Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Select



  Creating Working application in 15 minutes in ASP.NET MVC with Entity Framework and Scaffolded Items

You can create a working application in asp.net MVC at your place. Asp.net development services providers bring this tutorial to make you learn about the use of Entity framework and Scaffolded items for asp.net mvc application development. Read this and share your experience at the end. In this post we going to use Microsoft technology to create a fully working web application which going to contain a fully featured CRUD capabilities. So first of all let’s create, a new table which going t...

   ASP.NET ,COMPANY,DEVELOPMENT,SERVICES     2016-12-21 00:10:00

  4 deployment modes of Redis

As a high-performance in-memory database, Redis is widely used in current mainstream distributed architecture systems. To improve system fault tolerance, using multiple instances of Redis is also inevitable, but the complexity is much higher than that of a single instance. This article mainly introduces the four deployment modes of Redis and their advantages and disadvantages. Standalone Standalone mode is to install a Redis, start it, and business connects to it and that's all. The specific ...

   REDIS,STANDALONE,MASTER-SLAVE,SENTINEL,CLUSTER     2023-03-03 21:35:09

  Why (offset, limit) is slow in database select?

Starting from a problem Five years ago when I was working at Tencent, I found that MySQL request speed was very slow in the pagination scenario. With only 100,000 data, a select query on a single machine took about 2-3 seconds. I asked my mentor why, and he asked in return, "In an indexing scenario, what is the time complexity to get the nth largest number in MySQL?" The pursuit of the answer Confirming the scenario Assuming there is an index on the "status" column, a query like "select * from t...

   SLOW,LIMIT,OFFSET,MYSQL     2023-03-12 05:21:02

  How to check a port is taken by which program on Linux

Lots of you may have encountered some error message stating that the port has been taken by another program while trying to start a program on Linux. And you would want to know which program takes the port you want to use. This post will provide some feasible ways to check out which program is taking a specific port. lsof -i:[port] lsof is the command to list open files on Linux. And if you know more about Linux you should get to know everything on Linux is a file even including networ...

   LINUX,PORT,NETSTAT,LSOF     2018-08-12 04:27:57

  How to check when an API is introduced in GoLang

Normally people would not pay much attention to which GoLang version is being used as lots of functions are backward compatible. However there are cases where GoLang version does matter as some functions may not be supported by old version of GoLang. For example, strings.Builder is introduced in Go 1.10, but below code would fail to be compiled on Go 1.10. package main import ( "fmt" "strings" ) func main() { var b strings.Builder b.WriteString("polarisxu") fmt.Println(b.Cap()) } The ...

   GOLANG,API VERSION,GO TOOL     2021-02-07 00:43:24

  Install and use GSpace to install apps from Google Play on Huawei Harmony OS

Huawei has released its own branded mobile OS Harmony OS sometime back and some Huawei device models now support installing or upgrading to use Harmony OS. Since this OS is Huawei's own OS and it doesn't come with Google Play by default which most of the current Android apps are hosted on. In this case, how can someone install the apps from Google Play on Huawei Harmony OS or use GMS services like Google Play, Google Maps? The solution provided by Huawei is to install GSpace which is an APP cont...

   HUAWEI,GOOGLE PLAY,HARMONYOS     2021-08-01 04:23:58

  Encrypting and decrypting PGP file or text on MacOS

When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...

   PGP,GPG,ENCRYPTION,DECRYPTION,TUTORIAL     2020-10-29 05:06:09