SEARCH KEYWORD -- Server monitor
When a CA becomes untrustable
Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...
APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN 2016-10-01 23:03:44
Mock Solutions for GoLang Unit Test
In Go development, Unit Test is inevitable. And it is essential to use Mock when writing Unit Tests. Mock can help test isolate the business logic it depends on, enabling it to compile, link, and run independently. Mock needs Stub. Stub function replaces the real business logic function, returns the required result, and assists the test. I involved the related test code for Controllers while writing Kubernetes Operator recently, and there would be mocks for GRPC and HT...
Set up Superset on ubuntu 16.04 LTS
Apache Superset (incubating) is a modern, enterprise-ready business intelligence web application. Compared with business-focused BI tool like Tableau, superset is more technology-navy. It supports more types of visualization and able to work in distributed manner to boost the query performance. Most importantly, it is free of charge! An example dashboard: Let’s go and set it up. Create a virtualenv Assume Anaconda is installed for python management. # create a virtualenv with python 3.6 co...
What is Hystrix and How does Hystrix work
Background In distributed systems, there is one effect where the unavailability of one service or some services will lead to the service unavailability of the whole system, this is called service avalanche effect. A common way to prevent service avalanche is do manual service fallback, in fact Hystrix also provides another option beside this. Definition of Service Avalanche Effect Service avalanche effect is a kind of effect where the service provider fails to provide service which causes t...
AVALANCHE EFFECT,HYSTRIX,DISTRIBUTED SYSTEM 2019-02-04 06:00:38
Today on history : Twitter cofounder Evan Williams was born
Evan Williams, born March 31, 1972. American entrepreneurs, has created a number of Internet companies, including Pyra Labs, (operational blog, Blogger) and Twitter. He was Twitter, CEO from October 2008 to October 2010. Twitter former CEO Evan WilliamsEvan Williams grew up on a farm in Nebraska Clark Village. At the University of Nebraska, he studied a year and a half, then he started to work. He did different technologies work in some tech start-ups in Key West, Dallas, Austin, Texas. In 1996...
Twitter,Cofounder,Evan Williams,Introduction 2012-03-31 08:49:18
Everything you need to know about what happened at Apple’s Special Event 2019
Apple’s special event that was announced in mid-November is finally over. The company held a presentation event in New York City where it highlighted the best apps and games of 2019 with no new software or hardware announcements at all. On the event, five different nominations were announced: Apple’s chosen favourite apps, top free apps, top paid apps, top free games, and top paid games for 2019. Usual keynotes from Apple The tech industry is pretty accustomed to Apple’s...
Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
We are excited to share that the Power Grid Simulation System we developed was used as part of one red team's targeted critical infrastructure system the international cyber exercise Crossed Swords 2024 which conducted in December 2024. In this article, we will introduce one power outage attack case study which use the Power Grid Simulation System as the demo platform for OT cyber security workshop. Project Design Purpose: This case study demonstrates using the Power Grid Simulation System as a...
Build a Kubectl Plugin from Scratch
by author The command-line tool kubectl is indispensable when using Kubernetes. You need it to query related Pod and Service information both in developing or performing some maintenance operations, such as events, scale, rolling update, etc. However, when using kubectl, there are many inconveniences. Though Kubernetes is officially maintaining kubectl¹, and you can submit the problems, improvement, and even PR in its Github Issues, you still have to wait long before its release. The m...
Oracle CEO Mark Hurd : IBM PureSystem is far behind Oracle
Oracle CEO Mark Hurd had an interview with Chinese media in San Francisco on 19th April. Mark Hurd first introduced different levels of Oracle's overall strategy: 1) the product must achieve best among similar products; 2) system open, vertical integration to provide customers with maximum performance; 3) Industry specific solutions; 4) give users the right to choose and the integration of the cloud environment (private cloud, public cloud, mixed cloud). In addition, Mark Hurd share his own...
Oracle,IBM,Pureystem,Hardware/Software 2012-04-19 07:17:24
Applying Large Language Models (LLMs) to Solve Cybersecurity Questions
In this document, we will introduce some test, experiment and analysis conclusion about applying Large Language Models (LLMs) to solve cybersecurity questions. Introduction Large Language Models (LLMs) are increasingly used in education and research for tasks such as analyzing program code error logs, help summarize papers and improving reports. In this project, we aim to evaluate the effectiveness of LLMs in solving cybersecurity-related questions, such as Capture The Flag (CTF) challenges, ...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>