Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- DATABASE OPTIMIZATION



  On Employers, Portfolios, Commitment, and Cake

You might know from experience that planning for a wedding is no simple feat. In the months leading up to our wedding, my then fiancé and I spent countless hours planning and making sure that no detail was overlooked. Among our top priorities was finding a skilled baker to create a delicious and beautiful cake. On the recommendation of a friend, we considered a baker named Jennifer. We read her "culinary resume." We were impressed by her references and experience, and our initial conve...

   Career,Employer,Cake,Commitment     2012-02-17 07:48:19

  What will the value of Integer.valueOf(127) == Integer.valueOf(127) be in Java?

Do you really understand how Java does the integer comparison? OK, ignore the statements in the post title. What we are interested in is another set of comparison statements. Let's first see below code snippet. public class IntegerComparison { public static void main(String[] args) { Integer a = 127, b = 127; Integer c = 128, d = 128; System.out.println(a == b); System.out.println(c == d); } } What do you think the output will be? Are they both displaying true? You will find out t...

   JAVA,==,EQUALSTO     2018-01-13 22:18:15

  Using Nlog Logging Framework With Vnext In Asp.Net

In this article, asp.net development company experts will brief you about asp.netVNext and its features. They will also explain how to use NLog Logging framework in Asp.net. Read this article and learn what they want you to understand. Overview of Asp.Net VNext The next level of Asp.Net after Asp.Net 5 is Asp.Net VNext. Currently, the code is run in Asp.Net with same CLR as that of desktop apps. There is a need for cloud optimized version of Asp.Net for getting higher throughput with lesser memo...

   ASP.NET ,ASP.NET DEVELOPMENT COMPANY,ASP.NET VNEXT     2016-10-26 01:14:53

  How to secure an Ubuntu Apache web server

Securing server software is not a straightforward task. Not all of our operating environments are the same, leading to a variety of potential security vulnerabilities. However, using a few basic configuration and security options, you can stay a little ahead of where you want to be. 1. Fail2ban Fail2ban is a Python-based intrusion prevention software that detects and blocks malicious IP addresses from multiple unsuccessful attempts at software logins. In other words, if someone is attempt...

   Unix server security,Log,.htaccess,Cache     2011-12-27 09:25:32

  How Google Utilizes Big Data for SERP

Google is an expert when it comes to big data. This is evident in their development of various techniques and open source tools which are used by the big data industry professionals. These tools and technique allow Google to sift through millions of different websites and enormous amounts of data in order to provide users with correct answers in a matter of milliseconds. But how does Google accomplish that with such precision? To answer that, we need to focus on the complex activities that go o...

   GOOGLE,BIG DATA     2017-05-31 16:13:03

  Migrate from MySQL to MariaDB in Ubuntu

The biggest movement of escaping from MySQL in this century starts, openSUSE,Fedora and Arch have started to use MariaDB instead of MySQL as their default database. Many people also dislike the attitude of Oracle on MySQL, so it's reasonable to migrate from MySQL to MariaDB. The whole process is not complicated. Here we share the steps to migrate from MySQL to MariaDB in Ubuntu. Installation procedure: sudo apt-key adv --recv-keys --keyserver keyserver.ubuntu.com 0xcbcb082a1bb943db Modify /etc/a...

   MySQL,MariaDB,Ubuntu     2013-08-13 11:14:51

  OpenLDAP Proxy -- Introduction

OpenLDAP is an open source project which is intended to provide some commercial-grade, fully featured applications and development tools based on the well known Light-weight Directory Access Protocol(LDAP). Hence corporations which want to manage their user and group information can freely use these tools.  OpenLDAP provides ldap servers, ldap clients and corresponding tools to work on LDAP. The LDAP server is called slapd(Stand-alone LDAP  daemon). And it would serve as the server whi...

   META,OPENLDAP,OPENLDAP PROXY,SLAPD,SLAPD.CONF,LDAP     2017-10-28 11:20:00

  Circumventing browser connection limits for fun and profit

A few days ago, this video hosted by metacafe popped up on digg, explaining how to increase site download times by tweaking your browser settings to increase connection parallelism. To explain why this works, let’s step back a bit to discuss how browsers manage server connections. In building any application, developers are often required to make ‘utilitarian’ choices. Pretentiously paraphrasing Jeremy Bentham, ‘utilitarian’ describes an approach that ââ‚...

   HTTP,Concurrent connection limit,Solution,AJAX     2011-12-14 13:01:02

  Data as code

What is a good command line parser API? A good command line parser should consider below 5 aspects: Support convenient help information generation Support sub commands, for example, git has push,pull,commit sub commands. Support single character option, word option, flag option and option with parameter. Support default option, for example, if no -port is set, set it as 5037 Support usage model, for example, tar's -c and -x is mutually exclusive, they belong to different usage models. Here are...

   Command line,API     2013-08-08 22:40:36

  Singleton Design Pattern in Java

Singleton is frequently used in applications where resource may be expensive to create and no instance specific state needs to be maintained. For example, when creating database connection, a singleton may be needed. Today we will share the famous Singleton design pattern in Java. 1. Definition Singleton design pattern is a design pattern that restricts the instantiation of a class to one object. It is one of the most well-known design patterns. 2. Application Singleton ...

   DESIGN PATTERN,SINGLETON,MULTITHREAD,JAVA     2020-04-11 02:16:28