Showing posts from December, 2017

Western Governors University

Western Governors University is an online nonprofit university where the average student earns a bachelor's degree in two and a half years.

World Health Organization includes "gaming disorder" in its list of mental health conditions.

The WHO defines the disorder as a "persistent or recurrent" behavior pattern of "sufficient severity to result in significant impairment in personal, family, social, educational, occupational or other important areas of functioning."

Apple offers $29 replacement batteries immediately

People with an iPhone 6 or later can get a $29 replacement battery immediately — a month earlier than Apple originally planned to start offering discounted replacements. The company confirmed the early availability on Saturday.

Ubuntu Features, Specifications and Requirements

Support for ARM and x86 boards1

Local storage support for DVR functionality2

Minimum disk space: 2GB

Minimum memory: 512 MB


CEC support

Secure full-featured web

Social networking services


One of the interesting feature on Ubuntu is, integration of broadcast, online services and applications. This gives you real TV experience on desktop since you can now get media on demand. Ubuntu needs very little effort for installation.

You can launch an Amazon FBA store.

Amazon will handle all the shipping, customer service, refunds and payments directly for you. All you need to do is provide your products to Amazon. They even have a nifty FBA calculator that you can use to calculate your costs of fulfilment and potential for profit.

Air Pollution Damages Neurons, Leads to Infertility and Birth Defects

Air pollution is a rampant health problem that easily crosses geographical borders, affecting humans from before birth and triggering massive numbers of premature deaths.

You can make money renting out your home or even a room.

Whether you AirBnB your home yourself or you use companies like InvitedHome, LuxuryRetreats or Vacasa, you can easily make money if you're in a vacation location.

Walk dogs with Rover.

Use to source jobs for walking dogs in your local area. They offer one of the largest nationwide networks for dog walkers and pet sitters.

You can babysit or house sit to make some money.

You can use online resources such as to help source work. You can also source babysitting or house-sitting gigs offline as well.

You can easily build an ecommerce store using Shopify.

Loads of features and integrations make it simple and easy to quickly launch an ecommerce store in just about any niche you can dream of.

Like casino games? Day trading or options trading are a lot like casino games.

Most non-professionals who get involved with day trading or options trading wind up losing money if they stick with it long enough. In that respect, they are a lot like casino games.

The real test will come only when you see how you do in the next bear market.

There is a large random element in short-term stock market results. It will take months or years before you know if your choices are likely to provide attractive long-term returns.

Learning from practice account

Using an online broker's practice account, you can learn online trading essentials, such as how to enter an order to sell or buy stocks online

Successful investors have good habits.

Investors who let their emotions rule can face tremendous losses.

With more websites these days aiming for simplicity and speed, we’re going to see more of single-page websites.

A single-page website uses a single HTML page with content accessible in one long scrollable page. Check out One Page Lovefor a showcase of single-pagers.

Progressive web apps are websites that act and feel like a native mobile app.

Originally proposed by Google in 2015, progressive web apps combine the best of web and mobile apps. PWA Rocks and PWA Directory showcase what progressive web apps are like.

Asking questions is essential when you’re building user-centered products.

Creating experiences from user insight and data, rather than assumptions minimizes the chance of getting it wrong.

Google’s telephony service can give you a unified number

With a little extra work, you may be able to use your original landline digits.

A study finds that nearly a third of the top 10,000 sites on the web are taking ad blocking countermeasures

Many silent and highly sophisticated.

Nearly a third of IT workers in North America and Europe plan to look for a new job in 2018

A figure that rises to 36 percent among millennial IT workers.

Innovation is effective and powerful simplicity.

Every new product is taking a complex or antiquated process and making it easier and more accessible.

Concept of Sets and Dictionaries.

A Set is an unordered collection data type that is iterable, mutable, and has no duplicate elements. Its like a list that doesn’t allow duplicate elements.

A dictionary is like a list whose values can be accessed by user defined keys instead of conventional numeric index values.

Python blocks of code are distinguished on the basis of their indentation.

This provides better code readability and instills in us a good habit of indenting our code.

Technology can create new solutions

A smartphone in hand can connect people with information from other locations in real time.

Factory Method and Abstract Factory use inheritance.

Factory Method is about creating one type of object, and Abstract Factory is about creating a family of different types of objects.

Inside the source code of Google Chrome, there is a file which contains a hardcoded file listing the HSTS properties for all domains in the Preload List.

Each entry is formatted in JSON

EFF offer a tool called CertBot to make it relatively easy to install and generate Let's Encrypt certificates from the command line.

EFF offer a tool called CertBot to make it relatively easy to install and  generate Let's Encrypt certificates from the command line.

Designing a streamlined device with a battery life of almost 60 days

Xiaomi is now the world's top seller of fitness bands, ahead of Fitbit and Apple.

More than 10,000 new businesses are started every day in China

That's seven Chinese startups born each minute.

Cryptocurrency miners are known to cause wear and tear on hardware by using a CPU to solve a cryptographic challenge.

This generates a hash that earns the miner a cryptocurrency reward.

Over the past twenty years, the gun-rights movement has won just about every battle it has fought

States have passed at least a hundred laws loosening gun restrictions since President Obama took office.

If you’re a newcomer to JavaScript or front-end development in general, you should use Vue.

It's much more beginner-friendly and easier to just drop in on the web-page.

Bitcoin had lost significant value.

Ethereum (down 20 percent), Bitcoin Cash (down 30 percent), Litecoin (down 21 percent) and nearly every high-profile altcoin lost value

Skip Microwaved Eggs

Using a microwave oven to heat or reheat eggs may be a dangerous practice that can affect your health and potentially injure your eyes and face.

Google Home Mini works with Chromecast

Entertainment, hands-free.

Google Home Mini works with Chromecast, so you can stream shows, movies and music on your TV or speakers.

Holiday tech GIFT ideas

Philips wake-up alarm clock, amazon

leather cord organizer, mark & graham

bower waterproof speaker, staples

tp smart plug, amazon

apple pencil, apple

beats wireless headphones, bestbuy

elon musk book, amazon

google home mini,

iphone charging bracelet, mark & graham

tile key finder, canadian tire

The South Korean Bitcoin exchanging site, Youbit, was attacked on Tuesday

Law enforcement authorities in Seoul have announced that the main suspects come from their neighbour to the north.

Python functions can return more than one value.

Typically functions in other programming languages can return only one value but in python we can return more than one value.

Python is easier for speedy coding

Python has a wide variety of functionality, packages and libraries which act like a supplement to the programmer’s mental ability.Ultimately the best thing about python is that its very Simple and we need not waste much time on trivial matters like input,output etc. It helps shift our focus to the problem at hand.

A topological sort or topological ordering of a directed graph is a linear ordering of its vertices such that for every directed edge uv from vertex u to vertex v, u comes before v in the ordering.

For instance, the vertices of the graph may represent tasks to be performed, and the edges may represent constraints that one task must be performed before another; in this application, a topological ordering is just a valid sequence for the tasks. A topological ordering is possible if and only if the graph has no directed cycles, that is, if it is a directed acyclic graph (DAG). Any DAG has at least one topological ordering, and algorithms are known for constructing a topological ordering of any DAG in linear time.

sort: Sort text files

sort sorts, merges, or compares all the lines from the given files, or standard input if none are given or for a file of ‘-’. By default, sort writes the results to standard output. Synopsis:

sort [option]… [file]…

$ ls | sort 59399207.csv inbox2.csv inbox3.csv inbox.csv now

Full documentation at: <>

How to rename a label in Blogger

For example, change lable 'i88ca' to '':
Go to the Posts tab for your blogselect "i88ca" from "All labels" drop-down list. This will filter the posts, so you'll only see those with the "i88ca" label.Click the checkbox at the top of the list of posts to select all the posts.Click the Label icon again and select "Add new label." Then, type in ''Then, click the Label icon and select "i88ca" to remove the label "i88ca" from all the posts that are selected.You're done! Now, all the posts that used to have the label "i88ca" have the label "" instead.

Delete a label in Blogger

For example, to remove lable 'i88ca':
Go to the Posts tab for your blogselect "i88ca" from "All labels" drop-down list. This will filter the posts, so you'll only see those with the "i88ca" label.Click the checkbox at the top of the list of posts to select all the posts.Then, click the Label icon and select "i88ca" to remove the label "i88ca" from all the posts that are selected.

Backup Jenkins Server

Setting up a backup process for Jenkins configuration.
Script a Jenkins job to use the thinBackup plugin or S3 plugin to send the Jenkins configuration to an Amazon S3 (cloud storage).

Browser-Based Games

Boardgame3D Hartwing Chess Set - 3D chess game done in HTML/CSS/JS.Desperate Gods - Free online board game that was designed to be played just like a board game in real-life: no rules are enforced by the computer. Play it now!Green Mahjong - Solitaire mahjong game done in HTML/CSS/JS.Lichess - Free chess game using HTML5 & websockets, built with Scala, Play 2.1, MongoDB and Elasticsearch. Play it now!ArcadeAlge's Escapade - HTML5, JavaScript, GameJs arcade game where you control an Algae. Play it now!Alien Invasion - Demo Game for Mobile HTML5 Game Development. Play it now!Arashi - Arashi is a clone of the Arcade game Tempest. Play it now!Asteroids - Pure JavaScript asteroids. Play it now!Avabranch - GitHub Game Off 2012 entry. Play it now!Ball And Wall - Pure JavaScript arkanoid style game. Play it now!Captain Rogers - Captain Rogers: Asteroid Belt of Sirius - HTML5 mobile game created using ImpactJS. Play it now!Cell Mates - Game made in 48 hours for the 2013 Global Game Jam…

Reset Fedora root forgotten password

Start with select the boot line and press e key to edit.
Find the line with linux16 and add this on the end of this row:

( rd.break, this interrupt the boot process before control is passed from initramfs to systemd. )

Press Ctr+x or F10 keys to reboot.
#mount | grep root
#mount -o remount,rw /sysroot
#mount | grep root
#chroot /sysroot/
#passwd root
#touch /.autorelabel

Done! You can use the new password for user root to login the system.
You may need to choose between a possibly time consuming SELinux file relabel or changing the SELinux enforcing mode and then restoring the SELinux security context for /etc/shadow/ when the boot completes.

scp between two remote hosts from 3rd host

scp user1@remote1:/home/user1/file1.txt user2@remote2:/home/user2/file1.txt
 use the -3 option, as follows:

    scp -3 user1@remote1:/home/user1/file1.txt user2@remote2:/home/user2/file1.txt

The -3 option instructs scp to route traffic through the PC on which the command is issued, even though it is a 3rd party to the transfer. This way, authorization credentials must reside only on the issuing PC, the third party.

How to find out what Linux distribution is in use

cat /etc/*release Most distributions put a release file in /etc/ (like /etc/redhat-release, /etc/gentoo-release, etc.) which usually has the version number of your distribution in it.
$ cat /etc/*release Oracle Linux Server release 7.3 NAME="Oracle Linux Server" VERSION="7.3" ID="ol" VERSION_ID="7.3" PRETTY_NAME="Oracle Linux Server 7.3" ANSI_COLOR="0;31" CPE_NAME="cpe:/o:oracle:linux:7:3:server" HOME_URL="" BUG_REPORT_URL=""
ORACLE_BUGZILLA_PRODUCT="Oracle Linux 7" ORACLE_BUGZILLA_PRODUCT_VERSION=7.3 ORACLE_SUPPORT_PRODUCT="Oracle Linux" ORACLE_SUPPORT_PRODUCT_VERSION=7.3 Red Hat Enterprise Linux Server release 7.3 (Maipo) Oracle Linux Server release 7.3

Difference between “adduser” and “useradd”

useradd is native binary compiled with the system. But, adduser is a perl script which uses useradd binary in back-end.

adduser is more user friendly and interactive than its back-end useradd. There's no difference in features provided.

List all local Linux users

cut -d: -f1 /etc/passwd

OpenShift Container Platform allows you to create and manage containers.

OpenShift Container Platform is a platform as a service (PaaS) offering from Red Hat that brings together Docker and Kubernetes, and provides an API to manage these services. 

Create git branch on your local machine and switch in this branch

$ git checkout -b [name_of_your_new_branch]

List only local git branches

git branch without options. From the manpage: With no arguments, existing branches are listed and the current branch will be highlighted with an asterisk.

Delete a Git branch

To delete local branch
$ git branch -D your-branch-name
Deleted branch your-branch-name (was ff9c0b6).

To delete remote branch

$ git push origin --delete your-branch-name

List all remote branches in Git

git ls-remote --heads <remote-name>

Huawei #1 Telecom Equipment Manufacturer in the world

#3 Smartphone maker in the world
180,000+ Full time employees worldwide, 70,000+ contractors
Revenue growth in 2016 – 32% • Total revenue 2016 – $82 Billion
#88 on Forbes Most Valuable Brands list
Top 5 Most Innovative Company in the world (after Apple & Google) (2010)
Our products & solutions have been deployed in over 177 countries, and have served 48 of the world's top 50 telecom operators as well as one third of the world's population

AWS EC2 Spot provides you freedom of choice in how you launch and maintain your applications running on Spot instances.

The only difference between On-Demand instances and Spot Instances is that Spot instances can be interrupted by EC2 with two minutes of notification when the EC2 needs the capacity back. You can use EC2 Spot for various fault-tolerant and flexible applications, such as test & development environments, stateless web servers, image rendering, video transcoding, and to run analytics, machine learning and high-performance computing (HPC) workloads.

EC2 Spot is tightly integrated with other AWS services including EMR, Auto Scaling, Elastic Container Service (ECS), CloudFormation, Data Pipeline and AWS Batch.

Private Build allows you to detect integration errors before they affect other developers.

Builds the code.Runs Smoke Tests.Runs Unit Tests.Creates a deployable artifact.

To avoid checking in code that will break the integration Build developers run the Private Build as they develop.

Before any commit developers should: Update their Private Workspace from the Active Development Line.Run the Private Build.Commit their changes only when the build passes.

Talend Data Fabric Open source integration built for the cloud

The drive to turn data into insight at scale and speed across your business requires unrelenting agility. Talend Data Fabric helps you transform your data architecture so you can leverage the power of the cloud and adopt the latest innovations.

The database paradigm has changed besides traditional SQL

There is now NoSQL, document databases, columnar databases, graph databases, Hadoop, Spark, and many other massively parallel processing (MPP) platforms popping up daily. They all provide great benefits for many different use cases that just don't work well with traditional RDBMSs.

SQL stands for structured query language and is supported by a set of standards

Even though SQL is always a little different depending on if you are using MySQL, Oracle, DB2, or whatever vendor tool you have, if you are good at writing SQL and know the database model, you can adapt quickly to get whatever data you need.

Software Configuration Management enables team members to work together more effectively.

SCM touches all aspects of the development process, so SCM, done well, can improve engagement and productivity. Done poorly, SCM can slow a project down and cause frustration. An effective SCM process involves more than just the source code management system.

Effective SCM requires that you think about the build and testing process, and also that you continually evaluate how modular your architecture is, and how effectively you communicate.

Linux mailx command mode commands

RefMeaningnMessage number nn-mMessages n through m.The current message^The first undeleted message(or first deleted message for undelete)$The last message*All messages+Next message-Previous messageuserAll messages from the given user/stringAll messages with string in the subject line(the case of characters in string is ignored):dAll deleted messages:nAll new messages:oAll old messages:rAll messages that have already been read:uAll unread messages

Popular posts from this blog

jcmd - a utility to send diagnostic command requests to a Java Virtual Machine supporting this feature.