SQL INSERT Statement

The SQL INSERT INTO statement is used to add new records to a database. INSERT INTO table_name (column_name [, column_name...]) VALUES (value [, value…]); Parameters: INSERT INTO table_name  - The name of the table where a new row will be inserted.column_name  -  Indicates the column names where the data will be added. VALUES value – Specifies [...]

By |2019-07-16T05:08:03+03:00July 16th, 2019|Categories: Explained Simply|Tags: |0 Comments

Basic Authentication With Nginx

Basic authentication with Nginx requires an installation of Nginx and htpasswd. We have to create a password file with users and passwords and add this file to Nginx. The password file The first step is the creation of a password file with htpasswd tool using the following command: htpasswd -c .htpasswd user The flag -c [...]

By |2019-05-26T23:28:35+03:00July 8th, 2019|Categories: Explained Simply|0 Comments

Nginx – Simple Socket Redirect

Sometimes we have to redirect listening from one port to another. For example, if we have a listener on localhost we want to redirect traffic from listening on other IP to localhost. In this example, we will listen on port 60000 and redirect all traffic to localhost listener with port 8000. server{ listen 60000; listen [...]

By |2019-05-28T21:53:29+03:00July 1st, 2019|Categories: How To|0 Comments

STM32 Bootloader Design – Part 2

In the first post of this series, we covered the basic ideas behind creating an STM32 bootloader. Today we will focus on the application code and generate output, that our bootloader code will be able to process. The application code is very simple - it inits one pin at output and toggles it after some [...]

By |2019-05-25T01:19:09+03:00June 24th, 2019|Categories: Embedded Systems|Tags: |0 Comments

Good Practices for Using Cookies

When cookies first appeared in 1994, they were completely allowed by browsers and their usage depended entirely on what developers had in mind. However, a few years after that, due to concerns about privacy and tracking, web developers were advised to obey some practices that make cookie usage safer. Nowadays, some practices are even required [...]

By |2019-06-16T21:57:14+03:00June 17th, 2019|Categories: Explained Simply|0 Comments

Authentication and Authorization, Usage in ASP .NET

Authentication and Authorization are two main security processes used in various applications. Although they are often confused by some users, they possess major differences between each other. Authentication Authentication is a process of confirming the user's identity in order to grant this user access to protected resources. Usually, the user needs to enter a username [...]

By |2019-06-09T21:40:07+03:00June 10th, 2019|Categories: C#|0 Comments

The Difference Between Accuracy And Precision

One of the most common scenarios in embedded system design is the need for getting information from the surrounding environment. This is done by using various types of sensors (e.g temperature, humidity, pressure, etc. ). The data from these sensors always have some difference from the real true value being measured. Our goal as designers [...]

By |2019-05-07T21:23:45+03:00June 3rd, 2019|Categories: Explained Simply|0 Comments

User Controls in ASP .NET

A good practice in ASP .NET and in programming in general is to divide the code into reusable blocks. This is applicable to HTML code too. In ASP .NET it is achieved by creating User Controls.User controls look similar to web forms. They contain HTML and control tags, they are saved in .ascx files and [...]

By |2019-05-17T22:22:34+03:00May 27th, 2019|Categories: C#|Tags: |0 Comments

Digital Buffers And Their Usage

In this article, we will explain the functionality of two very important electronic circuit elements: digital buffer and tri-state digital buffer. Buffer At first glance, the functionality of a digital buffer may seem very simple: the value at its input is propagated to its output. Fig. 1 Buffer symbol and truth table If the buffer [...]

By |2019-05-19T16:48:41+03:00May 20th, 2019|Categories: Digital Logic|Tags: , |0 Comments
We use cookies on this site to improve our service, perform analytics and remember website preference. By using the site, you consent to these cookies (Privacy policy). I consent to cookies