Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Check



  20 Database Design Best Practices

Use well defined and consistent names for tables and columns (e.g. School, StudentCourse, CourseID ...).Use singular for table names (i.e. use StudentCourse instead of StudentCourses). Table represents a collection of entities, there is no need for plural names.Don’t use spaces for table names. Otherwise you will have to use ‘{‘, ‘[‘, ‘“’ etc. characters to define tables (i.e. for accesing table Student Course you'll write “Student Cour...

   Database design,20 tips,Well defined name,Design pattern     2012-02-07 12:10:48

  bcrypt: Safeguarding Passwords with Strong Hashing and Adaptive Security

Introduction In today's digital world, passwords play a crucial role in protecting personal privacy and information security. Passwords are the most commonly used means of authentication because they are simple yet effective. Password security is the cornerstone of cybersecurity and plays a fundamental role in safeguarding the information security of individuals and organizations. However, with the increasing frequency and complexity of cyberattacks, traditional password hashing algorithms like ...

   BCRYPT,SECURITY     2023-11-15 08:14:35

  Why exception would be thrown when deleting element while looping through HashMap in Java

HashMap and other Collection types are frequently used in Java application programming. This post will explain why exception would be thrown when deleting element with Map.remove() while looping through a Map using Iterator. This issue would also occur to other Collection types such as Set, List. Below is a sample code snippet demonstrating the exception thrown. Map<String,String> map = Collections.synchronizedMap(new TreeMap<String,String>()); map.put("key1","value1"); map.put("ke...

   JAVA,HASHMAP,CONCURRENTMODIFICATIONEXCEPTION     2018-06-30 12:49:09

  What is Deep Web- all you need to know about it?

Deep web is the most nefarious out of sight underground area that exists and not accessible to the public domain. The deep web sites cannot be accessed through standard search engines. Many experts believe to have compared this part of the internet hidden from paywalls and forms. The truth is that deep web is a hidden iceberg while the usual internet available to the public domain is just the tip of the iceberg. That part of what is available from search engines such as Bing or Google ...

   DEEP WEB,DARK WEB     2018-07-05 08:26:58

  Eclipse 4.4 is going to fully support Java 8

Eclipse is the most popular IDE for developing Java applications, but it seems lag behind the Java 8 release a couple of months ago. The current Eclipse is not supporting Java 8 and if you want to run Java 8 programs on it, you need to install a plugin. You can find the plugin at the Eclipse market place. Now Eclipse 4.4 is coming to us on 25th June and the code name for it is Luna. This new version of Eclipse introduces some new features which can ease developer's work, these features includin...

   Eclipse,Luna,Java 8     2014-06-18 05:00:37

  Behind Start Screen of Windows Phone 8

Last week, Microsoft unveiled Windows Phone 8, in addition to some new features, the biggest difference between WP8 and iOS, Android is that it has a start screen consisting of abundant live tiles. Senior product manager of Microsoft Josh Phillips published an article on Microsoft official blog. He talks about the story behind start screen of Windows Phone 8. "How can we make Start even more personal" is the question Phillips and his team is always thinking about. Windows Phone makes the static ...

   Windows Phone 8,Start Screen,Live Tile     2012-11-03 02:27:22

  What is your opinion on WordPress hosting providers?

WordPress is a popular content management system (CMS) used by millions of websites around the world. According to data from W3Techs.com, at least 64.2% of websites that have CMS use WordPress’s system. However, to run a WordPress website, you need a hosting provider that can support it. There are many hosting providers that offer specialized WordPress hosting. For example, they would provide seamless, one-click WordPress migrations, or dedicate a team of experts to address any WordPress-r...

   WORDPRESS,HOSTING PROVIDER     2023-02-27 06:45:29

  3 meanings of Stack

We may frequently see stack when we read programming books. But many times we may be confused about the different meanings of it. This term actually has three common meanings. Here we explain the three different meanings of Stack in programming. 1. Data structure The first meaning of Stack defines a method for storing data. Its feature is LIFO9Last In First Out). In this data structure, data are accumulated level by level. The data last put in is added at the top of the stack. When using the dat...

   Stack,Memory,Data structure     2014-02-24 04:56:46

  What is Hystrix and How does Hystrix work

Background In distributed systems, there is one effect where the unavailability of one service or some services will lead to the service unavailability of the whole system, this is called service avalanche effect. A common way to prevent service avalanche is do manual service fallback, in fact Hystrix also provides another option beside this. Definition of Service Avalanche Effect Service avalanche effect is a kind of effect where the service provider fails to provide service which causes t...

   AVALANCHE EFFECT,HYSTRIX,DISTRIBUTED SYSTEM     2019-02-04 06:00:38

  20 bit operations programmers should know

While talking about bit operation, programmers usually think about its efficiency. In embedded programming and system core optimization, appropriate use of bit operations is always a fascinating. When finding a job, it will help you a lot if you use bit operations when writing codes. Mastering simple bit arithmetic skills is necessary. 1. Get maximum int value int getMaxInt(){           return (1 << 31) - 1;//...

   Bit operation, Tips     2012-12-19 12:53:33