SEARCH KEYWORD -- USER BEHAVIOR



  How long does the heuristic cache of the browser actually cache?

Heuristic cache Heuristic caching is the default behavior of browser caching (i.e., for responses without Cache-Control), which is not simply "not caching", but implicitly caching based on the so-called "heuristic cache". HTTP is designed to cache as much as possible, so even if Cache-Control is not specified, the response will be stored and reused if certain conditions are met. This is called heuristic caching. HTTP/1.1 200 OK Content-Type: text/html Content-Length: 1024 Date: Tue, 22 Feb 2022 ...

   HEURISTIC CACHE,WEB DESIGN     2023-05-26 08:40:13

  Reflection in Java

What is Reflection? Reflection is a feature in Java that allows a program to obtain information about itself at runtime and dynamically manipulate the properties, methods, and constructors of classes or objects. With reflection, we can instantiate objects, call methods, and set properties without knowing the exact class name beforehand. The core of the reflection mechanism is the Class object, which represents a class. The Java Virtual Machine (JVM) automatically creates this Class object when i...

   JAVA REFLECTION,TUTORIAL,FIELD,METHOD     2024-06-27 07:52:12

  Use of log in programming

Usually, The purposes of log are for troubleshooting and displaying program running status. Good log will help us locate the error easier. Many programmers think log in programs is very simple, but it's not an easy task to write log codes to efficiently locate the error. Here we discuss about program log in three aspects: Where to log What to log Log styles to be avoided Where to log 1. When calling external functions When your program is calling some external functions which are not written b...

   Log, Programming,Debug     2012-11-28 11:42:23

  Let browser prompt for storing password when doing AJAX login

In Web 2.0 era, more and more web applications are using AJAX to replace the traditional HTML form element to perform user login. This usually provides a better user experience than form submission. But it also brings a side effect to the end users. That is the browser will not prompt the user whether s/he wants to save the password so that s/he no needs to enter the username/password again when visiting the same site next time. Below is the code snippet which does the AJAX login.  <scri...

   AJAX,Browser,Login,Password     2015-06-04 10:02:46

  Handle NXDomain error when resolving IP address in Ruby DNS resolver

In another post, we covered how to resolve SystemStackError when resolving IP address in Ruby. In this post, we would cover another common issue where a NXDomain error is returned when resolving an IP address. The NXDomain error means that the queried domain name does not exist in the DNS. In Ruby, DNS resolver library will use /etc/resolv.conf by default get the name servers to resolve the domain name. There are multiple DNS name servers can be specified in /etc/resolv.conf with below format. ...

   RUBY,RUBY ON RAILS,NETWORK,DNS,NXDOMAIN     2017-07-16 01:39:23

  Some tips for writing proper emails

Email is now becoming one necessity of working. We may receive hundreds of emails everyday, they may from our colleagues, friends or clients. We need to exchange ideas, arrange meetings , asking for help etc though email in our work. A proper email can help us achieve what we want to achieve. Here we share some tips for writing a proper email.At the beginning of an email : Thank the reader is a good way to start the email, thank the reader may make the reader feel happy, especially when you ask ...

   EMAIL,TIP,FORMAT,TEMPLATE     2012-07-02 12:26:32

  OpenLDAP Proxy -- rwm-map vs map

OpenLDAP proxy is used to proxy ldap request and response between clients and servers, different servers may have different representations/attributes to mean the same thing. For example, in one LDAP server, the firstName may be represented by firstName, it may be represented by givenName in a different server. However, from the client perspective, it only wants to get the firstName, it doesn't care about the backend attributes. In this case, attribute mapping can help provide a virtual view of ...

   MAP,OPENLDAP,OPENLDAP PROXY,LDAP,RWM-MAP     2018-02-02 20:36:02

  How Chinese tech websites survive

As a tech site which aims to share knowledge and experience, content is its core value. To attract readers, it needs to produce valuable content and keep the originality of the content. When an article is published on a site, it should be a copyrighted property of that site or the original author while others should be very careful when considering to copy that article to their own site. They should generally avoid to copying the whole content of the article. However, in reality, this is no...

   WEBSITE,COPYRIGHT,CHINESE     2017-08-08 21:54:32

  Is Facebook News Feed copied from Google+?

According to Sina Tech, Facebook released its new News Feed this week. However, this design is considered to be copied from Google social network the Google+.Google senior vice president of technology infrastructure Urs Holzle said: "Proud to see +Mark Zuckerberg promote G+.  Imitation is the sincerest form of flattery!"Although technology companies will learn from each other's designs and there are not any effective ways to display pictures on the web and mobile devices, Facebook's ne...

   Facebook,News Feed,Google+     2013-03-10 04:37:18

  Unix directory hierarchy history

As a beginner user of Unix or Linux, people would frequently get confused about the use of different directories of the system.  For example, there is a /bin directory under root(/), it is used to store binary files. However, there are /usr/bin and /usr/local/bin under /usr which are used for storing binary files as well. Some systems even have /opt/bin. What are the differences among them? Though there are articles explaining different directories in *nix such as Filesystem Hierarchy Stan...

   UNIX,LINUX,FILESSYTEM,DIRECTORY HIERARCHY,HISTORY     2016-10-21 23:47:17