SEARCH KEYWORD -- attachment
Create trigger in MySQL
To create trigger in MySQL, the syntax is :CREATE [DEFINER = { user | CURRENT_USER }] TRIGGER trigger_name trigger_time trigger_event ON tbl_name FOR EACH ROW trigger_bodyOne example is :DELIMITER %%DROP TRIGGER IF EXISTS delete_commentCREATE TRIGGER delete_comment AFTER DELETE ON file_generate_infoFOR EACH ROW BEGIN DELETE FROM article_comment WHERE article_id=OLD.article_id;END%%The whole create trigger statement should be complete statement but not many separate com...
MySQL,Trigger,Dilimiter,phpMyAdmin 2011-04-20 15:35:30
Recover deleted file in Linux EXT3 file system
Environment : CentOS 5.3 x86_64, /dev/sdb1 is the data segment /data0. EXT3 file system. Problem : /data0/tcsql/cankao/phpcws-1.5.0/httpcws.cpp is deleted mistakenly and httpcws.cpp is not backed up. It will take much time to rewrite this program again. So we must recover it back. debugfs is feasible in EXT2 file system, but in EXT3 file system, it's not very useful. There is one open source software called ext3grep which can help us recover deleted file in EXT3 file system. The recovery steps a...
Linux,EXT3,File recovery 2013-08-16 07:06:45
Address of a Java Object
In conventional java programming, you will never need address or location of a java object from memory. When you discuss about this in forums, the first question raised is why do you need to know the address of a java object? Its a valid question. But always, we reserve the right to experiment. Nothing is wrong in exploring uncharted areas.I thought of experimenting using a little known class from sun package. Unsafe is a class that belongs to sun.misc package. For some of you the package might ...
Java,Object,Address,Memory,Start address 2011-09-29 11:17:46
A Programmer’s Greatest Enemy
A programmer’s greatest enemy is getting stuck. A crucial skill in programming—and one that many of my beginning game programming students lack—is the ability to recognize when they’re stuck, to get out of being stuck, and to avoid getting stuck in the first place.Indeed, it’s a skill I’m still learning myself, although the contexts in which I still get stuck are shrinking with time, study, and experience.This morning, as I downloaded crash reports ...
Programming,Enemy,Stuck,Game design,Crash 2011-10-15 15:06:46
A return to good code
Stop doing this:public boolean foo() { if (true) { return true; } else { return false; }}It always amazes me when I dig into an open source project, and I see code written by supposed experts, and reviewed by seasoned professionals, and nobody slaps the wrists of the developer who shoves return statements right in the middle of a method.Tell me, how hard is it to do this:public boolean foo() { boolean flag = true; ...
Java’s toLowerCase() has got a surprise for you!
Have you ever encountered a surprise while using toLowerCase()? This is a widely used method when it comes to strings and case conversion. There is a nice little thing you should be aware of. toLowerCase() respects internationalization (i18n). It performs the case conversion with respect to your Locale. When you call toLowerCase(), internally toLowerCase(Locale.getDefault()) is getting called. It is locale sensitive and you should not write a logic around it interpreting loca...
Java,toLowerCaser(),Locale specific,Stra 2011-09-29 11:21:07
Great code is written twice (or more)
The last couple of years more and more people have been moving towards Agile development. These techniques aren’t new, most we’re devised in the 80s or 90s. But finally these days programmers and (more importantly) business consultants, architects and clients have learned to love and embrace Agile development.Evolving requirementsIt has now become common knowledge that you can’t write down all the requirements before you start the project. These requirements h...
Twice,Good code,Recoding,Agile,Evolvement 2011-11-01 00:36:35
Why isn't all internet traffic encrypted?
The biggest problem is that you must be able to verify that you're encrypting to the correct key. Without it, encryption would be practically useless, as anyone could perform a man-in-the-middle attack on the connection and remain undetected.In typical SSL/TLS, as well as other protocols using X.509, this verification is performed by "certification authorities", which are explicitly marked as "trusted" by web browsers and operating systems. Unfortunately, these CAs usual...
Internet,Traffic,Encryption,Decryption,Security 2011-10-15 15:03:37
It’s Not Too Late to Learn How to Code
Coding is sort of like a superpower; with it you can create things that millions of people see. You can change the way people behave, the way they think, and the way they interact with others. This is beyond awesome, but I’ve also met a lot of people that think that this ability is inaccessible to them. I’ve met a lot of “non-technical†people who seem to think that this superpower is only bestowed on those fortunate enough to have it come easily to them at a very early...
Tips,Coding,Preparation,Interest 2011-10-17 11:26:38
GUI vs CLI: Operation vs Expression
Consider this user interface for a car:The goal of these interfaces is to make you operate something, and operate it efficiently and safely. The grooves and clicks and limits constrain the range of motion and the number of choices. The visual look heavily hints at how to actively use it. They are usually not hard to learn. More importantly, the learning curve plateaus. Once you learn how to drive a car, there’s not much progression after that. Boundedness is ...
GUI,CLI,Operation,Expression,Programmer,IDE 2011-10-25 10:31:26
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>