SEARCH KEYWORD -- TECH BLOG
4 ways to obtain access token in OAuth 2.0
OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...
OAUTH2,ACCESS TOKEN,REFRESH TOKEN 2019-06-29 07:12:03
Using MySQL Connector/C++ with Visual Studio 2010
MySQL Connector/C++ is one of the latest connectors for MySQL, developed by Sun Microsystems. The MySQL connector for C++ provides an object-oriented application programming interface (API) and a database driver for connecting C++ applications to the MySQL Server.When we want to build a database application with C++ using Visual Studio 2010, we may use the MySQL Connector/C++, but sometimes we may encounter different errors, either compile or runtime error. After tried many times, I finally made...
MySQL Connector,C++,Visual Studio 2010,VS2010 2012-06-01 13:52:20
Will China surpass United States on innovation?
I had some discussions on whether China would surpass United States on innovation with some entrepreneurs during last weekend's APEC. The conclusion is United Stats has advantages on innovation today, but in the future, China's innovation will be more widespread and successful. For the next 10 years, what advantages do United States and China have? Actually United States has obvious advantages, especially on innovation structure and innovation culture. Technology -- It's undoubted that Unit...
Innovation,China,United States 2013-07-15 04:40:12
4 Challenges Women Entrepreneurs Face and How to Overcome Them
The statistics on women entrepreneurship is becoming mindblowing with each passing day. In fact, if you just take a glance over the figures of past a few years, a huge percentage of women entrepreneurs have come up in the UK. Also, the scenario is the same in all other parts of the world as well. According to a 2017’s report by American Express, the women entrepreneurship organizations have grown up to 114%. Also, it is true that now one among the five firms belongs to women entrep...
Google headquarter : A place of fantasy
Google is considered as the best place to work for by many people. It's famous for providing employees various relaxed work environment and attractive welfare. If you have the chance to visit Google's office or you have watched the movie Internship, you will get to know what it is like to work in Google. However, not everyone has the chance to walk in Google's walkways. So we share with you what Google's work environment is like with some images. Every car park in Google has some rows of electr...
Google,Work place,Visit,Headquarter 2013-09-21 11:09:27
Guide to use Compass
Sass is one kind of CSS Preprocessor, it can make CSS development simple and maintainable. But to show its real power we may need to have Compass. This article is to introduce Compass. Once you learn Compass, your CSS development efficiency will be largely improved. Here we assume you have mastered the major uses of CSS, if you know Sass, then it's better. It's still ok if you don't know Sass. 1. What is Compass? In simple, Compass it the toolkit of Sass. Sass itself is only a compiler, Compass...
Common usage of ls command in Linux
In Linux, ls might be one of the most frequently used commands. It is used to list files in a specific directory. In most cases, we may just use ls -l to list the files under a directory. But have you explored other usages of this command. In this post, we will summarise some other common usages of ls command Assuming we have below directory structure in our system, let's see them using tree command. List details of the files If we want to list the details of the files in /home/alvin/test_...
Some hidden XSS injection vulnerabilities
XSS injection refers to a Web page generates some unexpected executable js codes based on user input and these executable codes are executed by web browser,i.e, the source code sent to web browser by the server contains some illegal js codes, and these illegal js codes are related to user's input. Common XSS injection vulnerabilities can be fixed with some functions such as htmlspecialchars(escaping HTML special characters) and strip_tags() or similar, but there are some hidden XSS injecti...
XSS,PHP,Security,Code,JavaScript 2012-08-27 20:32:08
Is Singapore a good place for startups?
Singapore is long time being considered as a perfect place for living and investing given its beautiful environment, warmly climate, well-polished legal system and well-known richness. Its government is relatively young and open-minded. They like to take new challenges and embrace new technologies. It's the first country to open its government data to the world online. Many of you may consider that Singapore would be a perfect place for you to start your next startup. But the tr...
Mozilla releases a web identity system : Persona
Now almost every website requires the user to register, there are many benefits of registration for a website, such as retaining users, accommodating discussions, providing customized content and so on.But there is too much trouble if each site requires registration, right?Of course, users can also have their own way, for those less important sites, for example, using a unified user name, password and email so that you only need to remember one account. Then, we also see some advanced methods em...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>