
Registered since September 28th, 2017
Has a total of 4246 bookmarks.
Showing top Tags within 4 bookmarks
howto information development guide reference administration design website software solution service product online business uk tool company linux code server system application web list video marine create data experience description tutorial explanation technology build blog article learn world project boat download windows security lookup free performance javascript technical network control beautiful support london tools course file research purchase library programming image youtube example php construction html opensource quality install community computer profile feature power browser music platform mobile user process work database share manage hardware professional buy industry internet dance advice installation developer 3d search material access customer camera travel test standard review documentation css money engineering develop webdesign engine device photography digital api speed source program management phone discussion question event client story simple water marketing app content yacht setup package fast idea interface account communication cheap compare script study market live easy google resource operation startup monitor training
Tag selected: terminology.
Looking up terminology tag. Showing 4 results. Clear
Saved by uncleflo on December 17th, 2019.
ISO/IEC 27000 is part of a growing family of ISO/IEC Information Security Management Systems (ISMS) standards, the 'ISO/IEC 27000 series'. ISO/IEC 27000 is an international standard entitled: Information technology — Security techniques — Information security management systems — Overview and vocabulary. The standard was developed by subcommittee 27 (SC27) of the first Joint Technical Committee (JTC1) of the International Organization for Standardization and the International Electrotechnical Commission.[1]
standardization terminology risk certification security define assessment information management recommend standard technical approach organization commission digital assess wikipedia technology technique system overview cyber hacking web online
Saved by uncleflo on June 27th, 2018.
This document discusses the creation and maintenance of "Summary Tables". It is a companion to the document on Data Warehousing Techniques. The basic terminology ("Fact Table", "Normalization", etc) is covered in that document. Summary tables are a performance necessity for large tables. MariaDB and MySQL do not provide any automated way to create such, so I am providing techniques here. (Other vendors provide something similar with "materialized views".) When you have millions or billions of rows, it takes a long time to summarize the data to present counts, totals, averages, etc, in a size that is readily digestible by humans. By computing and saving subtotals as the data comes in, one can make "reports" run much faster. (I have seen 10x to 1000x speedups.) The subtotals go into a "summary table". This document guides you on efficiency in both creating and using such tables.
mysql mariadb warehouse warehousing summary table technique terminology normalization performance large material view total guide efficiency improve development developer create database average administration administrator infrastructure howto blog article description solution
Saved by uncleflo on July 10th, 2017.
This post describes OAuth 2.0 in a simplified format to help developers and service providers implement the protocol. The OAuth 2 spec can be a bit confusing to read, so I've written this post to help describe the terminology in a simplified format. The core spec leaves many decisions up to the implementer, often based on security tradeoffs of the implementation. Instead of describing all possible decisions that need to be made to successfully implement OAuth 2, this post makes decisions that are appropriate for most implementations.
openauthentication oauth opensource simplified simple article blog writer terminology description administration develop developer code howto explanation post implement website security
Saved by uncleflo on June 20th, 2014.
A promise represents the eventual result of an asynchronous operation. The primary way of interacting with a promise is through its then method, which registers callbacks to receive either a promise's eventual value or the reason why the promise cannot be fulfilled. This specification details the behavior of the then method, providing an interoperable base which all Promises/A+ conformant promise implementations can be depended on to provide. As such, the specification should be considered very stable. Although the Promises/A+ organization may occasionally revise this specification with minor backward-compatible changes to address newly-discovered corner cases, we will integrate large or backward-incompatible only after careful consideration, discussion, and testing.
js promise concept javascript implement operation interaction specification clause extend spec method terminology standard event value reason register result development code github library
No further bookmarks found.