Trino logoBuilt-in System Access Control to Catalogs in Presto

Presto secures access to catalogs with built-in system. This article is not aimed to replace the Presto documentation which provides high level of overview with following details on the implementation of build-in system access control. As any documentation, it does not cover all topics and there are some missing pieces …

more ...


Python logoObtain Identity Value for SQL Server Insert in Python

Extracting of an identity value when data inserted into a SQL Server table in Python is done in the same way as in Microsoft Transact-SQL. The difference is that SQL Server statements are wrapped up in Python commands. pypyodbc is a good candidate to communicate with SQL Server in Python …

more ...

Security logoExport TLS/SSL Server Certificate from Internet Browser

DateModifiedViewsCategory

To securely browse the Web, HTTPS protocol is established. The secure protocol requests public certificate which is freely transmitted from a Web site to a client. The public certificate can be exported from Internet browser in Privacy-Enhanced Mail (PEM) format. If a certificate is exported from PKCS #12 or other …

more ...

Surveillance logoCustom Built Surveillance System

Success of a custom built surveillance system mostly depends on initial stage when you design it. A diagram of your surveillance system would be the starting point of your design. it helps outline the future functionality and performance of the system. When a list of the surveillance system components is …

more ...

Python logoPython Access to Presto Cluster with Presto Client

Presto access is represented by many Python libraries among those are Dropbox/PyHive, prestosql/presto-python-client, prestodb/presto-python-client, and easydatawarehousing/prestoclient. Mostly of libraries use Python DB-API interface to access Presto which uniforms commands.

Python Access to Presto Cluster with PyHive article describes Dropbox/PyHive library usage.

prestosql/presto-python-client library is …

more ...

Security logoConvert Java Keystore to PEM File Format

Java keystore (JKS) file includes public certificates and cryptography keys. It is secured by a password and used in java applications. Other consumers of public certificates and cryptography keys, for example, tools or software libraries might not accept JKS format. In that case, Java keystore file can be converted into …

more ...