Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Facebook phone



  REST和gRPC对比全知道

长期以来,REST是构建API的唯一“标准”。它取代了混乱的“太多XML”的SOAP。但是近年来,出现了新的替代品。2015 年,Facebook 向公众发布了GraphQL,而 2016 年,Google 推出了gRPC。本文将重点介绍 gRPC,并与仍广泛使用的 REST 进行比较。 概述 以下表格将为您提供讨论点的概述,并显示 REST 和 gRPC 的优劣之处。 主题 REST gRPC 标准化 没有标准 定义明确 范式 基于资源...

   COMPARISON,GRPC,REST     2023-04-29 06:44:09

  Cache them if you can

“The fastest HTTP request is the one not made.” I always smile when I hear a web performance speaker say this. I forget who said it first, but I’ve heard it numerous times at conferences and meetups over the past few years. It’s true! Caching is critical for making web pages faster. I’ve written extensively about caching: Call to improve browser caching(lack of) Caching for iPhone Home Screen AppsRedirect caching deep diveMobile cache file sizesImproving app ...

   Cache,HTTP request,Websiite     2012-03-27 12:54:02

  PaaS vs. SaaS: The Differences And How To Pick The Right Option

Platform as a service (PaaS) and software as a service (SaaS) are two kinds of cloud computing products that enable businesses and their clients to deliver and use various services, respectively. Before diving into the differences between the two concepts, it’s important to take a step back and understand what a cloud service really is. Cloud computing primarily refers to large storage of data, programs, and operations that are accessible via the Internet and are not stored on a user&rsquo...

   CLOUD,PAAS,SAAS     2020-04-06 06:30:32

  Tips for Socializing With Friends During College

The shift from high school to college is a pivotal time in a young adult's life, complete with new responsibilities and the exciting opportunity to forge new relationships. Navigating social life in college can be daunting for many, but with the right tips, it's entirely possible to create a fulfilling social experience while still maintaining academic focus. From joining interest-based campus clubs to managing a healthy balance between studies and socializing, there are several strategies to en...

   SOCIAL NETWORK,COLLEGE     2024-04-16 06:40:55

  Why programmers work at night

A popular saying goes that Programmers are machines that turn caffeine into code. And sure enough, ask a random programmer when they do their best work and there’s a high chance they will admit to a lot of late nights. Some earlier, some later. A popular trend is to get up at 4am and get some work done before the day’s craziness begins. Others like going to bed at 4am. At the gist of all this is avoiding distractions. But you could just lock the door, what’s so special a...

   Programmer,Sleep,Later,Efficiency,Habit     2011-12-16 10:13:27

  Android Security

Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an alternative to Apple’s iOS, is now slowly eating into the market share of Apple and is of primary concern to the company. Let’s have a brief introduction about android and then look into the security concerns and vulnerabilities that need to be focused on. Android Introduction: Android was deve...

   Android security,Input validation     2013-04-16 12:19:37

  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10

  Google engineer: What I learned in the war

Veteran's Day is an ideal time to hear from one of those rare folks who combine corporate and military careers. Dan Cross, a software engineer at Google (GOOG) and a 1st Lieutenant in the U.S. Marine Corps, took a leave to serve active duty in Afghanistan, came home a year ago, and brought back lessons that he couldn't have learned in business. While he had never seen himself as the military type until a personal tragedy made him reroute his career, he's a better man for it. Cross, 34, is now an...

   Military,Marine,Google,Engineer,Lessons,Teamwork     2011-11-12 10:36:03

  Cybersecurity | The New Dangers That Lurk Online and Their Solutions

(Image source: Pexels) Data is one of the most important things to us. While robbers that steal valuables like laptops, phones, or money are still a threat, cybercrimes are also more dangerous than ever. That’s because your data is far more valuable than you might think. Companies benefit from users’ data by applying it for their indexing, marketing, and accumulation needs. They actively use this information to sell you more products. Have you ever visited Amazon and instantly got a ...

   DATA SECURITY,VPN     2020-04-23 06:47:37

  How to play with cross domain request

What is cross domain request In simple, cross domain request is to request resource from other domain in one domain. Note, the "other domain" doesn't just mean domain name only, it includes much more. If the protocol, domain name, port is not the same, two domains will be considered different.  Below example describes what is considered as different domain. http://www.a.com/a.jshttp://www.a.com/b.js               # Same domainhttp://www.a.com/lab/a.js &nb...

   FRONT END,JSONP,CROSS DOMAIN,CROSS ORIGIN,CORS,DOCUMENT.DOMAIN,WINDOW.NAME     2016-11-06 00:48:54