REST

212

Solutions

430

Contributors

Representational state transfer (REST) is an architectural style that gives a coordinated set of constraints to the design of components in a distributed hypermedia system used to design networked applications. RESTful systems typically communicate over Hypertext Transfer Protocol (HTTP) with the same HTTP verbs (GET, POST, PUT, DELETE, etc.) that web browsers use to retrieve web pages and to send data to remote servers. REST interfaces with external systems using resources identified by Uniform Resource Identifier (URI) that can be operated upon using standard verbs.

Share tech news, updates, or what's on your mind.

Sign up to Post

EQIFAX DATA BREACH.

The Equifax data breach is one of the deadliest cyberattacks in the modern times not only in terms of affected people but also due to the intensity of accessed personal data. Equifax reported that between mid-May and June 2017, their system was hacked and the personal information of 173 million customers was exposed. Below we highlight some incites about this breach and then take a look at exactly how this was accomplished at the bottom.

Accessed information

According to Equifax, the hackers were able to access customer’s names, Social Security Number, customer’s date of birth, card numbers, addresses and driver’s license numbers.

Why this breach is one of the deadliest attacks

The Yahoo data breach in 2016 had 1 billion customers affected where only the passwords and phone numbers were accessed. But in the case of Equifax, sensitive data was accessed which means that:

Criminals can use the Social Security number to other credit accounts using a customer’s names.
Hackers can also maneuver their way and shop online using the credit card details obtained.
The hackers can sell the data to other criminals which makes the effect very grave.
An accessed customer’s data is not immune to future’s fraud, extortion and blackmail. The accessed information can haunt a customer forever.
How to find out if your information was exposed

Equifax has established a “Potential Impact” tab on its website (www.equifaxsecurity2017.com) that helps …
0
 
LVL 8

Expert Comment

by:Sean Plemons Kelly, CISSP
This was literally copied and pasted from hackingloops.

Let's go to a "Security" site from a company that hid the fact that they had a massive data breach that affected (more or less) everyone with a credit score in the US. Let's plug in our SSN anyway (fun fact, it doesn't matter if you are on a secure system or using encryption if the destination isn't secure).
0
What does it mean to be "Always On"?
LVL 5
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Webroot Doubles Down on MSPs

"Some of the new offerings involved acquisitions. Others are homegrown. But they’re all coming together. Indeed, Webroot is coordinating its R&D, sales and marketing efforts to make it easier MSPs to try, buy and deploy the security solutions, Potts says."

Read the rest of the article here.
1
3
ATTENTION APC UPS USERS! (could apply to other UPS batteries!)

I thought it was only responsible of me to follow up on this question after REAL EXPERIENCE which could have been FATAL!

This question is right on topic with a recent event this week, where I've spent the night in hospital!.

Red Light on Smart UPS 2200

After suffering the effects of Respiratory irritation caused by inhaling toxic gases in the datacentre.

One or Two APC 3000 UPS failed in the datacentre, with battery faults, the gas possible Hydrogen Sulphide (H2S) filled the closed datacentre with possibly Hydrogen Sulphide (H2S).

I only open the door, and walked in for exposure for what could have been more than 10 seconds, it was enough to overwhelm me causing headache for the rest of the afternoon, nausea, coughing and later breathlessness after advice from "NHS 111 Online" I went to Accident and Emergency, where they wired me up to ECG, Heart Rate, Blood Pressure monitors, took blood samples every hour for testing, and oxygen and nebuliser.

I was discharged after 12 hours, being advised to rest, take it easy and the exposure and irritation should get better over 48 hours.

I'm still feeling tired, cough is getting better, but still my chest still feels very heavy which I'm told is the inflammation of the lungs,

My recommendation should you have a battery light is to isolate from the Power Supply Immediately.
3
 
LVL 100

Expert Comment

by:John Hurst
Andy - I offer you my very best wishes and I hope you have a complete recovery. Sounds nasty.  ... John
0
 
LVL 125

Author Comment

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Thanks John
0
0
hello guys, i am trying to parse a array result rest that i got from kraken
i would like to know how can i access a key on the array that was returned by thir api, bellow is the response from the api.
Array
(
    => Array
        (
        )

    [result] => Array
        (
            [descr] => Array
                (
                    [order] => sell 1.12300000 XBTUSD @ limit 120.00000
                )

            [txid] => Array
                (
                    [0] => OAVY7T-MV5VK-KHDF5X
                )

        )

)
i would like to extract the txid from the result set i tried this away but did not work
echo array['result']['txid'];

can some one help me out here ?
thanks in advance.
Rafael
0
 
LVL 13

Administrative Comment

by:Andrew Leniart
Hi Rafael,

Welcome to Experts Exchange.

What you have done is made a "Post" here.  To get expert help, you need to "Ask a Question" so that more experts are able to see that you need help. Click the Big blue button near the top of your screen.

Ask a Question

The following link also explains more about asking for help at Experts Exchange...
http://support.experts-exchange.com/customer/portal/articles/336330

Hope that's helpful.

Regards,
Andrew
EE Topic Advisor
0

Proofreading & Editing Techniques for Executives & Managers

pexels-photo-381949.jpegIt’s hard to spoil high-quality content… or not? When it comes to content marketing and the creation of different types of writing content, proofreading and editing is just as crucial as the research and writing itself.

Why? Because when you offer writing content to the audience, you have to make sure that it looks flawless. Errors and typos that might slip into your writing can ruin this impression as well as damage your reputation. They basically tell the audience either that you weren’t attentive enough and didn’t put many efforts into content creation or that you have some problems with grammar and punctuation, which means that you aren’t a good writer you claim to be.

Either reaction is bad. It’s obvious that if you want to avoid it, you have to invest time and efforts into high-quality proofreading and editing. However, what exactly does this mean? What do you have to do in order to make your writing really polished and feel proofread?

1. Use various services.
The first and the simplest thing to do is to proofread your writing using some online service (for example, Grammarly). Such services check your grammar and punctuation and some of them even give you some stylistic tips.

However, if you want to make the most out of it, don’t settle for one service only. Choose a couple of other ones too and run your writing through them to ensure that all the errors were spotted.

2. Avoid distraction.
1
 
LVL 13

Expert Comment

by:Andrew Leniart
I find the statements highlighted below to be deliciously ironic to what this post is all about.

when you offer writing content to the audience, you have to make sure that it looks flawless

They basically tell the audience either that you weren’t attentive enough and didn’t put many efforts into content creation or that you have some problems with grammar and punctuation, which means that you aren’t a good writer you claim to be.

:^)
0
 
LVL 39

Expert Comment

by:BillDL
Some additions to Andrew Leniart's keen observations:

Feel free to invent a new word if you feel that the existing one is boring.  For example, "automated" is a terribly clichéd (so 90s) word that really needs to be "-ized" to jazz it up and make it fit for modern day corporate buzz-word parlance.

Just like any other tools, they are automatized and so unable to spot all the mistakes.

Sometimes we are so focused on grammar checks that we forget that other things have to be checked too.

I invariably find spelling and grammar errors on websites offering proofreading and essay writing services, so please don't take offence.  We all make such mistakes, but in articles about proofreading and on websites offering proofreading services, the spelling and grammar should be faultless.
0
Which Database Choose?

This Article about choose the NOSQL database based on application requirement. Different NoSQL DB’s available, there are three primary concerns you must balance when choosing a data management system: consistency, availability, and partition tolerance.

 

* Consistency means that each client always has the same view of the data. * Availability means that all clients can always read and write.

* Partition tolerance means that the system works well across physical network partitions.

 

Chose the Database system based on your application requirement.

 Example Comparing MongoDB and CouchDB.

As you can see in the diagram, MongoDB and CouchDB are built with a slightly different focus. Both scale across multiple nodes easily, but MongoDB favours consistency while CouchDB favours availability.

In the MongoDB replication model, a group of database nodes host the same data set and are defined as a Replica set. One of the nodes in the set will act as primary and the others will be secondary nodes. The primary node is used for all write operations, and by default all read operations as well. This means that replica sets provide strict consistency. Replication is used to provide redundancy - to recover from hardware failure or service interruptions.

CouchDB uses a replication model called Eventual consistency. In this system, clients can write data to one node of the database without waiting for other nodes to come into agreement. The …
0
Ransomware - Wannacry/wcry and everything else ...

Ransomware in general is something none of us wish to deal with.  The latest Wannacry problem is worse.  This is not because of what it is but rather of the extent to which it has affected our users.  There have been a plethora of great suggestions all over this site.  I would add to those with the following suggestions:
•      Completely check your system for viruses with a reputable virus checker
•      Check any suspected files and or links at virustotal.com
•      Make sure you have a tested versioning backup system
•      Do a complete scan of your system
•      Updates
        o      Make sure all your programs and your operating system is up to date (even old Windows OS’s now
                have updates, like windows XP – check the Microsoft website and do a windows update)
        o      If you are unable to do updates on your own machine due to company policy, make sure that your IT
                department is doing the updates.
•      Do not, click on an attachment in your email, even if it is from someone you know – call them up and check
        that they sent it – they’ll understand.

Whenever I touch a system I do a “ransomware check” which involves the following:
•      Create a blank text file called myapp.txt in the root drive (c:\) and rename it to myapp.exe
•      Run FoolishIT’s Cryptoprevent
•      Install an anti-ransomware tool such as BD Antiransomware, MBAM Antiransomware, Kaspersky
        Antiransomware for business, etc.
•      …
20
 
LVL 100

Expert Comment

by:John Hurst
The overall advice to keep automatic updates on to keep updates current, keep Antivirus up to date and firewalls up to date is something we have said many times in here (sometimes to deaf ears).

Two really important points. Stop the excuses and dump all desktop operating system earlier than Windows 7 and all server operating systems earlier that Server 2008.

Second: get top notch spam filters. That is how this malware gets in.
3
 
LVL 14

Expert Comment

by:Natty Greg
I can not stress enough about proxy and spam filter, content filter along with gateway antivirus scanning, patching all systems and educating users.
2

REST

212

Solutions

430

Contributors

Representational state transfer (REST) is an architectural style that gives a coordinated set of constraints to the design of components in a distributed hypermedia system used to design networked applications. RESTful systems typically communicate over Hypertext Transfer Protocol (HTTP) with the same HTTP verbs (GET, POST, PUT, DELETE, etc.) that web browsers use to retrieve web pages and to send data to remote servers. REST interfaces with external systems using resources identified by Uniform Resource Identifier (URI) that can be operated upon using standard verbs.

Top Experts In
REST
<
Monthly
>