![]() |
Saturday, November 11, 2023
QR Codes : Cyber Security Tips
Wednesday, January 11, 2023
ChatGPT VS Creativity
ChatGPT VS Creativity
ChatGPT and its predecessor InstructGPT from the OpenAI model in time I believe will make it difficult to produce creative work over the course of years. Of course this is not the indented use of the ChatGPT. With over 1 million users in the opening week, ChatGPT has the potential interest to be a contender that has other similar Chat bot engines a run for their money. I am no stranger to having used other chatbot models like Google's DialogFlow in a test environment.
Saturday, April 30, 2022
Rise of the AI and ML Era and Privacy Concerns
Rise of the AI and ML Era and Growing Privacy Concerns
Tuesday, March 6, 2018
ASIAN, Inc. Fraud Page
Hey come check out this page on Cyber Crime and Fraud Protection that me and my team put together on ASIAN, Inc.. Learn about the different ways you could be taken advantage of and how hackers operate to get there hands on your personal data.
ASIAN, Inc. Fraud Page
Sunday, January 17, 2016
Lifelock Personalized Security
Tuesday, February 19, 2013
HTML5 Game Programming
Thursday, January 5, 2012
Troubleshooting BigBlueButton Server
What is BigBlueButton?
BigBlueButton (BBB) Server is an opensource video conferencing/desktop sharing/presentation server that runs on a Linux box which is what we needed at our office. It is composed of a collection 15 or more opensource technologies. BigBlueButton also supportsTuesday, September 20, 2011
To Cache or Not to Cache That is the Question?? Memcached
In a Memcached Client, the tables that are most frequently used in a highly utilized database are inserted into memory of the Memcached Server where they are stored and queried from by the application layer. This is useful where the application is in high demand and data is considered a necessity for the user-base and performance is key to retaining users.
Financially Feasible
From a technical stand point, one can see that this technology would be a memory hog. However, that is an added benefit when considering performance and finances. Since it uses memory for speed, you could have one or more budget server(s) to handle your cached system. The CPU and HD is in less of a demand for Memcached to be enabled than a traditional database.
Monday, September 12, 2011
A Cryptic Approach To Cryptography
Scenario
Lets say that you have a list of passwords and usernames stored in a db generated from your web/intranet app. If your like me, you only want the best in security for your users. So you go shopping for encryption technology.
Wednesday, February 2, 2011
MySQL Temporary Table Bug ERROR #1137
I was trying to create test environment based on my tables so that I could have a place to advance on this stored routine. The MEMORY storage engine provided me the comfort of performance and the fact that
Friday, December 10, 2010
Video Example: 6-minute jQuery Jumpstart with the slideUp effect - Marakana
Saturday, May 22, 2010
MySQL MATCH AGAINST Query ERROR 1191
ERROR 1911 (HY000): Can't find FULLTEXT index matching the column list.
Wednesday, May 12, 2010
Windows Security Fail!!!! lol
Monday, March 1, 2010
Validating by White List approval
Friday, February 19, 2010
MySQL Replication Explained
One of the many features of MySQL to keep your database live and productive is MySQL Replication.
Note: this entry will cover asynchronous replication.
So whats this technology all about anyways?Replication is data that is reproduced in one or more locations. It consists of two or more servers, normally, in its simplest form, one master server and its slave server(s).
Wednesday, February 17, 2010
PHP Protection from XSS attacks
What is an Cross-Site Scripting (XSS) Attack?
Cross site scripting vulnerabilities are produced when a web site displays unfiltered user generated input on to the site. By allowing users to supply their own content, hackers can figure out ways to get malicious content on the website by injecting it with their own scripts via javascript and change the
