Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Ways



  4 ways to obtain access token in OAuth 2.0

OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...

   OAUTH2,ACCESS TOKEN,REFRESH TOKEN     2019-06-29 07:12:03

  Algorithm: Traverse binary tree

Preface There are three ways to traverse a binary tree based on the traversing order. Pre-Order: Root - Left - Right In-Order: Left - Root - Right Post-Order: Left - Right - Root Take below binary tree as example The node to be traversed in different order would be Pre-Order: A - B - C - D - E - F In-Order: C - B - D - A - E - F Post-Order: C - D - B - F - E - A Below are the implementations of different orders for traversing the binary tree. Pre-Order Traversing Recursive implementation N...

   ALGORITHM,BINARY TREE     2019-03-01 22:49:04

  Cybersecurity | The New Dangers That Lurk Online and Their Solutions

(Image source: Pexels) Data is one of the most important things to us. While robbers that steal valuables like laptops, phones, or money are still a threat, cybercrimes are also more dangerous than ever. That’s because your data is far more valuable than you might think. Companies benefit from users’ data by applying it for their indexing, marketing, and accumulation needs. They actively use this information to sell you more products. Have you ever visited Amazon and instantly got a ...

   DATA SECURITY,VPN     2020-04-23 06:47:37

  trim() in JavaScript

In the past, JavaScript didn't define the trim() function for String object. This makes web programmers frustrated since they often need to implement this function themselves if they want to handle user inputs. The new version of ECMA-262 introduces the trim() function.15.5.4.20   String.prototype.trim ( )     The following steps are taken:     1.   Call CheckObjectCoercible passing the this value as its argument.   2.   Let S...

   JavaScript,trim(),implementation     2012-07-19 10:58:01

  5 Ways to Boost MySQL Scalability

There are a lot of scalability challenges we see with clients over and over. The list could easily include 20, 50 or even 100 items, but we shortened it down to the biggest five issues we see.1. Tune those queriesBy far the biggest bang for your buck is query optimization. Queries can be functionally correct and meet business requirements without being stress tested for high traffic and high load. This is why we often see clients with growing pains, and scalability challenges as their site becom...

   MySQL,Scalability,Methods,Implementation,Practice     2011-10-18 02:57:27

  Are You a Good Programmer?

If someone asks you to recommend a good programmer, who comes to mind? Do you consider yourself a good programmer? What criteria do you use to judge? In thinking about this, I realized that there are different ways that a programmer can be good. So I present to you The Four Kinds of Good Programmers. And in celebration of Whyday, I include quirky Why-styled illustrations* for your viewing pleasure! The Philosopher The PhilosopherThe philosopher loves to write well-defined, well-structured...

   Programmer,Inventor,Philosopher,Conquero     2011-08-23 07:56:26

  How to Set Spring profile With Example

Technology:  Spring Profiles provides a way to isolates the parts of application configuration, it will make available only in certain environments. It is mainly useful it wants to load spring beans based on environment configuration, for example if the operating system is windows we can load some specific spring beans, if it is other than load different spring beans. One more scenario where spring profiles widely used, like for QA environment we will use some database which is hosted local...

   JAVA,PROFILE,SPRING,DEVELOPMENT,APPLICATIONS     2018-07-20 01:17:23

  JavaScript: Passing by Value or by Reference

In JavaScript, we have functions and we have arguments that we pass into those functions. But how JavaScript handles what you’re passing in is not always clear. When you start getting into object-oriented development, you may find yourself perplexed over why you have access to values sometimes but not other times. When passing in a primitive type variable like a string or a number, the value is passed in by value. This means that any changes to that variable while in the function are com...

   JavaScript,Function,Pass by reference,Pa     2011-07-28 11:05:25

  How-to: Remotely shut down your computer

Think of this scenario; You are lying in bed and just finished watching a movie that you were streaming from a computer downstairs. You want to sleep, but you need to head downstairs to turn the computer off. Save some time, and do it from the computer upstairs.There are a number of ways that you can restart or shutdown remote computers. You could use a remote desktop connection, but there are quicker ways and we will look at them today.This article will show you various methods you ca...

   Windows,Shutdown,Remote control,Cmd     2011-10-10 06:18:44

  Career Advancement: How to Achieve Success

Your career is key in terms of making the money that you want and providing a service that you've always dreamed of offering. Regardless of the type of career that you both want or have, there are many ways for you to advance within the field. By taking charge of your goals and doing something about them, you will be able to earn the amount of money that you want to become a true success. Get a More Specific Education Getting an education is a wonderful way for you to advance within your workpla...

   CAREER,EDUCATION     2020-03-17 01:41:39