
Registered since September 28th, 2017
Has a total of 4246 bookmarks.
Showing top Tags within 44 bookmarks
howto information development guide reference administration design website software solution service product online business uk tool company linux code server system application web list video marine create data experience description tutorial explanation technology build blog article learn world project boat download windows security lookup free performance javascript technical network control beautiful support london tools course file research purchase library programming image youtube example php construction html opensource quality install community computer profile feature power browser music platform mobile work user process database share manage hardware professional buy industry internet dance advice installation developer 3d search camera access material customer travel test standard review documentation css money engineering webdesign engine develop device photography digital api speed source program management phone discussion question event client story simple water marketing yacht app content setup package fast idea interface account communication cheap compare script study market easy live google resource operation startup monitor training
Tag selected: protocol.
Looking up protocol tag. Showing 44 results. Clear
Saved by uncleflo on January 14th, 2022.
Porn is a big industry. There aren't many sites on the Internet that can rival the traffic of its biggest players. And juggling this immense traffic is tough. To make things even harder, much of the content served from porn sites is made up of low latency live streams rather than simple static video content. But for all of the challenges involved, rarely have I read about the developers who take them on. So I decided to write about my own experience on the job. And juggling this immense traffic is tough. To make things even harder, much of the content served from porn sites is made up of low latency live video streams rather than simple static video content. But for all of the challenges involved, rarely have I read about the python developers who take them on. So I decided to write about my own experience on the job. A few years ago, I was working for the 26th (at the time) most visited website in the world - not just the porn industry: the world.
python socket kinky adobe guideline spectacular streaming perverse latency logarithmic monolithic asynchronous frustrating ethernet protocol performance improve story description development technology howto traffic porn industry experience development developer website challenge video static stream tough description
Saved by uncleflo on December 23rd, 2018.
DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email-validation system designed to detect and prevent email spoofing, the use of forged sender addresses often used in phishing and email spam. It is built on top of two existing mechanisms, Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). It allows the administrative owner of a domain to publish a policy in their DNS records to specify which mechanism (DKIM, SPF or both) is employed when sending email from that domain; how to check the From: field presented to end users; how the receiver should deal with failures - and a reporting mechanism for actions performed under those policies. A DMARC policy allows a sender's domain to indicate that their emails are protected by SPF and/or DKIM, and tells a receiver what to do if neither of those authentication methods passes – such to reject the message or quarantine it. The policy can also specify how an email receiver can report back to the sender's domain about messages that pass and/or fail.[2]
sender mailbox authentication conformance mailing bounces spam validation reject domain intrusive checks signature specification message receiver mail fraudulent administration communication protocol standard blacklist clearing howto lookup information
Saved by uncleflo on October 28th, 2018.
Cloud storage as a virtual drive: Managing your favorite cloud storage services could not be easier. Simply provide login information, and all your cloud storage will automatically appear as a virtual drive every time you start your PC. Background uploading: With background uploading, NetDrive 3 uploads your files to remote storage without overheads and you will not want to live without this feature. Multiple Mount Options: You can control when to mount your drive. With NetDrive 3 now you can mount your drive on system boot time without login. With this option you can use your remote storage with system services. NAS storage as a virtual drive: You can connect to NAS servers by WebDAV or FTP. Many NAS vendors recommend NetDrive as a standard way to mount their NAS products. Share your NAS easily with anyone as virtual drive.
SFTP to securely transfer files. NetDrive supports secure file transfer by SFTP (SSH File Transfer protocol) . Unlike standard File Transfer Protocol (FTP), SFTP encrypt both commands and data, preventing passwords and sensitive information from being transmitted in clear text over a network.
net drive upload cloud remote storage live feature mount control system nas server webdav ftp vendor recommend transfer file support secure protocol transmit network command data prevent protect pc online service connect
Saved by uncleflo on October 23rd, 2018.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features. While hping was mainly used as a security tool in the past, it can be used in many ways by people that don't care about security to test networks and hosts.
ping commandline tcp ip packet command protocol traceroute channel feature security tool test network host analyse administration infrastructure server computer unix
Saved by uncleflo on October 23rd, 2018.
iPerf3 is a tool for active measurements of the maximum achievable bandwidth on IP networks. It supports tuning of various parameters related to timing, buffers and protocols (TCP, UDP, SCTP with IPv4 and IPv6). For each test it reports the bandwidth, loss, and other parameters. This is a new implementation that shares no code with the original iPerf and also is not backwards compatible. iPerf was orginally developed by NLANR/DAST. iPerf3 is principally developed by ESnet / Lawrence Berkeley National Laboratory. It is released under a three-clause BSD license.
tool active measurement bandwidth network ip protocol tcp udp sctp buffer parameter implementation compatible release software testing solution utility online information
Saved by uncleflo on February 7th, 2018.
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Lightweight Directory Access Protocol (LDAP) search filters are transmitted in the LDAP protocol using a binary representation that is appropriate for use on the network. This document defines a human-readable string representation of LDAP search filters that is appropriate for use in LDAP URLs (RFC 4516) and in other applications.
ldap document directory protocol string rfc standard technology community request discussion improvement improve specification binary representation search filter url application howto reference lookup internet suggestion administration
Saved by uncleflo on January 24th, 2018.
Find detailed information about the Bitcoin protocol and related specifications. The Developer Guide aims to provide the information you need to understand Bitcoin and start building Bitcoin-based applications, but it is not a specification. To make the best use of this documentation, you may want to install the current version of Bitcoin Core, either from source or from a pre-compiled executable.
detail technical bitcoin protocol specification guide information understand build application develop version core source execute server daemon reference howto development blockchain learn block transaction
Saved by uncleflo on January 24th, 2018.
This page describes the behavior of the reference client. The Bitcoin protocol is specified by the behavior of the reference client, not by this page. In particular, while this page is quite complete in describing the network protocol, it does not attempt to list all of the rules for block or transaction validity.
behavior client protocol reference describe rule transaction block explanation howto technical development code wiki bitcoin documentation
Saved by uncleflo on December 28th, 2017.
In computing, a comma-separated values (CSV) file stores tabular data (numbers and text) in plain text. Each line of the file is a data record. Each record consists of one or more fields, separated by commas. The use of the comma as a field separator is the source of the name for this file format. The CSV file format is not standardized. The basic idea of separating fields with a comma is clear, but that idea gets complicated when the field data may also contain commas or even embedded line-breaks. CSV implementations may not handle such field data, or they may use quotation marks to surround the field. Quotation does not solve everything: some fields may need embedded quotation marks, so a CSV implementation may include escape characters or escape sequences. In addition, the term "CSV" also denotes some closely related delimiter-separated formats that use different field delimiters. These include tab-separated values and space-separated values. A delimiter that is not present in the field data (such as tab) keeps the format parsing simple. These alternate delimiter-separated files are often even given a .csv extension despite the use of a non-comma field separator. This loose terminology can cause problems in data exchange. Many applications that accept CSV files have options to select the delimiter character and the quotation character.
csv text format data plain text line file record field comma separator description store exchange specification export database spreadsheet platform stream list information type sequence proprietary standard wikipedia development howto reference administration rule technology recommendation protocol
Saved by uncleflo on December 27th, 2017.
Apache CXF™ is an open source services framework. CXF helps you build and develop services using frontend programming APIs, like JAX-WS and JAX-RS. These services can speak a variety of protocols such as SOAP, XML/HTTP, RESTful HTTP, or CORBA and work over a variety of transports such as HTTP, JMS or JBI. CXF includes a broad feature set, but it is primarily focused on the following areas: Web Services Standards Support: CXF supports a variety of web service standards including SOAP, the WS-I Basic Profile, WSDL, WS-Addressing, WS-Policy, WS-ReliableMessaging, WS-Security, WS-SecurityPolicy, WS-SecureConverstation, and WS-Trust (partial). Frontends: CXF supports a variety of "frontend" programming models. CXF implements the JAX-WS APIs. CXF JAX-WS support includes some extensions to the standard that make it significantly easier to use, compared to the reference implementation: It will automatically generate code for request and response bean classes, and does not require a WSDL for simple cases.It also includes a "simple frontend" which allows creation of clients and endpoints without annotations. CXF supports both contract first development with WSDL and code first development starting from Java.
apache serverside cxf opensource service framework build develop frontend programming development api protocol restful http feature extension reference installation howto implement standard wsdl guide lookup adminsitration
Saved by uncleflo on July 10th, 2017.
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.
authorization framework oauth resource interaction authentication standardization standard description rfc specification development administration protocol approval access document
Saved by uncleflo on June 23rd, 2017.
This site describes the Infinote protocol as currently implemented by libinfinity. It provides real-time collaborative editing of documents with the main focus being on collaborative plain text editing. In the meanwhile there are quite a few solutions out there, but all of them implement a different protocol and thus cannot be used with other tools. Our goal is to provide a flexible yet powerful open framework and clients for various environments that can interoperate with each other.
realtime operational-transformation synchroniration library protocol text power framework client js solution provide implementation description data share specification operation tool
Saved by uncleflo on June 21st, 2017.
Gérald Oster is an Associate Professor at TELECOM Nancy, University of Lorraine since 2006. He is a member of the Inria Coast project-team. He has an expertise in distributed collaborative systems with a focus on content replication mechanisms and their applicability. He received his Ph.D. in Computer Science from Nancy University in 2005. During his Ph.D., he worked on verification of correctness of a family of optimistic replication mechanisms (operational transformation) dedicated to collaborative editing. He proposed a framework based on an automated theorem prover and several sets of verified transformation functions for multiple data types. He worked on the design and the implementation of a universal file synchronizer. He is one of the pioneers of the CRDT approach as he participated in the design of the WOOT algorithm that initiated researches on these distinctive data structures. He is currently investigating the limitations and the applicability in diverse domains of these novel replicated data structures. Gérald is or was involved in several research projects and participated in several technologies transfer-oriented projects.
research university replication project team collaborative system distributed computer science teamwork website protocol
Saved by uncleflo on June 21st, 2017.
jinfinote is a JavaScript implementation of the Infinote protocol, an open
standard for software supporting collaborative real-time editing of text
files. The goal of this project is to aid in creating a collaborative real-time editor
for the web, similar to EtherPad. Desktop editors such as Gobby are already
available for many platforms, and the intention is to close the missing link to
the web browser.
js script development library collaborative editing form website collaboration team teamwork editor desktop protocol implementation web panel administration
Saved by uncleflo on May 5th, 2017.
OAuth provides a method for clients to access server resources on behalf of a resource owner (such as a different client or an enduser). It also provides a process for end-users to authorize third-party access to their server resources without sharing their credentials (typically, a username and password pair), using useragent redirections.
client access server resource oauth rfc protocol description technical internet standard specification owner authorize credentials share request token login authenticate
Saved by uncleflo on February 8th, 2017.
In the Internet Protocol version 4 (IPv4) [RFC791] there is a field called "Protocol" to identify the next level protocol. This is an 8 bit field. In Internet Protocol version 6 (IPv6) [RFC2460], this field is called the "Next Header" field.
administration server network infrastructure data protocol number assignment iana assign field value reference list lookup standard world internet
Saved by uncleflo on January 27th, 2017.
In transaction processing, databases, and computer networking, the two-phase commit protocol (2PC) is a type of atomic commitment protocol (ACP). It is a distributed algorithm that coordinates all the processes that participate in a distributed atomic transaction on whether to commit or abort (roll back) the transaction (it is a specialized type of consensus protocol). The protocol achieves its goal even in many cases of temporary system failure (involving either process, network node, communication, etc. failures), and is thus widely used.[1][2][3] However, it is not resilient to all possible failure configurations, and in rare cases, user (e.g., a system's administrator) intervention is needed to remedy an outcome. To accommodate recovery from failure (automatic in most cases) the protocol's participants use logging of the protocol's states. Log records, which are typically slow to generate but survive failures, are used by the protocol's recovery procedures. Many protocol variants exist that primarily differ in logging strategies and recovery mechanisms. Though usually intended to be used infrequently, recovery procedures compose a substantial portion of the protocol, due to many possible failure scenarios to be considered and supported by the protocol.
distributed rdbms transaction theory explanation administration wikipedia article howto protocol business service inter-service algorithm
Saved by uncleflo on December 2nd, 2016.
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.
document internet transaction protocol version standard description ietf organization official request community tip technical howto server distributed
Saved by uncleflo on December 2nd, 2016.
One of the most interesting domains of future Internet applications will be located in the area of electronic commerce, where online products and services are offered. Products of value are accounted by monetary transactions, involving a bank or credit card service to handle the electronic cash flow. To achieve a reliable and consistent flow of information in these applications, the concept of transactions has been proven to be the right choice.
transaction tip protocol description example test internet practice www application online multiple adminsitration research development security analysis reference paper document howto pdf download useful
Saved by uncleflo on November 28th, 2016.
This is a simplified SMPP client lib for sending or receiving smses through SMPP v3.4. In addition to the client, this lib also contains an encoder for converting UTF-8 text to the GSM 03.38 encoding, and a socket wrapper. The socket wrapper provides connection pool, IPv6 and timeout monitoring features on top of PHP's socket extension. This lib has changed significantly from it's first release, which required namespaces and included some worker components. You'll find that release at 1.0.1-namespaced. This lib requires the sockets PHP-extension, and is not supported on Windows. A windows-compatible version is also available.
smpp encode repository github project feature monitor receive transmit gsm sms message protocol php development code client library connect cloud service provider extension wrapper socket technology implement
Saved by uncleflo on November 17th, 2016.
Web Service Atomic Transaction is an OASIS standard. To achieve all-or-nothing property for a group of services, it defines three protocols (completion, volatile two-phase commit, and durable two-phase commit), and a set of services. These protocols and services together ensure automatic activation, registration, propagation and atomic termination of Web services. The protocols are implemented via the WS-Coordination context management framework and emulate ACID transaction properties. Following the standard, a distributed transaction has a coordinator, an initiator, and one or more participants. This document describes the WS-AtomicTransaction namespace. It also contains a directory of links to related resources using Resource Directory Description Language (RDDL) 2.0.
atomic atomicity transaction data service webservice oasis web complete commit rollback online activation phase document docs protocol register propagate implementation development administration framework communication standard manage
Saved by uncleflo on October 21st, 2016.
Web services provide access to software systems over the Internet using standard protocols. In the most basic scenario there is a Web Service Provider that publishes a service and a Web Service Consumer that uses this service. Web Service Discovery is the process of finding a suitable Web Service for a given task. Publishing a Web service involves creating a software artifact and making it accessible to potential consumers. Web Service Providers augment a Web service endpoint with an interface description using the Web Services Description Language (WSDL) so that a consumer can use the service.
uddi standard wikipedia article howto administration service discovery publish access development protocol api fast efficient implement interface describe
Saved by uncleflo on October 21st, 2016.
WSDL is an XML format for describing network services as a set of endpoints operating on messages containing either document-oriented or procedure-oriented information. The operations and messages are described abstractly, and then bound to a concrete network protocol and message format to define an endpoint. Related concrete endpoints are combined into abstract endpoints (services). WSDL is extensible to allow description of endpoints and their messages regardless of what message formats or network protocols are used to communicate, however, the only bindings described in this document describe how to use WSDL in conjunction with SOAP 1.1, HTTP GET/POST, and MIME.
xml standard document procedure information wsdl international development learn service endpoint description definition w3 consortium network protocol application administration explanation detail reference
Saved by uncleflo on October 12th, 2016.
In computer networking and databases, the three-phase commit protocol (3PC)[1] is a distributed algorithm which lets all nodes in a distributed system agree to commit a transaction. Unlike the two-phase commit protocol (2PC) however, 3PC is non-blocking. Specifically, 3PC places an upper bound on the amount of time required before a transaction either commits or aborts. This property ensures that if a given transaction is attempting to commit via 3PC and holds some resource locks, it will release the locks after the timeout.
three phase protocol commit data state howto transaction database rdbms distributed distribute partition high-availability property timeout step explanation wikipedia documentation
Saved by uncleflo on April 5th, 2015.
From the born of www era and the implementation of JavaScript and ajax, web is looking for a solution to find out real time client-server bidirectional communication. Now It is been suggested to include within HTML5 and has been in full developmental phase. Although it not yet recommenced by W3, it is been wildly implemented in most of modern web browsers including Google Chrome,Opera,Firefox and safari.
php socket websocket download source communication zone browser implementation javascript ajax library realtime http protocol development administration server webserver