Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Record



  Differences among Enter,F5 and Ctrl+F5 in webpage refresh

When we press Enter, F5 or Ctrl+F5 to refresh a webpage, is there any difference among them? Actually it's yes, we can find the difference from the request header and response header information. There are two cases about pressing Enter in the address bar. First if the page requested is cached and not expired in the browser, we can find the header information sent by the browser is : Host 192.168.3.174:8080 User-Agent Mozilla/5.0 (Windows NT 5.1; rv:5.0) Gecko/20100101 Firefox/5.0 Accept ...

   Refresh,F5,Ctrl+F5     2013-06-13 22:03:35

  Data governance Challenges and solutions in Apache Hadoop

Do you understand meaning of data governance? This is taken as most critical part of an organization that deals with sensitive data of an enterprise. If organization wanted to know who is accessing their sensitive data and what action has been taken by the viewers then data governance is wonderful solution to consider. In this article, we will discuss on data governance solutions and what are the challenges that are faced by organization during implementation of data governance. We will also dis...

   HADOOP DEVELOPMENT,HADOOP INTEGRATION     2015-10-26 08:06:29

  How to Encrypt Your Online Conversations

Do you ever get the feeling that somebody might be listening to or reading your private conversations? You're not crazy.  Online platforms don’t hide that they use data from chats, searches, emails, and other places for targeted advertisements. Aside from being a massive invasion of privacy, it also puts your security at risk.  But it is possible to prevent people from snooping on you. All you need is a little encryption. Check out these different ways you can add encryption into...

   DATA SECURITY,VPN     2020-01-30 07:33:29

  A completely new approach to surveillance - should you be worried?

Paranoia is not necessarily a bad thing - assuming someone is really out there to get you. True or not, the paranoid have had issues they need to control explode as the internet developed, they also got specific tools to make their secrets (or their life, not everybody has a dark secret) more secure and under control. Unfortunately to them, and to the amazement of science and science fiction fans worldwide, a new way of obtaining secrets has appeared and it’s something very few expected. ...

   security     2014-08-11 05:41:58

  MySQL index optimization

Problem description: We need to access a very big table which has 40 million records. In the table, id is the primary key and program_id is indexed. When executing a select query: select * from program_access_log where program_id between 1 and 4000 The above query executes very slowly, we thought it was because there were too many records in the table. So we added id in the where condition to limit the search so that each time only half a million records would be read. select * fr...

   MySQL,Index search, Partition     2012-12-26 13:14:20

  7 misunderstandings of DNS resolution

DNS resolution is generally considered as providing mapping between domain name and IP address, for example www.google.com maps to 74.125.71.103. There are two important reasons for doing DNS resolution: IP address is hard to remember, while domain name is human friendly Virtual host may access different contents according to the header of the host domain name(sub-domain name) Some webmasters may have some unreasonable requirements when doing DNS resolution. It mainly because they are not very...

   DNS resolution,misunderstanding     2012-10-20 12:57:16

  Backend-as-a-service?

As the list of *-as-a-service’s continues to grow, I thought I’d throw one into the mix. What about the idea of a backend-as-a-service (BaaS)? The recent surge of client side Javascript frameworks along with the attractiveness of simple RESTful APIs has created an environment where server-side interaction can be reduced to simply database interaction (including validation and some computation). But why stop there? What if the server-side of the equation was simply a RESTful, ...

   Web design,Backend,Service,BaaS,Client JavaScript     2011-12-29 09:07:38

  WireGuard VPN: Setup WG_VPN client App on Android phone and connect to local WG_VPN server on VM

We will show the detail steps about how to setup the WireGuard VPN client on an Android phone/pad and configure the VPN client to connect a WG_VPN server in local network. The setup process contents three main steps: Install WireGuard and create a key-pair in WireGuard client. Add the Android client peer information in the WireGuard server’s config file. Config the Android WireGuard client to connect to the server. The test environment network configuration:  Step 1. Install Wire...

   WIREGUARD,VPN,TUTORIAL     2020-10-24 08:46:42

  Select top 3 values from each group in a table with SQL

Yesterday, my friend Liu Bing asked me a question about how to select top 3 values for each person in a database table using SQL. I think this question is interesting and it deserves some thoughts. Here I record down how to solve this issue. Assume we have a table which has two columns, one column contains the names of some people and the other column contains some values related to each person. One person can have more than one value. Each value has a numeric type. The question is we want to se...

   SQL,Correlated query,top 3     2013-05-23 03:21:25

  JSON in JavaScript

When sending an AJAX request to the server, the response can have two formats : XMLHttpRequest.responseXML to access data with XML format and XMLHttpRequest.responseText to access data with string format. XML is the standard data transfer format, but one weakness is it's troublesome to parse and retrieve the data. JSON(JavaScript Object Notation) is a light weight data interchange format, we call it the JavaScript object representation. The advantage of using JSON as the data format is itself is...

   JSON,JavaScript     2013-05-04 23:25:57