Recent Posts
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
To find out more, including how to control cookies, see here: Cookie Policy
Categories
- Design (2)
- Elasticsearch (3)
- Golang (5)
- hadoop (2)
- Java (9)
- linux (1)
- Performance (1)
- Scala (2)
- Security (3)
- Spark (2)
- Spring (1)
- Spring Batch (1)
- Spring Boot (1)
- sqoop (1)
- UI (1)
- unix (1)
- Vim (2)
Tags
annotation
apache hive 3
cdp
cloudera
commands
CORS
dataframe
design pattern
DNS
elastic
elasticsearch
facets
go
golang
hadoop
hdfs
hive
http
ip
java
jms
jpa
JpaRepository
junit
locking
mq
mysql
nginx
oracle
proxy
queue
rdbms
rdd
Repository
resolution
reverseproxy
scala
spark
spring boot
springboot
spring data
sql
sqoop
string
vim
Recent Posts
Categories
- Design (2)
- Elasticsearch (3)
- Golang (5)
- hadoop (2)
- Java (9)
- linux (1)
- Performance (1)
- Scala (2)
- Security (3)
- Spark (2)
- Spring (1)
- Spring Batch (1)
- Spring Boot (1)
- sqoop (1)
- UI (1)
- unix (1)
- Vim (2)
Tags
annotation
apache hive 3
cdp
cloudera
commands
CORS
dataframe
design pattern
DNS
elastic
elasticsearch
facets
go
golang
hadoop
hdfs
hive
http
ip
java
jms
jpa
JpaRepository
junit
locking
mq
mysql
nginx
oracle
proxy
queue
rdbms
rdd
Repository
resolution
reverseproxy
scala
spark
spring boot
springboot
spring data
sql
sqoop
string
vim
Find Us
Address
123 Main Street
New York, NY 10001
Hours
Monday–Friday: 9:00AM–5:00PM
Saturday & Sunday: 11:00AM–3:00PM
%d bloggers like this:
Be careful while querying inner objects in elasticsearch
In elasticsearch we can store closely related entities within a single document. For example, we can store a blog post and all of its comments together, by passing an array. read more…
Share this:
Like this:
Continue Reading
Most common openssl commands
This post is a collection of most common and helpful openssl commands which we need to use to deal with tasks like generating keys, CSRs, certificates. # Verify or check content Verify. read more…
Share this:
Like this:
Continue Reading
How is data secure over https?
Everyone of us have heard that data transferred over HTTPS is secured. As a result we provide our highly confidential information like bank details, credit card details to a website which runs. read more…
Share this:
Like this:
Continue Reading
Secure way of doing OAuth for SPA & Native Apps
When clients like mobile, desktop, single page applications allows the user to sign-in using a third party application (google, facebook, twitter etc), one of the first choice is to use. read more…
Share this:
Like this:
Continue Reading