Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- SVN.SSL.SERVER



  Battlelog: Modern Web Applications are Here

It's the shooter season of the year and this fall was all about Modern Warfare 3 versus Battlefield 3. And being the kind of game they are they also try to keep their audience playing by introducing some additional level of engagement. Both Call of Duty and Battlefield introduced their own online community websites and statistic platforms. Call of Duty has Elite, Battlefield has Battelog.But just because these services are sitting in the same spot it does not mean they are in any way similar. An...

   Game,Call of duty,Elite,Battlelog,Web platform     2011-11-15 08:11:40

  MySQL index optimization

Problem description: We need to access a very big table which has 40 million records. In the table, id is the primary key and program_id is indexed. When executing a select query: select * from program_access_log where program_id between 1 and 4000 The above query executes very slowly, we thought it was because there were too many records in the table. So we added id in the where condition to limit the search so that each time only half a million records would be read. select * fr...

   MySQL,Index search, Partition     2012-12-26 13:14:20

  Solve Hibernate "Too many connections" issue in MySQL

When working with Hibernate and MySQL, sometimes some exceptions will be thrown after sometime. The exception may seem like : java.sql.SQLException: Data source rejected establishment of connection, message from server: "Too many connections" This means there are too many active connections on the MySQL, you can use SHOW STATUS LIKE '%Threads_connected%'; to check the active connections to MySQL. If you want to change the maximum connections allowed to MySQL. You can execute: set global max_co...

   MySQL,Hibernate,Clos     2013-09-04 22:20:49

  Ruby WinRM undefined method `split' for nil:NilClass

WinRM service is a service provided by Windows to enable remote access a Windows system. It is similar to what SSH is for *nix. And it is frequently used in applications which want to automate process or accessing remote Windows system and perform actions on them. Ruby also provided the WinRM gem which is an implementation of the WinRM service.  When using WinRM gem, one may often want to use :negotiate as the transport protocol for authentication. This transport will negotiate using d...

   RUBY,WINRM,INIT_AUTH,PROXY     2017-03-08 02:21:09

  The requirements of DevOps development

DevOps has become a popular and commonly adopted software development model in IT industry in recent years. Its popularity is partially because it advocates it could improve software development efficiency, delivery speed and cost saving. This is especially favored by managers who become the main force to promote this type of development model in their companies. However, we must be cautious about DevOps model as well. With their advantages, they also bring challenges to development teams and th...

   AGILE,DEVOPS,SPRINT     2018-06-03 23:18:44

  The Reality

Everyone loves to talk about benchmarks. AMD’s Andy Parma recently wrote a blog that covers the top performance scores for the AMD Opteronâ„¢ 6200 Series processors. As marketing professionals, of course that’s what we talk about. What’s important to look at is the reality as well – what customers are actually purchasing. When you drive past car dealership, you’ll always see the fancy red sports car prominently displayed. It draws people in â€â...

   AMD,Intel,Comparison,AMD vs Intel processor,artitecture     2011-11-15 08:33:58

  Different types of keystore in Java -- JKS

JKS is Java Keystore, a proprietary keystore type designed for Java. It can be used to store private keys and certificates used for SSL communication, it cannot store secret keys however. The keytool shipped with JDKs cannot extract private keys stored on JKS. This type of keystore usually has an extension of jks. Next we will show how to operate the JKS keystore with pure Java code. Create JKS keystore The simplest method to create a JKS keystore to create an empty keystore. We can first get an...

   DEMO,EXAMPLE,KEYSTORE,JKS     2014-09-05 20:21:51

  Web Vs. Native: Which Is the Better Type of Mobile App?

An average US adult spends 3 hours and 15 minutes on their smartphone every day. This means that launching an app of your own is a great business opportunity. However, you need to decide whether you want to develop a native or a web app. The difference boils down to the fact that web apps run through a mobile browser and native apps are full-fledged programs. Each option has its pros and cons and can be successful under some circumstances. To make the right decision, you need to understand ...

   MOBILE,WEB APP,NATIVE APP     2018-03-26 06:35:27

  Command line todo list manager-- Taskwarrior

What is Taskwarrior? Taskwarrior is a task management tool in a terminal environment, it has powerful functions. Here is a short description about it from its official website: It maintains a task list, allowing you to add/remove, and otherwise manipulate your tasks. Task has a rich set of subcommands that allow you to do sophisticated things. You'll find it has customizable reports, charts, GTD features, device synching, documentation, extensions, themes, holiday files and much more. Installa...

   Taskwarrior,Task management     2013-08-12 23:44:20

  Some thoughts about microservice adoption

Nowadays microservice is very popular among companies with the increasing complexity of systems. The goal is to make each microservice to handle one specific job and handle it well. This normally would provide the benefit of maintaining the service easily and isolating errors and making the service more reliable and scalable. The benefits of adopting microservice are obvious. Maintainability. Decouple functions so that each function can be maintained separately which reduces the risk of issue ...

   ADVANTAGE,DISADVANTAGE,MICRO SERVICE     2020-09-05 01:25:05