SEARCH KEYWORD -- REQUIREMENT ANALYSIS
SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
This article will introduce the Data Transmission Latency Log Analysis Dashboard developed for SIEM big data analytics. This is part of the SIEM big data visualization project, if you are interested about other dashboard plug in, you can check below links: SIEM Big Data Visualization [01] : Dashboard for Monitoring Scam Events in Critical Infrastructure SIEM Big Data Visualization [02] : Dashboard for Summarizing SG National Cyber Threats in Critical Infrastructure SIEM Big Data Visualization [...
Techies: Let's Not Forget Brain Hacking
Credit: SergeyNivens via Canva
The world of cyber security never fails to surprise us with bolder and more sophisticated cyber-attacks and...
HACKING 2022-02-03 21:43:11
Everyone Can Write Tech Blogs
As a programmer, you’ve probably been told that writing tech blogs can offer a range of benefits. There's no shortage of articles encouraging you to start writing, and this post, this post adds to that chorus. But while the advice is solid, what’s often missing is how to begin the journey of writing tech blogs. Based on my 10+ years of experience, I’d like to share some thoughts to help you get started. From what I've seen, the reason many programmers don’t write tech blo...
Consistency between Redis Cache and SQL Database
Nowadays, Redis has become one of the most popular cache solution in the Internet industry. Although relational database systems (SQL) bring many awesome properties such as ACID, the performance of the database would degrade under high load in order to maintain these properties. In order to fix this problem, many companies & websites have decided to add a cache layer between the application layer (i.e., the backend code which handles the business logic) and the storage layer (i.e., the SQL d...
JShell -- The command line tool to run Java code in Java 9
Java 9 is currently a work-in-progress and is planned to be GAed in March 2017. Quite a few new features will be introduced in the new release. The coolest feature is project Jigsaw which is to modularize the Java packages so that a customized JDK can be built and shipped with only the necessary modules to fulfill their project requirement. Apart from this feature, another big new feature is project Kulla -- JShell. In simple, JShell is a command line tool which can be used to run...
How Digital Technology is Transforming Healthcare?
Digitalization is the trendsetter for every industry. Healthcare has also been greatly influenced by digital technology. In fact technology has greatly improved the working of healthcare organization and in turn, outcomes of healthcare services have risen to new heights. This is not an overnight dream but result of immense hard work and efforts done by IT industry. The amalgamation of IT and healthcare has yielded a new era of healthcare that is quick and more reliable as compared to olden days...
HEALTHCARE TECHNOLOGY,PATIENT MANAGEMENT SYSTEM 2017-05-05 04:09:33
Applying Large Language Models (LLMs) to Solve Cybersecurity Questions
In this document, we will introduce some test, experiment and analysis conclusion about applying Large Language Models (LLMs) to solve cybersecurity questions. Introduction Large Language Models (LLMs) are increasingly used in education and research for tasks such as analyzing program code error logs, help summarize papers and improving reports. In this project, we aim to evaluate the effectiveness of LLMs in solving cybersecurity-related questions, such as Capture The Flag (CTF) challenges, ...
MySQL index optimization
Problem description: We need to access a very big table which has 40 million records. In the table, id is the primary key and program_id is indexed. When executing a select query: select * from program_access_log where program_id between 1 and 4000 The above query executes very slowly, we thought it was because there were too many records in the table. So we added id in the where condition to limit the search so that each time only half a million records would be read. select * fr...
MySQL,Index search, Partition 2012-12-26 13:14:20
Upcoming Product from Nokia: Nokia 2
With the emergence of telephone, the field of communication has seen a revolution. It was the time when people were able to talk to each other on the phone directly, and the reliance on letters was just reduced. Later entered the cell phones where the users were able to communicate with a phone call or even with SMS. The cell phones made it easy for the users to talk to each other even if they are moving from one place to another. To add value to the cell phones then entered the smartphones to t...
SMARTPHONE,NOKIA 2 2017-11-06 23:29:02
Must read C++ book list
Every programmer should read some books to enhance their understanding about the language before the start to practice. But some of us often wonder what books we should read and in what order. Some books may not be suitable for beginners and some books may cover the similar topics. Here I summarize a C++ book list we should read.Stage 1"Essential C++" : It is short but powerful and it can enhance our understanding of C++'s features.This book is specifically designed to bring you up to speed in a...
C++,Book list,Read,Effective C++ 2012-05-23 13:03:30
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>