Posts

Showing posts from August, 2018

What VPN can do for you

Hide your browsing activities from other users of your local networkBypass firewalls and access blocked contentHide your IP address from websites, and block many tracking cookiesEnhance privacy on public Wi-Fi, with strong encryption to the VPN server

Simple Online Security Tips

1) Protect your password. Don't use your single password for multiple online web sites and never share it. You should be the only one who knows it. Avoid including your name or common words. Your password should be difficult to guess. 2) Be very cautious of  any message or email asking for your login details or credit card number. If someone asks you for this information do not respond or click on any links in their message. Please report the message to security team to investigate and then delete it. You can also block the sender from contacting you again. 3) Use our extra security features to add more protections to your account whenever possible.

Wi-Fi hotspots are often unsecure networks

Wi-Fi hotspots sure are convenient but they are also often unsecure networks and available to anyone. Don't shop or bank online using a Wi-Fi hotspot, and be very careful about what you send and receive.

In Australia, electric vehicles charged for a dollar a day

Energy supplier AGL is offering electric vehicle owners all-you-can-eat home charging for only AUD 1 per day.

Payara Micro is designed for microservice architectures.

Payara Micro is a small runtime providing a convenient subset of Java EE API and the following features:Can be executed simply from command line or in a Docker containerHas small memory footprintSupports API for REST services via JAX-RSSupports distributed messaging based on CDI events, instead of heavy-weight JMS messagingProvides option to bind to free HTTP ports automaticallyProvides API to access Payara Micro runtime directly from within deployed applications, no JNDI necessary

Immediate. Relevant. Frictionless.

That’s the experience consumers expect when they turn to a device to find, do, or buy something.

FBI Won’t Recommend Criminal Charges Against Hillary Clinton Over Private Email Use

FBI Director Comey does say the presidential candidate was ‘extremely careless’ in handling highly classified information

BlackBerry to Discontinue Its Last Keyboard Phone

The BlackBerry 10, introduced in 2014, was designed for those who prefer plastic keys and trackpads to the touch screens that dominate today.

BlackBerry to stop making Classic smartphone

BlackBerry says it will stop making its BlackBerry Classic smartphone, less than two years after launching it.

Marketing Automation - Transform Sales and Marketing with Marketing Technology and Expertise

Target and segment your database, launch engaging campaigns, read Digital Body Language, convert sales, and analyze results. Create ideal customers for higher revenue performance.

See more Marketing Automation.

A hypervisor is a program that allows multiple operating systems to share a single hardware host.

The hypervisor runs on a host server, which is the physical server that provides the resources used these virtual operating systems. Each of them appears to have the host's processor, memory, and other resources all to itself. However, the hypervisor is actually controlling the host processor and resources, allocating what is needed to each operating system in turn and making sure that the guest operating systems (called virtual machines) cannot disrupt each other.

Serverless cloud platform

AWS LambdaIBM OpenWhiskGoogle Cloud FunctionsAzure Functions

Leadership means finding your voice and your backbone when it counts.

“Fun is one of the most important and underrated ingredients in any successful venture.” Richard Branson

The benefits of independent contractor

As an independent contractor you’re not a subordinate. This fundamentally changes the work relationship.There’s an implicit assumption that as a contractor you are more capable of managing yourself. You are running your own business.It is easier/more likely for a contractor to walk away if a job is unfavorable.Companies have to compete for your time. Employees have no such benefit.Contracting rates are typically higher than the cost of full-time employees. The more the company pays you the more they value your time.

Some work environments are toxic.

Problems in upper-level management can trickle down to lower management levels. Also, patterns tend to perpetuate themselves. If a manager started as a rank-and-file developer and was expected to put in long hours then they’ll likely expect the same of their employees.

Full-duplex refers to the transmission of data in two directions simultaneously.

Full-duplex refers to the transmission of data in two directions simultaneously. For example, a telephone is a full-duplex device because both parties can talk at once. In contrast, a walkie-talkie is a half-duplex device because only one party can transmit at a time.

ADEPT Method for learning

Image
Make explanations ADEPT: Use an Analogy, Diagram, Example, Plain-English description, and then a Technical description. Source: http://betterexplained.com/articles/adept-method/

Felony is an open-source pgp keychain built on the modern web with Electron, React, and Redux.

Felony is the first PGP app that's easy for anyone to use, without a tutorial. Security++ to the greatest extreme!
You can download compiled versions of Felony for Windows, Mac OS X, and Linux fromhttps://github.com/henryboldi/felony/releases. The app is currently in its pre-release stage, so it hasn't been fully tested on all platforms. Confirmed to be working on Mac, as that's what the developers own.

Pupils choose their own subjects and motivate themselves: Berlin school turns teaching upside down

No grades, no timetable, an approach some say should be rolled out across Germany.

AI pilot defeats human combat instructor in simulated air battles

An AI combat jet pilot system known as Alpha, has shown that, in simulations, at least, it can repeatedly beat not only other computer controlled simulated fighter jets, but also ones piloted by humans.

The Verge

"I am confident that in order to restore access to the American Dream, it will take effort from across all boundaries." Monique Rizer

uProxy is an extension allows users to access the Internet via a web proxy.

uProxy is an extension for Chrome and Firefox web browsers which allows users to access the Internet via a web proxy. 
The extension works by enabling a user to share their Internet connection with someone else. Google Ideas provided funding for the development which was carried out by the University of Washington and Brave New Software — the same organization behind the anti-censorship tool Lantern. 
The extension is intended to allow users to get more secure access to the Internet without being monitored. It is free/libre software under Apache license 2.0.

Google Accelerated Mobile Pages (AMP) – an open source project and service to accelerate content on mobile devices.[

Accelerated Mobile Pagesaims to dramatically improve the performance of the mobile web. 
The service was launched in February 2016.

Google's using a machine learning technology called RankBrain to help deliver its search results.

RankBrain is Google’s name for a machine-learning artificial intelligence system that’s used to help process its search results,

Microsoft Azure Functions is an event driven, compute-on-demand experience

Azure Functions is scale-based and on-demand, so you pay only for the resources you consume.Microsoft Azure Functions is an event driven, compute-on-demand experience that extends the existing Azure application platform with capabilities to implement code triggered by events occurring in Azure or third party service as well as on-premises systems.

Azure Functions allows developers to take action by connecting to data sources or messaging solutions thus making it easy to process and react to events. Developers can leverage Azure Functions to build HTTP-based API endpoints accessible by a wide range of applications, mobile and IoT devices.

Microsoft Azure Service Fabric - a cluster service that runs on either Windows Server or Linux

Microsoft Azure Service Fabric is an evolution of microservice-based architecture for a cloud-based approach.Azure Service Fabric isn't marketed as a serverless platform, but rather a cluster service that runs on either Windows Server or Linux.

Microsoft Azure Service Fabric runs existing code or scalable microservices. Applications written natively for Service Fabric treat VMs as a pool of resources. The service is decoupled from individual virtual machines. Generically, Service Fabric clusters consistent of any Windows or Linux-based VM.

Microsoft's selling point for Service Fabric running in Azure is the availability of additional services. In practice, even an Amazon AWS instance could provide compute for Service Fabric compute.

Amazon AWS S3: security, scalability and reliability

When using AWS S3, we automatically have access to several security measures like AWS Permissions, bucket access control lists, and cross-origin resource sharing limitation.

For scalability and reliability, S3 storage has this built in. AWS S3 buckets are not limited to a single server or group of servers that we need to maintain. S3 is an inherently scalable container backed by AWS to be highly available.

Webtask is Function-as-a-Service platform for building serverless apps.

Webtask.io allows you to build applications without thinking about infrastructure. Simply write your server-side logic, deploy your functions via the Webtask CLI, and access your serverless backend over HTTP. Preferring code to configuration, the Webtask platform comes with a familiar programming model, excellent authentication and authorization support, and more to ensure a pleasant development experience.

Web hosting can run the gamut of complexity, pricing and maintenance.

Things you need to think about for hosting are security, scalability, reliability and complexity.

The Slack button is the simplest way to offer your service to teams using Slack.

A Slack button app gives you incoming webhooksslash commands and bot userswrapped in OAuth. You write the commands and the webhook that your app needs, and configure the options for your users. With just a few clicks, your users can add your app to their Slack team and start receiving notifications, issuing commands and chatting with your bot. The Slack button is also a key aspect of sharing your Slack app in our Application Directory!

Apex lets you build, deploy, and manage AWS Lambda functions with ease.

With Apex you can use languages that are not natively supported by AWS Lambda, such as Golang, through the use of a Node.js shim injected into the build. A variety of workflow related tooling is provided for testing functions, rolling back deploys, viewing metrics, tailing logs, hooking into the build system and more.

messaging rethought as a distributed commit log

Fast
A single Kafka broker can handle hundreds of megabytes of reads and writes per second from thousands of clients.Scalable Kafka is designed to allow a single cluster to serve as the central data backbone for a large organization. It can be elastically and transparently expanded without downtime. Data streams are partitioned and spread over a cluster of machines to allow data streams larger than the capability of any single machine and to allow clusters of co-ordinated consumersDurable Messages are persisted on disk and replicated within the cluster to prevent data loss. Each broker can handle terabytes of messages without performance impact.Distributed by Design Kafka has a modern cluster-centric design that offers strong durability and fault-tolerance guarantees.

Serverless architecture replaces long-running virtual machines with ephemeral compute power that comes into existence on request and disappears immediately after use.

Examples of include Serverless architecture Firebase and AWS Lambda.

Sticky sessions are harder to scale

Some web systems rely on “sticky sessions” – that is, caching user session data in memory of the app’s process and expecting future requests from the same visitor to be routed to the same process.
Sticky sessions are harder to scale. Session state data is a good candidate for a datastore that offers time-expiration, such as Memcached or Redis.

FaaS is about running back end code without managing your own server systems or your own server applications.

Functions as a service (FaaS) is different when comparing with other modern architectural trends like containers and PaaS (Platform as a Service).

Google Cloud Functions is a lightweight compute solution for developers to create single-purpose, stand-alone functions that respond to Cloud events without the need to manage a server or runtime environment.

Google Cloud Functions is a lightweight, event-based, asynchronous compute solution that allows you to create small, single-purpose functions that respond to cloud events without the need to manage a server or a runtime environment. Events from Google Cloud Storage and Google Cloud Pub/Sub can trigger Cloud Functions asynchronously, or you can use HTTP invocation for synchronous execution.

https://cloud.google.com/functions/docs/

Serverless computing is definitely a game changer.

Serverless means that you can focus on your application logic without dealing with infrastructure at all.Consider the endless possibilities offered by the event-driven approach combined with the rich Cloud ecosystem offered by the main Cloud vendors, AWS, Microsoft Azure, and Google Cloud Platform.

Byobu is a light, powerful, text window manager on Linux

Image
Byobu is a light, powerful, text-based window manager based on GNU Screen. Using Byobu, you can quickly create and move between different windows over a single SSH connection or TTY terminal, monitor dozens of important statistics about your system, detach and reattach to sessions later while your programs continue to run in the background. Quick Start Guide Enable/DisableByobu can be configured to run by default at every text login (SSH or TTY). That behavior can be toggled with the byobu-enable and byobu-disable commands. byobu-enableand byobu-disableNote that you can also ssh to a host and not launch Byobu at login any time with: ssh -t remotehost bash

How to use Find My Device on Windows

To use Find My Device on a tablet or laptop running Windows 10, make sure you are signed into the administrator-level Microsoft account you use with the gadget, and that the service is activated. To do that, go to the Windows 10 Settings to Updates & Security and select Find My Device (or Find My Phone for Windows Phone users). If the service is turned off in the Windows 10 settings, tap the Change button to enable it and allow the laptop or tablet to check in over the Internet periodically.

How to manage autoruns on Windows

The Windows Sysinternals Suite (maintained by Microsoft) includes a tool called Autoruns to help you to manage autoruns free of charge. 
While not perfect, this tool pulls in the right data for most autorun items on a Windows system, hashes them, and allows for some basic enrichment.

Web and cloud companies are especially targeted by a law that gives Chinese government access to and control over user and business data

China's National People's Congress has drafted a second version of a controversial cybersecurity law. It would bring a great deal of censorship for both foreign and domestic citizens and businesses, whether they use the cloud or not.

Get Windows 10 While It's Still Free

What are you waiting for? There are few reasons left to resist Microsoft's Windows 10 update, especially while it's still free.

Planning software work and running a team.

Roadmap of new product features can be randomized by technical debt or operational issues. It’s more to keep in mind when planning work and running a team.

Product management involves a lot of risk and failure on the way to success

Embracing system failure as a learning opportunity.

Product Managers live by the feedback loop

The longer product Manager goes without seeing live product and learning from it, the bigger the risk it incurs.

Expecting system failure

Set an expectation that when you stand up a service, you should create it with failure in mind. 
You should expect that at any time, some crazy stuff might happen, and you need to stay up.

No fear of changes

Organizations, especially enterprise entities, mostly fear change.  
But software development is an incredibly fast-changing discipline in terms of tooling, frameworks, and engineering, and requires continuous change to get to the right place.

Writing Beautifully Engineered Code

Writing great software requires defining a good architecture that not only follows good design patterns and principles, but also takes advantage of modern infrastructures. 
Producing well-engineered code not only enables writing new functionalities faster, but also reduces bugs significantly.

Fiddler - The free web debugging proxy for any browser, system or platform

Image
Key Features Web DebuggingDebug traffic from PC, Mac or Linux systems and mobile devices. Ensure the proper cookies, headers and cache directives are transferred between the client and server. Supports any framework, including .NET, Java, Ruby, etc. Performance TestingFiddler lets you see the “total page weight,” HTTP caching and compression at a glance. Isolate performance bottlenecks with rules like “Flag any uncompressed responses larger than 25kb.” HTTP/HTTPS Traffic RecordingFiddler is a free web debugging proxy which logs all HTTP(s) traffic between your computer and the Internet. Use it to debug traffic from virtually any application that supports a proxy like IE, Chrome, Safari, Firefox, Opera and more. Web Session ManipulationEasily manipulate and edit web sessions. All you need to do is set a breakpoint to pause the processing of the session and permit alteration of the request/response. You can also compose your own HTTP requests to run through Fiddler.

Engineering is the key to build great software

While programming knowledge and effort is very important, the amount of effort that is required to build great software (bug free, secure, and salable) is in engineering.

Programming is just one of the areas to contribute to modern software.

Software development is a complex process.

GitHub released 3 terabytes of their platform's activity data, and you can query it.

https://github.com/blog/2201-making-open-source-data-more-available?ref=freecodecamp

Employers will only look at your résumé for 6 seconds.

Unread counts of Google InBox

Inbox has no unread counts - it works on the basis that a message is either Done or Not Done, rather than read or unread.

New unread mail in your inbox is in bold type, like you'd expect, but is not counted

If you want to see your unread mail in Inbox, then you can type is:unread in the search box to list them in date order.

How to “Change” Your Gmail Address

There are two really cool tips you can use if you feel like getting ultra fancy with your Gmail inboxes.The first is that dots don’t affect deliverability in standard Gmail addresses. That means that if you register john.smith@gmail.com you will also receive all email sent to johnsmith@gmail.com and j.ohnsmith@gmail.com andj.o.h.n.s.m.i.t.h@gmail.com. The email is delivered to your account regardless of any dots in the address. But Gmail filters will still sniff out the differences. That means you can have your colleagues emails you at john.smith@gmail.com, tell your account to email you at johnsmith@gmail.com and have all of your social media notifications forwarded to j.ohnsmith@gmail.com. All of them will arrive in your account, and you can setup filters to look for the different dot patterns in the “To:” fields and separate out your messages. Note: The dot trick won’t work in Google Apps accounts for your business, only on standard, public “@gmail.com” accounts That’s kind of cool, …

How to Add AdSense Ads to Blogger Header

In Blogger HTML, search / go to header section:

<b:widget id='Header1'

Change the locked='true' to 'false'.

After that we can add AdSense widget to the header.

Advance configuration of Google Blogger

In Template HTML, search for

locked
visible

Toggle between 'true' and 'false' for customization.

Mobile:

There are three ways to control whether a widget shows on blogger mobile template or not

How To Edit/Customize Mobile Template On Blogger Widgets

Less AdSense ad can be more

While our policies allow you to place 3 ad units, 3 link units, and 2 search boxes on each page of your site, placing the maximum number of ads on your page may make it look cluttered. If users can't find what they're looking for on your site, they may turn elsewhere for information.

Top 10 Most Expensive Keywords

The Top 10 Most Expensive Keywords are: InsuranceLoansMortgageAttorneyCreditLawyerDonateDegreeHostingClaim

How to convert a Chrome extension to run on Microsoft Edge in the Windows

Microsoft Edge Extension Toolkit This toolkit allows developer to convert a Chrome extension to run on Microsoft Edge in the Windows 10 Anniversary Update (14393.10) edition. The tool creates the necessary JSON manifest entries and bridges the chrome.* APIs to the browser.* APIs supported on Microsoft Edge, polyfiling where necessary.More

Main advantages of Jekyll for GitHub pages

The main advantages of Jekyll are:You can use Markdown instead of HTML. Markdown is simpler to read and write.You can use common templates, such as headers and footers, that are shared across files.You can use a simplified build process to build your site with GitHub Pages.

How to change DNS settings on Linux

sudo vi /etc/resolv.conf

Programming tools come and go, but fundamentals are forever.

Work smarter and faster with Google Apps

Gmail is part of Google Apps for Work, which also includes online storage, shared calendars, video meetings and more.Google Apps includes a business version of the world’s most popular webmail service. You’ll get personalized @yourcompany.comaddresses for your whole team, up to 30GB of storage per person, 24/7 support and zero ads. Emailed the wrong person? Hit undo and they’ll never know.If an email refers to an event, instantly add it to your calendar.Get a warning when you mention a file but forget to attach it.

Try it free

How to sort blogger posts by page view count

This can be done within YourBlogger > Stats > Posts. It even supports ordering posts by their pageviews per day/week/month/all-time in your Blogger Dashboard.

Learn from others

“The more you learn to read other people’s stuff, the more able you are to invent your own in the future, it seems to me.”
Donald Knuth
Computer scientist

GPOs (Group Policy Objects) are a collection of settings that can be applied to a group of users or computers or to the entire Windows Active Directory environment.

Microsoft provides a program snap-in that allows you to use the Group Policy Microsoft Management Console (MMC). The selections result in a Group Policy Object. The GPO is associated with selected Active Directory containers, such as sites, domains, or organizational units (OUs).

Find the programming languages that are most important to you

What’s hot with the folks in open source? What are employers demanding?—Spectrum’s Interactive Top Programming Languages lets you adjust the weight of each metric in contributing to the ranking. You also have the option to filter the results: for example, looking only at languages used in embedded systems or mobile applications. You can customize each weighting yourself or use one of our presets.

Serverless advantages

Serverless means that you can focus on your application logic without dealing with infrastructure at all. Painless development, deployment, and maintenance of a web API is still not turn-key, although modern web application frameworks have improved dramatically in the last few years.

URL redirects

A URL redirect does exactly what it sounds like: when you enter a URL into your browser or click on a link, it directs you from your initial location to a different destination.The way redirects actually work is a little more complex. You’re probably familiar with the “404 not found” error. There are other similar codes that tell your browser what the status of a redirected URL is — whether it’s gone forever or just temporarily missing — and what to do next.The currently used/recommended redirect codes are:301 — permanent redirect (the first URL isn’t coming back)303 — see other (you’re being moved to a new URL, just wait a moment)307 — temporary redirect (the page you want has temporarily moved to this location)

Azure Functions - Process events with serverless code

Process events with serverless codeAzure Functions is a serverless event driven experience that extends the existing Azure App Service platform. These nano-services can scale based on demand and you pay only for the resources you consume.

Serverless Framework

Serverless Framework – Build web, mobile and IoT applications with serverless architectures using AWS Lambda, Azure Functions, Google CloudFunctions & more! – -http://www.serverless.com

How to redirect requests only if the file is not found on Apache web server

Apache FallbackResourceDirective Use this to set a handler for any URL that doesn't map to anything in your filesystem, and would otherwise return HTTP 404 (Not Found). For exampleFallbackResource/not-404.phpwill cause requests for non-existent files to be handled by not-404.php, while requests for files that exist are unaffected.It is frequently desirable to have a single file or resource handle all requests to a particular directory, except those requests that correspond to an existing file or script. This is often referred to as a 'front controller.'In earlier versions of httpd, this effect typically required mod_rewrite, and the use of the -f and -dtests for file and directory existence. This now requires only one line of configuration.FallbackResource/index.phpExisting files, such as images, css files, and so on, will be served normally.

AWS Lambda Limits

AWS Lambda Resource LimitsResourceDefault LimitEphemeral disk capacity ("/tmp" space)512 MBNumber of file descriptors1,024Number of processes and threads (combined total)1,024Maximum execution duration per request300 secondsInvoke request body payload size (RequestResponse)6 MBInvoke request body payload size (Event)128 KInvoke response body payload size (RequestResponse)6 MB
The following table lists the Lambda account limits per region.AWS Lambda Account Limits Per RegionResourceDefault LimitConcurrent executions (see Lambda Function Concurrent Executions

AWS Lambda allows you to Go serverless

You no longer have to deal with over/under capacitydeploymentsscaling and fault tolerance, OS or language updatesmetrics, and logging. ( but need to pay attention to limits http://www.hdgem.com/2016/08/aws-lambda-limits.html?m=1)AWS Lambda lets you painlessly drop in your own code, run code in parallel, create backends, develop event handlers and data processing systems, and never pay for idle time. AWS Lambda introduced a new serverless world, providing an event-driven scale with the flexibility of sub-second billing.

Serverless with Google Cloud Functions

Google Cloud Functions is a lightweight compute solution for developers to create single-purpose, stand-alone functions that respond to Cloud events without the need to manage a server or runtime environment.

How to enable / disable a service on Ubuntu

Starting with Ubuntu 15.04, Upstart will be deprecated in favor of Systemd. With Systemd to manage the services we can do the following: systemctl start SERVICE.service - Use it to start a service. Does not persist after reboot systemctl stop SERVICE.service - Use it to stop a service. Does not persist after reboot systemctl restart SERVICE.service - Use it to restart a service systemctl reload SERVICE.service - If the service supports it, it will reload the config files related to it without interrupting any process that is using the service. systemctl status SERVICE.service - Shows the status of a serviceTells whether a service is currently running. systemctl enable SERVICE.service - Turns the service on, on the next reboot or on the next start event. It persists after reboot. systemctl disable SERVICE.service - Turns the service off on the next reboot or on the next stop event. It persists after reboot. systemctl is-enabled SERVICE.service - Check if a service is currently configured to s…

CSS SYNTAX

Syntax
selector {property: value;}
External Style Sheet
<link rel="stylesheet" type="text/css" href="style.css" />
Internal Style
<style type="text/css">
selector {property: value;}
</style>
Inline Style
<tag style="property: value">

PhantomJS vs CasperJS

PhantomJS is a scriptable, headless browser with a JavaScript API. It can be used for things like web scraping like in this small example. What PhantomJS doesn’t have is testing utilities. This is where CasperJS comes in and provides testing utilities like assertions, organizing tests, and keeping track of tests that fail and succeed.

CasperJS Navigation scripting & testing for PhantomJS and SlimerJS

NAVIGATION & AUTOMATIONCasperJS allows you to build full navigation scenarios using high-level functions and a straight forward interface to accomplish all sizes of tasks. TESTINGCasperJS comes with a basic testing suite that allows you to run full featured tests without the overhead of a full browser. Output the tests to xunit for long term code health as well. SCRAPINGCapture data from web pages simply that don't contain APIs. Validate your production environment on a regular basis. Alternatively, use this to load your application with data.