SEARCH KEYWORD -- WEB APP
How to check when an API is introduced in GoLang
Normally people would not pay much attention to which GoLang version is being used as lots of functions are backward compatible. However there are cases where GoLang version does matter as some functions may not be supported by old version of GoLang. For example, strings.Builder is introduced in Go 1.10, but below code would fail to be compiled on Go 1.10. package main import ( "fmt" "strings" ) func main() { var b strings.Builder b.WriteString("polarisxu") fmt.Println(b.Cap()) } The ...
GOLANG,API VERSION,GO TOOL 2021-02-07 00:43:24
Privileged users get removed from database in GoDaddy shared hosting
GaDaddy is a famous web hosting platform where many people put their websites on its platform. If one has low budget and wanna a shared hosting, you can buy the service at GoDaddy and share some hosting resource with others. In such cases, there would be resource limit based on different plans. In this post, we will discuss one scenario which caused our application down caused by database usage on shared hosting plan and hope it helps readers who encounter similar issues. The issue we encounter...
CPANEL,DATABASE,GODADDY,PRIVILEGED USER 2021-05-25 23:06:50
Install and enable redis extension in PHP 5.X on Windows
Redis is frequently used as a caching layer for web applications to improve its performance. In PHP 5.x, if one wants to use Redis, the redis extension needs to be installed and enabled first. This post will show how to install and enable redis extension on Windows with PHP 5.X. Basically there are two dlls to be downloaded: php_redis.dll and php_igbinary.dll. Below are detailed steps Go to http://windows.php.net/downloads/pecl/releases/redis/2.2.7/ and find the respective php_redis zip ma...
Why Math.min() > Math.max() is true in JavaScript
...
JAVASCRIPT,MATH.MIN(),MATH.MAX(),COMPARISON 2022-05-02 05:27:07
Encrypting and decrypting PGP file or text on MacOS
When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...
PGP,GPG,ENCRYPTION,DECRYPTION,TUTORIAL 2020-10-29 05:06:09
Certificate is invalid for localhost in Chrome
...
CHROME,LOCALHOST,HTTPS,CERTIFICATE,ELASTICSEARCH 2022-03-16 08:21:27
RECENT
- Your Ultimate Guide to Restoring Database Backups in SQL Server 2012
- OT Power Grid System Development
- Fix Surface Keyboard not Working Issue
- Python Process Protection Watchdog
- The Strange Behavior of the void Type in TypeScript
- MySQL Index Merge Optimization Practices
- Applying Large Language Models (LLMs) to Solve Cybersecurity Questions
- Everyone Can Write Tech Blogs
- Python SSH Connection Tools
- Revolutionize Your Event Planning with Interactive Presentation Templates
- more>>