Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- SOFTWARE SOLUTIONS



  Top 25 Must Have Wordpress Plugins for 2016

There are nearby 30 thousand WordPress plug-ins available in the market. But you must know the plug-ins, that are worthy for you according to your business & requirements. Here is the list of top 25 WordPress plug-ins according to me & my team that may helpful for you.   1. WordPress SEO by Yoast - Best SEO plugin:   Yoast SEO, previously known as a WordPress SEO by Yoast, specially used to boost search engine traffic on your WordPress website. Just install this plug-in and be...

   WORDPRESS PLUGIN DEVELOPMENT,MUST HAVE WORDPRESS PLUGINS,BEST WORDPRESS PLUGINS FOR WEBSITE,WORDPRES     2016-03-10 05:04:26

  4 deployment modes of Redis

As a high-performance in-memory database, Redis is widely used in current mainstream distributed architecture systems. To improve system fault tolerance, using multiple instances of Redis is also inevitable, but the complexity is much higher than that of a single instance. This article mainly introduces the four deployment modes of Redis and their advantages and disadvantages. Standalone Standalone mode is to install a Redis, start it, and business connects to it and that's all. The specific ...

   REDIS,STANDALONE,MASTER-SLAVE,SENTINEL,CLUSTER     2023-03-03 21:35:09

  The four key figures behind the success of JavaScript - Douglas Crockford

JavaScript's success can be attributed to at least four key figures: Brendan Eich, the creator of JavaScript Douglas Crockford, the creator of JSLint and JSON John Resig, the creator of jQuery Ryan Dahl, the creator of Node.js. We are already very familiar with Brendan Eich and the invention process of JavaScript, so let's start with Douglas Crockford, the second in command of JavaScript. Alliance In the 1990s, Microsoft's dominance overshadowed the whole world. At this time, two challengers e...

   JAVASCRIPT,DOUGLAS CROCKFORD,HISTORY     2023-05-07 06:42:30

  Chinese Developers Release CEC-IDE, Claimed as First Independently Developed IDE

China witnessed the recent launch of a new IDE called CEC-IDE, which boldly claims to be the first IDE independently developed by Chinese developers. Initially, this release was anticipated to be a moment of pride for the country, as it marked the availability of a homegrown IDE. However, the situation quickly took an embarrassing turn, and the entire narrative soon became a subject of ridicule. It has come to light that the so-called independently developed IDE, CEC-IDE, is actually built upon ...

   CHINA,CECIDE,CEC-IDE     2023-08-27 00:43:31

  Why (offset, limit) is slow in database select?

Starting from a problem Five years ago when I was working at Tencent, I found that MySQL request speed was very slow in the pagination scenario. With only 100,000 data, a select query on a single machine took about 2-3 seconds. I asked my mentor why, and he asked in return, "In an indexing scenario, what is the time complexity to get the nth largest number in MySQL?" The pursuit of the answer Confirming the scenario Assuming there is an index on the "status" column, a query like "select * from t...

   SLOW,LIMIT,OFFSET,MYSQL     2023-03-12 05:21:02

  Find where the start up page is set in Firefox

Recently I encountered a weird behavior where a strange webpage showing up every time when I launched my Firefox. The first thought came into my mind is that my homepage of Firefox had been tampered. It might be changed because some software changed my browser settings to promote something. So the next immediate thing I went to check was to see my Firefox browser settings. To my surprise, the homepage setting was not touched. It would still open the Momentum screen which would display some beaut...

   WINDOWS,FIREFOX,HOMEPAGE,STARTUP PAGE,HAO123     2021-10-02 02:28:53

  Encrypting and decrypting PGP file or text on MacOS

When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...

   PGP,GPG,ENCRYPTION,DECRYPTION,TUTORIAL     2020-10-29 05:06:09