MySQL DB design for very long growing row size

My data has the property to grow in the row direction and the column direction at the same time. The size will grow in both directions without limit while I do more research.

The number of columns grows more than 1000 now and I got this error:

 Warning: (139, 'Row size too large (> 8126). Changing some columns to TEXT or BLOB may help. In current row format, BLOB prefix of 0 bytes is stored inline.') 

I read this post but increasing the page size would not help because the row size is growing and it will exceed anything at the end.

I want to restructure the table but I don’t have a good idea. How can I restructure this table?


P.S. As a reference, it’s time-series data and I put the timestamps as the index. And the columns can be grouped into categories and each group size grows at the same time.


P.P.S I add more details. There are a lot of columns and I decided to combine all of them into one table because each column shares the same timestamps. In addition, to track the identity of column, I made one extra table describing what the column is about.

This is the part of the data table:

+----------------------------+-----------+---------------+--------------------+ | etstamp                    | 1         | 2             | 3                  | +----------------------------+-----------+---------------+--------------------+ | 2019-01-01 13:53:30.000000 |   3802325 |  -12298828971 |  0.964893760996075 | | 2019-01-01 14:01:00.000000 | -13088926 |  -12298828971 |  -1.33234100135318 | | 2019-01-01 14:06:00.000000 | -13088926 |   -5892372191 |  0.343203392148817 | | 2019-01-01 18:35:30.000000 |  -3751101 |   -4074909927 |  -1.28552097428958 | | 2019-01-01 23:19:00.000000 |  40493616 |   90751800131 |   1.41623954680335 | | 2019-01-01 23:20:30.000000 |  40493616 |   47623820910 |   2.07233344695927 | | 2019-01-02 16:46:00.000000 |  -1251261 |   10093182491 |   2.12765957446809 | | 2019-01-02 22:57:00.000000 |  14034018 |    9768467942 |   1.32055929570171 | | 2019-01-03 05:24:00.000000 |  -2613264 |  -56186202376 |  -1.06769174979049 | | 2019-01-03 16:23:00.000000 | -22956977 |   -5525892956 |  -2.04214360041623 | | 2019-01-04 00:13:30.000000 | -10053384 |   -9177100417 |  -1.39583882012115 | | 2019-01-04 09:05:30.000000 |  -5494943 |  -21081825567 | -0.966329662393934 | | 2019-01-04 14:43:30.000000 |   4678636 |  -70623900257 |  -1.26799630167745 | | 2019-01-04 20:54:00.000000 |  23879504 |   41962608843 |               0.96 | | 2019-01-04 20:59:30.000000 |  16930573 |   41962608843 |   -0.5652942203597 | | 2019-01-04 21:33:30.000000 |  16930573 |   49439408153 |   1.63281561131024 | | 2019-01-05 00:16:00.000000 |  15617092 |   56326921973 |  0.552369137856527 | | 2019-01-05 22:08:30.000000 | -28280428 | -100817061177 |  -1.41613615694426 | | 2019-01-05 22:16:30.000000 | -28280428 |  -18081058461 | -0.364971120115236 | | 2019-01-06 02:01:30.000000 | -11802595 |  -42569384784 | -0.958499367931412 | +----------------------------+-----------+---------------+--------------------+ 20 rows in set (0.00 sec) 

This is a sample table to describe the column identity.

+----------+-------------+---------------------+---------------------+----------------------------+------------+ | columnid | fcolltype   | stime               | etime               | indinfo                    | indbpsetid | +----------+-------------+---------------------+---------------------+----------------------------+------------+ |        1 | TECHNICAL01 | 2019-01-01 00:00:00 | 2019-07-01 00:00:00 | VolImb                     |         15 | |        2 | TECHNICAL01 | 2019-01-01 00:00:00 | 2019-07-01 00:00:00 | DolImb                     |         18 | |        3 | TECHNICAL01 | 2019-01-01 00:00:00 | 2019-07-01 00:00:00 | PJUMP[9, high, low, close] |         50 | +----------+-------------+---------------------+---------------------+----------------------------+------------+ 3 rows in set (0.00 sec) 

(The columnid corresponds to the column name of the data table.)

How to design a table based on css values set from admin/dashboard

I have created a table at Single Product Page via plugin. I want to change the color, border, bg-color etc.. according to the values that the admin will set/enter from dashboard.

I have done the following so far.

From the following form (attached image), the admin will choose the css values for table body, header etc.And after hitting the save button, all those css values will be saved inin wp_options as key value pair.

For Example

'table_background_color' => '#ff5' 

What I want

I don’t want to get the wp_option and then apply that css design value for particular element of the table, because I have huge form containing a lot of css design values and applying css inline is kind of messy.

I’m looking for some nice approach to apply those css values (which I have saved in wp_options) to the table.

How can I apply those saved css values from a separate file ? Any help/recommendation will be highly appreciated, thanks.

enter image description here

The Design of Invocations in D&D 5th edition

I been working on a supplement for D&D 5th edition using the 5e System Reference Document as foundation.

Has Wizards are one of authors of D&D 5e system posted about how Warlock Invocations are designed.

Invocations often have a prerequisite. Sometime is a requirement that the Warlock have a specific pact, other times it is a level requirement. There are hints of a pattern but nothing conclusive.

For example some invocations allow you to cast a 1st level spell without expending spell slot. Then there are invocations that allow you to cast a 2nd level spell without a spell slot but they have a level requirement.

So I am wondering if there been any posts put out by Wizards that talk about how they designed the invocations.

Design of a synchronized clock

I was living in a country where Internet wasn’t that fast so the younger me had the following idea for compressing data

Let say 2 parties want to send data to each other, we know that data can be represented by a number literally any data no matter the size can be just a giant number.

So let say the 2 parties have this perfect synchronized clock and a very fast one, I mean a clock that can count billions of billions ( equivalent of gbits of data ) in a short amount of time.

So for party 1 to send data to party 2 it only need to send 2 messages : start counting and stop counting.

So any data can be sent using only 2 bits lol.

How hard is it to design that clock ?

Effect of Firefox’s “Responsive Design Mode” on the browser’s fingerprint

Today I switched ON the "Responsive Design Mode" under the "Web Developer" Section of the Firefox menu, and from the dropdown menu selected "iPhone X/XS iOS 12".

So now every webpage I visited was being sent the request that the screen size of my device was "375×812".

My question is that, can this method enhance my protection against browser fingerprinting(assuming I also take some other precautions)? Because the websites now wouldn’t be able to know my original aspect ratio/screen resolution, and above 2 iPhones are quite common too(I am using a laptop).

I earlier tried to scale the Firefox window to nearly the aspect ratio of a mobile phone, but that didn’t make any differnce at all.

Note:

(i) In the context of this question my adversaries are only the companies and their websites,and not the Governments & ISPs.

(ii) I am just asking about the effect of this method on my browser’s fingerprint, that is, whether it will increase or decrease the fingerprint. Be advised: I am not using this as the only method.

(iii) Firefox version: 78.0.2

(iv) OS: some linux distro.

NFC Ultralight C – design an authentication system (can it be clone protected?)

I am trying to design an authentication system that will be based on NFC Ultralight C cards. Key concept in my system is that the card identifies a specific person, but this concept can be easily broken if the card can be cloned.

I want to prevent cloning with my cards – but all I found under authentication searches for ultralight c – gives me a write protection (authentication of the message), which is important, but not the only thing I care.

Is it possible to prevent NFC Ultralight C cloning ?

How to deside what model should be picket for security operation center, design and implimentation?

To pick the right model for design and implement a Security Operation Center, it should pick a most suitable model that is for the business, that could be capable to be tailored.

What are the differences, between Best practices, standards, and frameworks in SOC design?

Using nested objects for pointers with Javascript – Design concept

So, I am designing some data structure and I am curious if there are anything that specifically advises against having multiple object pointers within one master object. I found questions about C++ and it definitely seems doable in js also. I have tested it and it works, but I am just curious if it just is a terrible programming no-no. If it indeed are some major drawbacks, can describe them for me? When should I not use such structure?

a={}; a.b={}; a.c={}; a.d={}; e={};  a.b.sub1={name: 'a.b.sub1'}; a.c.sub1={name: 'a.c.sub1'}; a.d.sub1={name: 'a.d.sub1'};  a.e.arr=[]; a.e.arr.push(a.b.sub1); a.e.arr.push(a.c.sub1); a.e.arr.push(a.d.sub1);  a.b.sub1={name: 'test'}; console.log(a.e.arr[0].name === 'test'); // true