uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4281 bookmarks.

Showing top Tags within 4 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   online   service   product   business   uk   tool   company   linux   code   server   application   system   web   list   video   marine   create   data   experience   tutorial   description   explanation   learn   technology   build   article   blog   world   project   boat   download   windows   lookup   security   free   performance   javascript   technical   london   beautiful   control   network   tools   support   course   file   research   purchase   image   library   programming   youtube   example   php   construction   install   opensource   community   html   quality   computer   feature   profile   power   browser   music   platform   process   mobile   work   user   share   manage   professional   database   hardware   buy   industry   advice   internet   dance   developer   installation   camera   search   3d   access   customer   travel   material   standard   money   test   develop   review   documentation   css   engineering   photography   engine   webdesign   device   digital   speed   event   api   source   management   question   program   client   phone   discussion   content   simple   story   water   marketing   yacht   app   account   setup   interface   package   idea   fast   communication   compare   cheap   script   market   study   easy   live   google   resource   operation   demonstration   contact   startup  


Tag selected: terminology.

Clear all

Showing 4 results.

Looking up terminology tag. Showing 4 results. Clear

ISO/IEC 27000 Cyber Security - Wikipedia

https://en.wikipedia.org/wiki/ISO/IEC_27000

Saved by uncleflo on December 17th, 2019.

ISO/IEC 27000 is part of a growing family of ISO/IEC Information Security Management Systems (ISMS) standards, the 'ISO/IEC 27000 series'. ISO/IEC 27000 is an international standard entitled: Information technology — Security techniques — Information security management systems — Overview and vocabulary. The standard was developed by subcommittee 27 (SC27) of the first Joint Technical Committee (JTC1) of the International Organization for Standardization and the International Electrotechnical Commission.[1]

standardization terminology risk certification security define assessment information management recommend standard technical approach organization commission digital assess wikipedia technology technique system overview cyber hacking web online


Data Warehousing Summary Tables

https://mariadb.com/kb/en/library/data-warehousing-summary-tables/

Saved by uncleflo on June 27th, 2018.

This document discusses the creation and maintenance of "Summary Tables". It is a companion to the document on Data Warehousing Techniques. The basic terminology ("Fact Table", "Normalization", etc) is covered in that document. Summary tables are a performance necessity for large tables. MariaDB and MySQL do not provide any automated way to create such, so I am providing techniques here. (Other vendors provide something similar with "materialized views".) When you have millions or billions of rows, it takes a long time to summarize the data to present counts, totals, averages, etc, in a size that is readily digestible by humans. By computing and saving subtotals as the data comes in, one can make "reports" run much faster. (I have seen 10x to 1000x speedups.) The subtotals go into a "summary table". This document guides you on efficiency in both creating and using such tables.

mysql mariadb warehouse warehousing summary table technique terminology normalization performance large material view total guide efficiency improve development developer create database average administration administrator infrastructure howto blog article description solution


OAuth 2 Simplified

https://aaronparecki.com/oauth-2-simplified/

Saved by uncleflo on July 10th, 2017.

This post describes OAuth 2.0 in a simplified format to help developers and service providers implement the protocol. The OAuth 2 spec can be a bit confusing to read, so I've written this post to help describe the terminology in a simplified format. The core spec leaves many decisions up to the implementer, often based on security tradeoffs of the implementation. Instead of describing all possible decisions that need to be made to successfully implement OAuth 2, this post makes decisions that are appropriate for most implementations.

openauthentication oauth opensource simplified simple article blog writer terminology description administration develop developer code howto explanation post implement website security


promises-aplus/promises-spec

https://github.com/promises-aplus/promises-spec

Saved by uncleflo on June 20th, 2014.

A promise represents the eventual result of an asynchronous operation. The primary way of interacting with a promise is through its then method, which registers callbacks to receive either a promise's eventual value or the reason why the promise cannot be fulfilled. This specification details the behavior of the then method, providing an interoperable base which all Promises/A+ conformant promise implementations can be depended on to provide. As such, the specification should be considered very stable. Although the Promises/A+ organization may occasionally revise this specification with minor backward-compatible changes to address newly-discovered corner cases, we will integrate large or backward-incompatible only after careful consideration, discussion, and testing.

js promise concept javascript implement operation interaction specification clause extend spec method terminology standard event value reason register result development code github library


No further bookmarks found.