Shellshock Bash Bug

Since the announcement of the Shellshock Bash bug yesterday, there has been a lot of confusion on what this is, and how it may impact people. At the high level, it impacts bash, which is a “shell” program for systems running on some flavor of Unix such as Linux. For those who are interested in the details, please visit the links in the reference section. In this post we want to discuss how Shellshock impacts different groups and what can be done:

Continue reading

Heartbleed Bug

The Heartbleed bug has been all over the media this week. The reason it’s generating so much buzz is because of its potential large impact. Many large websites have this vulnerability, so pretty much everyone needs to change some, if not all, of their passwords to minimize the impact.

Many websites have come out and said that they have seen no evidence of any access or data breach. However, according to Codenomicon, the organization that announced this vulnerability, an attack may not leave any trace. Therefore, consumers have been warned to change their passwords just to be on the safe side.

There are several lists (list 1 and list 2) out there that show which websites were affected, and which ones were not. I was glad to see that Paypal and my financial institutions were not impacted. However, I did see that Yahoo was affected, and likely Google (Google announced that there is no need to change the Google Account password, though many experts still recommend that you do so) as well. All internet users should check now to see if they need to change the password to any site that they login to.


Tokyo Trip and 787 Dreamliner Experience

I recently took a trip to Tokyo, and I want to share my experience of the trip, which hopefully can be of use to some people.

Google Map Directions

First, I will say that Google Map directions will get you to the vicinity of where you want to go without any problem. If you use the “by Public Transit” option, it will show you the correct routes to take and the correct station to get off.

However, there are two problems:

Continue reading

Common Issues In Responsive Design Development Process

Making sure a website renders optimally on various device screen sizes via responsive design is a satisfying exercise for a website developer, and I went through this exercise recently. Of course, I ran into my share of bugs during the process. Below are 3 of the issues I ran into and what (if anything) can be done about them.

Continue reading

Converting to Responsive Design With CSS

Recently I went through the process of converting several websites into responsive design. For those who are not familiar, the concept of responsive design is to make sure the website renders nicely on both desktop and mobile devices by serving up different CSS stylesheets depending on the screen width.

Below are the steps I took to convert the sites (the starting point is a non-mobile optimized website):

1. Add the following code into the <head> section:

<meta name=”viewport” content=”width=device-width, initial-scale=1, maximum-scale=1, minimum-scale=1″ />

This statement will make sure the website renders correctly on your mobile device.

Continue reading

Top 25 Influencers in Business Intelligence

Here’s the list of top 25 influencers in the field of business intelligence. The ranking is based on Klout score. We used the Klout’s top business intelligence influencers as the starting point, and we checked the top influencers for these accounts (sometimes going out to multiple levels) to arrive at the list below.

1. MicroStrategy @microstrategy
Klout Score 79
Business Intelligence and Mobile Intelligence Software. For better, faster business decisions.

2. Mico Yuk @MicoYuk
Klout Score 66
Founder &, Entrepreneur, BI Influencer, Global Speaker, #dataviz Geek, #BIDF Coach, #Xcelsius Guru.

Continue reading

Surrogate Key In Database Design

In database design, it is a good practice to have a primary key for each table. There are two ways to specify a primary key: The first is to use part of the data as the primary key. For example, a table that includes information on employees may use Social Security Number as the primary key. This type of key is called a natural key. The second is to use a new field with artificially-generated values whose sole purpose is to be used as a primary key. This is called a surrogate key.

A surrogate key has the following characteristics:

Continue reading

Rename Table in SQL

Sometimes, it may be necessary to rename a table. There is no standard way to rename a table, and the implementation varies by RDBMS. Below we discuss how we can rename a table in MySQL, Oracle, and SQL Server.


In MySQL, we can rename a table using one of the following methods:

Method 1


Method 2


Continue reading