordPress SEO by Yoast - Best SEO plugin: Yoast SEO, previously known as a WordPress SEO by Yoast, specially used to boost search engine traffic on your WordPress website. Just install this plug-in and be...
WORDPRESS PLUGIN DEVELOPMENT,MUST HAVE WORDPRESS PLUGINS,BEST WORDPRESS PLUGINS FOR WEBSITE,WORDPRES 2016-03-10 05:04:26
Creating Working application in 15 minutes in ASP.NET MVC with Entity Framework and Scaffolded Items
You can create a working application in asp.net MVC at your place. Asp.net development services providers bring this tutorial to make you learn about the use of Entity framework and Scaffolded items for asp.net mvc application development. Read this and share your experience at the end. In this post we going to use Microsoft technology to create a fully working web application which going to contain a fully featured CRUD capabilities. So first of all let’s create, a new table which going t...
ASP.NET ,COMPANY,DEVELOPMENT,SERVICES 2016-12-21 00:10:00
About .NET memory leak--GC,Delegate and weak reference
Memory leak is always a headache for many programmers, the situation is much better now in some languages which have GC mechanism, but still we may face some memory leak issues when we write programs. 1. What is memory leak? Memory leak is not that the memory chip is broken. In short, it's about that the memory requested is not released at the expected time as an expect way. So what is the expected time? This is very important for you to understand memory leak. If the time an object taking the m...
.NET,GC,Reference counting,Mark and sweep,Weak reference 2013-05-25 12:59:09
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>