Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Application field



  Data type in MySQL

For both small free database space and large e-commerce websites, reasonable database table structure design is essential. To achieve this, it requires us to have a full understanding of commonly used data types in database system. Below we share some knowledge about data types in MySQL.1. Numeric typesThe numeric types can be classified as : integer, float and decimal type.The so-called "decimal" refers DECIMAL and NUMERIC, they are of the same type. Strictly speaking it is not a numeric type, ...

   MySQL, Data type,VARCHAR     2013-01-01 10:56:06

  Data Scientists and Their Harder Skills than Big Data

The field of data science is often confused with that of big data. Data science is an aid to decision makers in a company with a logical approach.  Who is a Data Scientist?  A Data Scientist reviews a huge collection of data(that may extend to a couple of terabytes of disk space or thousands of excel sheets). This humongous chunk of data is not feasible for being handled, sorted and analyzed by a single person. Here we require the help of data science, and most recently, the field of A...

   BIG DATA     2017-12-13 04:22:55

  10 things you gotta have to succeed in IT

Takeaway: Everyone seems to agree that IT is a tough field. But what does it take to overcome the adversities and become a successful IT pro? These qualities may be the key. I recently wrote a string of articles discussing various reasons to leave IT — and various alternative careers for dissatisfied IT workers. I received an amazing amount of feedback from readers who have always wanted to express similar sentiments. But that leaves out a huge swath of peo...

   Tips,IT,Development     2011-07-21 21:55:13

  Twitter user database is hacked

According to Sina Tech, One hacker from Islamic Republic of Mauritania claimed today that he had acquired Twitter's entire user database and he shared over 15000 user account information on file sharing website Zippyshare.These information include the name of each account on Twitter, username and access tokens of third-party applications which have access to their Twitter accounts(such as Instagram or HootSuite).Twitter has yet to comment on the matter, but the company sent messages urging ...

   Twitter,Hacker,Access token     2013-08-20 10:49:44

  Resolve stylesheet_link_tag fails to work in Ruby on Rails

When developing Ruby On Rails application, developers sometimes will see an unexpected behavior where the application cannot be loaded due to "TypeError: Object doesn't support this property or method" when invoking stylesheet_link_tag. The symptom looks like  And the Rails log will show something similar to below The error occurs because there is some problem finding the correct assets which are located in app/assets. To resolve the issue, you can following below steps. Add gem 'coffee-...

   RUBY ON RAILS,STYLESHEET_LINK_TAG,JAVASCRIPT_INCLUDE_TAG,TYPEERROR     2016-10-14 03:59:11

  Career Advancement: How to Achieve Success

Your career is key in terms of making the money that you want and providing a service that you've always dreamed of offering. Regardless of the type of career that you both want or have, there are many ways for you to advance within the field. By taking charge of your goals and doing something about them, you will be able to earn the amount of money that you want to become a true success. Get a More Specific Education Getting an education is a wonderful way for you to advance within your workpla...

   CAREER,EDUCATION     2020-03-17 01:41:39

  What and what not to log while debugging

Log is a critical part of an application. It serves as an eye to the programmer on how the application is working while debugging. Especially for applications running on production environment, if the application encounters problem and the problem cannot be reproduced on other environments, log will be extremely useful. While log is essential, but developers have to log smartly. Because if don't put log smartly, you may not get what you want while debugging or you may get too many...

   PROGRAMMING,DEBUG,LOG,SUPPORT     2016-03-14 08:09:03

  Google released a visual programming language Blockly

Google released a visual programming language Google Blockly, similar to the children programming language Scratch developed by MIT. You can build an application using some graphic objects, this is like playing LEGO toys. Eveny graphic object is a code block,  you can integrate them together to create simple functions, then you can combine some simple functions together to build a complete application. Users can drag blocks together to build an application. No typing required.This project...

   Google,Blockly,Visual programming language     2012-06-05 08:58:26

  Java API vs Framework

What is the difference between a Java Library and a framework? The two concepts are essentially important for a Java developer. The most important difference between a library and a framework is Inversion of Control. It means that when you call a library you are in control. But with a framework, the control is inverted: the framework calls you. (This is called the Hollywood Principle: Don’t call Us, We’ll call You.) This is pretty much the definition of a framework. Basicall...

   Difference,API,Framework,Library,Java     2011-12-19 13:40:33

  Introduction to DTLS(Datagram Transport Layer Security)

Secure communication has become a vital requirement on the Internet. Lots of information transferred through the Internet are sensitive data such as financial transactions, medical information, media streaming etc. To ensure security of data transferred on the Internet, a few secure protocols have been designed including SSL/TLS and IPsec. Many large websites in the world have adopted TLS. Apart from SSL/TLS, there is some other protocol designed to be used in special cases. One of them is ...

   JAVA 9,DTLS,TLS,SECURITY     2016-04-02 05:55:36