A beginners guide to thinking in SQL

Is it “SELECT * WHERE a=b FROM c” or “SELECT WHERE a=b FROM c ON *” ?

If you’re anything like me, SQL is one of those things that may look easy at first (it reads just like regular english!), but for some reason you can’t help but google the correct syntax for every silly query.Then, you get to joins, aggregation, and subqueries and everything you read just seems like gibberish. Something like this :

SELECT members.firstname || ‘ ‘ || members.lastname
AS “Full Name”
FROM borrowings
INNER JOIN members
ON members.memberid=borrowings.memberid
INNER JOIN books
ON books.bookid=borrowings.bookid
WHERE borrowings.bookid IN (SELECT bookid
FROM books
WHERE stock>(SELECT avg(stock)
FROM books))
GROUP BY members.firstname, members.lastname;

Yikes! This would scare any new comer, or even an intermediate developer looking at SQL for the first time. It shouldn’t have to be like this.

It’s always easy to remember something which is intuitive, and through this guide, I hope to ease the barrier of entry for


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/yDsbpaqYmHc/

Original article

Riffle: an efficient communication system with strong anonymity

Other Contributors:
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.

Advisor:
Srini Devadas.

Department:
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.

Abstract:
Anonymous communication is an important part of democratic societies and freedom of speech. Whistleblowers, protest organizers, and, more broadly, anyone with controversial viewpoints have been using the limited form of anonymity the Internet provides to protect their privacy. Unfortunately, the basic anonymity the Internet guarantees is too weak to protect their identities from even the weakest adversaries. As a result, more and more users have adopted privacy enhancing technologies to protect themselves. All existing anonymity systems, however, sacrifice anonymity for efficient communication or vice-versa. Onion-routing achieves low latency, high bandwidth, and scalable anonymous communication, but is susceptible to traffic analysis attacks. Designs based on DC-Nets, on the other hand, protect the users against traffic analysis attacks, but sacrifice bandwidth. Verifiable mixnets maintain strong anonymity with low bandwidth overhead,


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/ZGJGXFzApt8/99859

Original article

Chalice: Python Serverless Microframework for AWS

Serverless computing is one of the most talked-about subjects among AWS customers. The AWS serverless offerings, AWS Lambda and Amazon API Gateway, make it possible for developers to create and run API applications with built-in, virtually unlimited scalability without managing any servers. Today the AWS Developer Tools team is excited to announce the preview of the Python Serverless Microframework for AWS.
This three-minute video shows how quickly you can start building serverless APIs using the framework and its command-line tool, chalice.

In just 45 seconds, I created a new Hello World project, inspected its code file (app.py), deployed it to a public API endpoint, and using curl, made a successful HTTP GET request to the endpoint. Because our goal is to minimize the time it takes to get started, we hope you’ll enjoy the simple and fast experience offered by the new microframework.
In the next


Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/Kq9_tfsY8IM/

Original article

MIT Says Their Anonymity Network Is More Secure Than Tor

An anonymous reader writes from a report via PC Magazine: Following the recent vulnerabilities in Tor, researchers at MIT’s Computer Science and Artificial Intelligence Laboratory and the Ecole Polytechnique Federale de Lausanne have been working on a new anonymity network that they say is more secure than Tor. While the researchers are planning to present their new system, dubbed Riffle, at the Privacy Enhancing Technologies Symposium later this month, they did say the system uses existing cryptographic techniques, but in new ways. A series of servers are what make up Riffle, each of which “permutes the order in which it receives messages before passing them on to the next,” according to a news release. “For instance, messages from senders Alice, Bob, and Carol reach the first server in the order A, B, C, that server would send them to the second server in a different order — say C, B,


Original URL: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/hAMac6-ulGA/mit-says-their-anonymity-network-is-more-secure-than-tor

Original article

A roadmap for making Drupal more API-first

Republished from buytaert.net
In one of my recent blog posts, I articulated a vision for the future of Drupal’s web services, and at DrupalCon New Orleans, I announced the API-first initiative for Drupal 8. I believe that there is considerable momentum behind driving the web services initiative. As such, I want to provide a progress report, highlight some of the key people driving the work, and map the proposed vision from the previous blog post onto a rough timeline.
Here is a bird’s-eye view of the plan for the next twelve months:
8.2 (Q4 2016)
8.3 (Q2 2017)
Beyond 8.3 (2017+)
New REST API capabilities
Waterwheel initial release
New REST API capabilities
JSON API module
GraphQL module?
Entity graph iterator?
New REST API capabilities
Wim Leers (Acquia) and Daniel Wehner (Chapter Three) have produced a comprehensive list of the top priorities for the REST module. We’re introducing significant REST API advancements in Drupal 8.2 and 8.3 in order to improve the developer experience and extend the capabilities of the REST API.


Original URL: https://www.drupal.org/blog/roadmap-making-drupal-more-api-first

Original article

My todo list outline

My todo list outline is public, at least for now.http://instantoutliner.com/dIt’s an instant outline. That means it updates in realtime as I make changes to it.I don’t work too fast, so don’t expect it to blow you away.But it might make a good demo of what you can do with LO2.


Original URL: http://scripting.com/2016/07/11/1371.html

Original article

How to Revoke Pokémon Go’s Extensive Permissions to Your Google Account

Everyone’s stoked about Pokémon Go, but if you’re a privacy conscious player on iOS, you might not like the fact that Pokémon Go (and Ingress
, for that matter) has complete access to everything in your Google account
. Good news though, you can revoke that access.Read more…


Original URL: http://feeds.gawker.com/~r/lifehacker/full/~3/JX7Tm--Im2c/how-to-revoke-pokemon-go-s-extensive-permissions-to-you-1783466118

Original article

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: