Showing posts from December, 2018

There's a good reason people don't exercise enough, eat healthy, or save for retirement, and a ...

2018, Bitmain, and the fall in cryptocurrency mining

Consumer Credit And Blockchain

Dedicated IP Addresses

If you send a large volume of email, you may want to purchase dedicated IP addresses in order to more carefully develop your sender reputation.

Digital Rights Management (DRM) is technology that enables online video and audio services to enforce that the content they provide is used in accordance with their requirements.

This technology may restrict some of the things you can do in the browser. While some DRM-controlled content can be viewed using the Adobe Flash or Microsoft Silverlight plugin, many services are moving towards HTML5 video that requires a different DRM mechanism called a Content Decryption Module (CDM). 

Email delivery is controlled by several layers of security.

Long gone are the days when you could fire off an email and assume it went directly into your customers' inboxes. Between spam filters, anti-virus programs, and blacklist-based email filters your email delivery is controlled by several layers of security.

Passport is authentication middleware for Node.js.

Extremely flexible and modular, Passport can be unobtrusively dropped in to any Express-based web application. A comprehensive set of strategies support authentication using a username and password, Facebook, Twitter, and more.

Minimal install of CentOS 7

Minimal install of CentOS 7 from the official image. If you have previously installed CentOS, there are some additional steps you might want to consider:
●  Remove all development tools (compilers, etc.)
●  Remove all services listening so that only port 22 is exposed for SSH access. Our firewall configuration will stop traffic intended for any other running services but it is best practice to stop and remove these additional services. 

Mozilla Adds Three Experimental Features to Firefox through Test Pilot Program

The three features; Send, Notes, and Voice Fill; enable encrypted file sharing with auto-deletion, a notepad within the browser's sidebar, and a Speech to Text engine.

FBI can keep secret whose data it has stored in its vast biometrics database.

The FBI has obtained a legal exemption from federal privacy laws, allowing the agency to keep secret whose data it has stored in its vast biometrics database.

Vulnerability in the WordPress ‘Newspaper’ theme.

This vulnerability allows them to inject malicious code into the WordPress 'wp_options' table which then redirects your traffic to malicious websites or ad campaigns.

Google fires the engineer behind sexist memo

Google has fired the engineer that penned the exit memo criticizing the company's approach to diversity and asserting harmful stereotypes about gender. The engineer's memo violated the company's Code of Conduct, resulting in the dismissal.

Setting up two-factor authentication for your online accounts

Setting up two-factor authentication for your online accounts means a little extra work but more security, and you have more than one way to do it.

Better business results is a top value driver for DevOps.

It promises higher quality user satisfaction, reduces costs, and improves operational efficiency

Microservices can do wonders for your organization.

When it comes to development speed, time-to-market, and continuous delivery, microservices can do wonders for your organization.

Solve a simpler version of the problem

Solve a simpler version of the problem and see if that gets us closer to a solution for the original problem.

Google has made its Local SSD pricing more attractive for standard VMs and its cheap preemptible instances.

Google drops cloud Local SSD prices by up to 63 percent.

Disney will launch its own streaming service

Disney is taking its content and saying goodbye to Netflix, with a plan to start its own streaming service in 2019. The plan is to end its distribution deal with Netflix in 2019 (specifically for its movies) and use its new controlling stake in MLB streaming spin-out BAMTech to build something it owns entirely.

Security breaches are one of the most likely—and most expensive—threats to businesses

Few companies prepare effectively. While there's no way to completely eliminate cyber risks, there are concrete steps you can take to reduce them.

Facebook Introduces a Dedicated Home for Videos

Facebook is trying to coax its two billion monthly users to stay around and watch more videos.

GraphQL gives developers more control over what data they accessed

GraphQL was developed by Facebook and is now used by GitHub and others, giving developers more control over what data they accessed, allowing them to design the exact API responses they needed for any application at runtime.

OAuth2 is the modern standard of providing security for REST and SOAP APIs.

However, a lot of enterprises have existing SAML Identity Providers (IdP) and that they use as their internal authentication standard. They would like their web and mobile applications to have end-users authenticate with these existing providers and then translate that to OAuth, enforce access and policies, and pass the calls to the backend.

Trailmixes are custom learning paths you create from your favorite trails, modules, projects, and superbadges.

Share them to guide your fellow Trailblazers!

Troubleshooting problems by a secondary user account

Having a secondary user account is useful for troubleshooting problems with your primary account.

Firefox 55: Improvements to functionality and core browser performance

New features include:

- support for WebVR, making Firefox the first desktop browser on Windows to support VR experiences.

- significantly faster startup times when restoring lots of tabs and settings that let users take greater control of our new multi-process architecture.

- upgraded address bar to make finding what you want easier, with search suggestions and the integration of our one-click search feature, and safer, by prioritizing the secure - https - version of sites when possible.

Great customer support

Great customer support professionals know how to "read the room" and evaluate each customer within each specific situation to offer the right sort of response.

Osquery by Facebook exposes the operating system through the medium of the Query language.

This has real world usage. For example, it can be used to get the list of hardware devices that are connected using USB.

As a developer, there is always the need for tools.

Tools make a developer's life easier as they enable him/her to be more productive and only focus on things that matter the most.

Consumer Reports (CR) dropped its "recommended" rating for all of Microsoft's Surface laptops and tablets due to poor predicted reliability relative to rivals.

The finding was based on a survey of over 90,000 CR subscribers

One of the coolest aspects of programming.

Contributing to open-source projects gives you an opportunity to volunteer your time to improve a project used by you and your community.

SoundCloud saved by emergency funding as CEO steps aside

SoundCloud has just closed the necessary funding round to keep the struggling music service afloat.

Making use of Gmail draft

Turn your drafts folder into a catch-all for on-the-go ideas, meeting notes, or anything else you might want to quickly share out. The content will be sitting in your Gmail, ready for you to polish and send.

Google G suite promotion code provides 20% off the first year.


G Suite promotion link:

Google G suite promotion code provides 20% off the first year.


Transfer Appliance beta

Transfer Appliance is a hardware appliance you can use to securely migrate large volumes of data (from hundreds of terabytes up to 1 petabyte) to Google Cloud Platform (GCP) without disrupting network and business operations

The Chinese government has announced that it will use BlockChin to collect taxes as well as issue invoices (electronic invoices).

According to the Chinese government, the country is considering working on how to use the Financial and Tax Office. Under an agreement with Shenzhen Zhanhe Technology Investmen, the Chinese government is working on a collaborative development plan for the government-funded financial and tax chain.

The recent Chinese-led initiative can be an example of how Blockacin technology can be used for everyday life. Also, because of its security and transparency, Blockacin can be an attractive and attractive option for tax matters.

Google Fusion Tables is a web application used for sharing, visualizing, and publishing tabular data.

You can upload your own CSV, KML, ODS, XLS, or Google Spreadsheet data to a Fusion Tables table. Once your data is in Fusion Tables, you can collaborate on it with others in real time, publish it for Google Search, create map and chart visualizations for private use or for embedding on websites, filter it according to specific criteria, and update the data behind your visualizations or filters at any time.

Apple resisted pressure from the FBI to create a weakened version of iOS, describing it as too dangerous.

Apple uses end-to-end encryption for both iMessage and FaceTime.

How to add a prefix string to beginning of each line

sed -e 's/^/prefix/' file

# If you want to edit the file in-place
sed -i -e 's/^/prefix/' file

# If you want to create a new file
sed -e 's/^/prefix/' file >

How to empty the trash using terminal

rm -rf ~/.local/share/Trash/*

People using the CalDAV API, such as those on Apple's calendar clients, no longer need to go to Google Calendar on the web to join their meetings.

Whenever someone uses a third-party CalDAV-based calendaring client to access an event on Google Calendar, Google will add automatically generated text to the event's description. This text will include instructions on how to join the event through Meet or Hangouts.

Samsung and Google have partnered together to build the best Chromebook with the Samsung Chromebook Plus.

Samsung Chromebook Plus is incredibly well-built, has one of the best displays of any laptop, and is the first Chromebook with the new Pen that adds pressure sensitive drawing. It has 12.3-inch 2400x1600 IPS touch panel.
The Chromebook Plus is incredibly well built with an aluminum chassis and full-size keyboard and trackpad.
There is plenty of power to run Chrome and Android apps, and you can do it all day without charging.

How to convert month between name and digit in MySQL

select month(str_to_date('March','%M'))output: 3select month(str_to_date('Mar','%b'))output: 3monthname(str_to_date('Mar','%b'))output: March

Example of Bash date range

How to Pass Parameters To MYSQL Query In Shell Script

If you only want to execute a single statement:
mysql -e "INSERT INTO user VALUES ('$USERNAME', password)
If you source a sql file:

How to fix sudo: sorry, you must have a tty to run sudo

It is most-likely that you are running on a Linux distribution with sudo configured to require a tty. This is generally enforced by having Defaults requiretty in the /etc/sudoers.
To disable requiretty globally or to a single command, you have two options:
Replace Defaults requiretty by Defaults !requiretty in your /etc/sudoers. This will impact your global sudo configuration.
Alternatively, you can change this configuration at a per user, per group or per command basis
Defaults!/path/to/my/bin !requiretty Defaults:myuser !requiretty
 Connect by ssh using -t options
From man ssh: text -t Force pseudo-tty allocation. This can be used to execute arbitrary screen-based programs on a remote machine, which can be very useful, e.g. when implementing menu services. Multiple -t options force tty allocation, even if ssh has no local tty.

If -t is not enough, you can use  ssh -t -t Or ssh -tt. 

Use the -t or -tt options to ssh which spawns a pseudo-terminal on the remote side, but beware that it has a n…

How to delete a S3 bucket

A S3 bucket needs to be completely empty before it can be deleted. You must delete all the objects manually or setup a lifecycle policy to remove everything after 24 hours or you may use 3rd party tool, s3nukem.

Delete a Bucket:
You can delete a bucket and its content programmatically using AWS SDK. You can also use lifecycle configuration on a bucket to empty its content and then delete the bucket.

-->>> There are additional options, such as using Amazon S3 console and AWS CLI, but there are limitations on this method based on the number of objects in your bucket and the bucket's versioning status.<----

Here are some CLI commands that you can use to delete everything from the bucket:

-= Delete all the versions =-
aws s3api list-object-versions --bucket mybucket --output json --query 'Versions[].[Key, VersionId]' | jq -r '.[] | "--key '\''" + .[0] + "'\'' --version-id " + .[1]' | xargs -L1 aws s3api delete-…

How to get AWS s3 bucket ACL

aws s3api get-bucket-acl --bucket <value>

ARN of an S3 bucket

It's always arn:aws:s3:::NAME-OF-YOU-BUCKET

Amazon S3 bucket names are globally unique

Once a Amazon S3 bucket name has been taken by any user, you can't create another bucket with that same name.
             * You can optionally specify a location for your bucket if you want to
             * keep your data closer to your applications or users.

How to set up Amazon AWS S3 Static Website Hosting - Enable permission

To enable permission for Amazon AWS S3 Static Website Hosting:

After you enable Static Website Hosting for your S3 bucket, you need to give the objects  s3:GetObject permission for it to work.

For example, the following allow everyone to have s3:GetObject permission to bucket, which is very common for public static hosting.

"Version": "2008-10-17",
"Id": "Policy1407788858888",
"Statement": [
"Sid": "Stmt1407788848888",
"Effect": "Allow",
"Principal": {
"AWS": "*"
"Action": "s3:GetObject",
"Resource": "*"
Also grant everyone List and View permissions in properties.

How to Grante Read-Only Permission to an Anonymous User For your Amazon AWS S3 bucket

The following example policy grants the s3:GetObject permission to any public anonymous users. (For a list of permissions and operations they allow, see Specifying Permissions in a Policy.) This permission allows anyone to read the object data, which is useful for when you configure your bucket as a website and want everyone to be able to read objects in the bucket.
"Principal": "*",

How to fix: s3cmd sync: remote copy the wrong files to the wrong locations

Pay attention to directory names, specifically trailing slashes.
s3cmd documentation

With directories there is one thing to watch out for – you can either upload the directory and its contents or just the contents. It all depends on how you specify the source. To upload a directory and keep its name on the remote side specify the source without the trailing slash: ~/demo$ s3cmd put -r dir1 s3://s3tools-demo/some/path/
dir1/file1-1.txt -> s3://s3tools-demo/some/path/dir1/file1-1.txt [1 of 2]
dir1/file1-2.txt -> s3://s3tools-demo/some/path/dir1/file1-2.txt [2 of 2]
On the other hand to upload just the contents, specify the directory it with a trailing slash: ~/demo$ s3cmd put -r dir1/ s3://s3tools-demo/some/path/
dir1/file1-1.txt -> s3://s3tools-demo/some/path/file1-1.txt [1 of 2]
dir1/file1-2.txt -> s3://s3tools-demo/some/path/file1-2.txt [2 of 2]
Important — in both cases just the last part of the path name is taken into account. In the case of dir1 without trailing slash (which…

Reducing page load time boosts sales and conversion rates significantly.

A research study found that conversions per second improved as load times went down.

Why mobile sites instead of apps

Easy to discover: Mobile sites are easily discoverable

Lightweight: Does not require device memory for installation

Intuitive: Users are familiar with how websites work

As users spend more time on mobile devices, getting mobile sites right is crucial to success

If your client's website is too slow to load, users will drop off. On the other hand, a fast-loading site with bad UX design makes it hard for users to complete their desired action.

Microservices architectures help give you the agility and stability you need as your operations scale up.

Deliver microservices and applications with greater speed, consistency and reliability.

Spring Cloud Function

Spring Cloud Function abstracts away all of the transport details and infrastructure, allowing the developer to keep all the familiar tools and processes, and focus firmly on business logic.
jQuery has a function called .css() that allows you to change the CSS of an element.

Here's how we would change its color to blue:

$("#target1").css("color", "blue");

Bitcoin Cash is now the world's third-largest cryptocurrency

Just over 24 hours after splitting from Bitcoin, the derivative currency Bitcoin Cash (BCC) now ranks as the third most valuable altcoin. With a market cap of more than $7.7 billion, BCC trails just Bitcoin (BTC) and Ethereum (ETH).

How to find competitors

Finding competitors

[ ] Alexa
[ ] AlternativeTo
[ ] AngelList
[ ] Product Hunt
[ ] SimilarSites

Today’s jobs are vastly different than they were a generation ago.

The days of working for 40 years at one job and retiring with a good pension are gone. Now the average time in a single job is 4.2 years, according to the US. Bureau of Labor Statistics. What's more, 35% of the skills that workers need — regardless of industry — will have changed by 2020.
House your page within a Bootstrap Container Fluid Div

Nest your elements within a div element with the class container-fluid.

How to add Font Awesome to your app

You can add Font Awesome to any app just by including it by adding the following code to the top of your HTML:

<link rel="stylesheet" href="//"/>

Font Awesome is a convenient library of icons.

These icons are vector graphics, stored in the .svg file format. These icons are treated just like fonts. You can specify their size using pixels, and they will assume the font size of their parent HTML elements.

AWS has continued to grow its revenues more rapidly than the overall cloud market

AWS is the one to beat, and it will likely remain so for sometime.

IEEE Spectrum of programming languages

It aggregate many different kinds of statistical data with the hope of generating the most reliable ranking.

It gives you the most personalized ranking. The interactive interface allows readers to filter by search trends, job trends, or open source community trends. You can even modify the weighting of each dimension, enabling an extremely personalized ranking.

Container as a service

The "container as a service" lets you rapidly create and launch containerized applications, including from Kubernetes, without any overhead and with an easily scriptable set of commands.

How to add Google GPG public key to Ubuntu

wget -q -O - | sudo apt-key add -

Azure Container Instances provide a simple experience to get started with containers in the cloud

Enabling you to quickly create and deploy new containers with only a few simple parameters.

Containers offer a broadly accepted and open standard, enabling simple portability between platforms and between clouds.

Containers have fundamentally changed the way developers develop their applications, the way applications are deployed, and the way system administrators manage their environments.

The top ten programming languages

Using the default ranking for a typical reader of the IEEE Spectrum, the top ten languages are Python, C, Java, C++, and C#, R, JavaScript, PHP, Go, and Swift.

How to Make a Facebook Page for Your Small Business

From your Facebook profile page, click the Pages header in the left-side navigation. Next, click the Create a Page button, and select the type of page--Local Business or Place, for example, or Brand or Product. You'll see a number of fields to fill out, such as your business category, name, and address.

How to add Bootstrap to your app

You can add Bootstrap to any app by adding the following code to the top of your HTML:

<link rel="stylesheet" href="//"/>

How to import a Google Font

Import a Google Font 

<link href="" rel="stylesheet" type="text/css">

CSS Classes are reusable styles that can be added to HTML elements

Classes are reusable styles that can be added to HTML elements.Here's an example CSS class declaration:<style>
  .blue-text {
    color: blue;

Mozilla Send service allows users to make an encrypted copy of a local file, store it on a remote server, and share it with a single recipient.

And once shared, the encrypted data gets deleted from the server.

Making money online is a long term game!

Nothing happens over night when it comes to online income.

It takes time to build up your opportunity. Don't get frustrated. Work at it every single day, and you can make a big difference.

Persistence and dedication are the keys to success!

Every aspect of software engineering is rapidly changing

In software engineering you always need to keep yourself updated with the latest tools, libraries, frameworks and best practices.

Types of problems you solve matter

The programming language isn't what gets you a high paying salary. What gets you the really high paying salaries are the types of problems you solve using your programming skills.

Software development is basically glorified mathematics.

You can make something perfect. You can prove something is optimal. You can rapidly test. You get instant feedback.

Setup WordPress with Google Authenticator

Setup with Google Authenticator
To set up two step authentication via an authenticator application on your device, you'll need to start in a desktop browser.First, go to your Two-Step Authentication settings page at, you can reach Settings by clicking on your Gravatar image from the home page.

Back to school: Asus ZenBook UX330UA

If you're looking for a laptop that has a bit of a high-end look and feel without too much of a premium price, you're not likely to do much better than the Asus ZenBook UX330UA.

It's a top pick of The Wirecutter and Laptop Mag, among others.

It has great screen and impressively long battery life, thin and light (and stylish) design.

It's available in different configurations if you need a bit more power, but the $700 setup with a Core i5 processor, 8GB RAM and a 256GB SSD hard drive should be more than enough for most students.

WordPress Application-Specific Passwords

There may be some apps that connect to your account that don't yet fully support Two Step Authentication; the most common are the WordPress mobile apps or Jabber apps used to subscribe to blogs. For these apps, you can generate unique passwords for each application (e.g., you can have a different password on your phone and your tablet). You can then disable individual passwords and lock applications out of your account to prevent others from accessing your sites.

To generate application-specific passwords, head back to Two-Step Authentication and then down to "Application Passwords":

What is Two Step Authentication?

Two step authentication is a method of securing accounts requiring that you not only know something (a password) to log in but also that you possess something (your mobile device). The benefit of this approach to security is that even if someone guesses your password, they need to have also stolen your possession in order to break into your account.

PowerApps is a collection of software services and apps that work together to fundamentally transform and accelerate how you build and share custom line of business applications.

PowerApps connects to the cloud services and data sources you're already using, giving you the ability to quickly build apps that suit specific needs - building on skills you already have. You can share apps instantly with your co-workers across the web, tablets, and mobile devices. PowerApps also integrates with Microsoft Flow, making it possible to trigger workflows from within apps. PowerApps can be simple and fast - capable of producing an app in minutes that pulls in data from Excel or a cloud service. But PowerApps is also robust and enterprise-grade, ready for complex requirements like tracking assets across a corporation and tying into your backend systems.

Azure Automation helps you focus on work that adds business value.

Automate all of those frequent, time-consuming, and error-prone cloud management tasks. By reducing errors and boosting efficiency, it also helps to lower your operational costs.

FBI arrests the researcher who helped shut down WannaCry

Researcher Marcus Hutchins was arrested by the FBI as he prepared to depart from the annual DefCon conference in Las Vegas. Hutchins is accused of helping distribute Kronos, banking malware that stole online banking and credit card credentials.

How to free space from deleted but still reserved (open) files

A file in Linux is a pointer to an inode, which contains the file data (permissions, owner and where its actual content lives on the disk). Deleting the file removes the link, but not the inode itself – if another process has it open, the inode isn't released for writing until that process is done with it.

lsof | grep deleted

to list those deleted files.

mysqld     6355     mysql   10uW     REG               8,17    268435456         18 /var/lib/mysql/ib_logfile1 (deleted)

The important columns are the second one, which gives you the PID of the process that has the file open (6355), and the fourth one, which gives you the file descriptor (10). Now, we go look in /proc, where there will still be a reference to the inode, from which you can copy the file back out:
ls -l /proc/6355/fd/10 lrwx------ 1 root root 64 Mar 12 15:50 /proc/6355/fd/10 -> /var/lib/mysql/ib_logfile1 (deleted)
now, just cat /dev/null into the fd

cat /dev/null > /proc/6355/fd/10 Note that the inode is still open, bu…

Resident Set Size is the amount of RAM currently allocated to and used by a process.

It includes the code, data, and shared libraries.

Mozilla has launched a new website that makes it really easy to send a file from one person to another.

Mozilla has  launched a new website that makes it really easy to send a file from one person to another. The site is called Send, and it's basically the Snapchat of file sharing: after a file has been downloaded once, it disappears for good.

Cryptocurrency Exchange Altcoin Delisting Ramps Up and Wraps Up 2018

India Stalls Cryptocurrency Regulations, Uncertainty Continues

The iPhone includes a Voice Memos app that allows anyone to quickly record their voice, a speech, something nearby, or any other ambient audio from the devices built-in microphone

The Voice Memos app is often overlooked, but it offers by far the simplest way to record audio from the iPhone microphone
The resulting audio quality is quite good, and going further, you can save and share the recorded sound with another iPhone, Mac, Windows PC, Android user, or nearly anything else, as it arrives as a universally compatible audio file.

Though the iPhone microphone will pick up audio from a distant, for the best results you’ll want to have the recorded subject to be fairly near the iPhone itself. Another option is to use the bundled headphones that come with iPhone, which also include a microphone, and make recording your own voice easy and sound great.

Google Voice provides free voice mail, free phone number and conversation recording.

When you answer calls made to your Google Voice number, tap 4 on the Phone app's number pad. Participants will hear a robot voice state that recording has begun—this is Google's way of keeping you legal, as Alphabet Inc. wants no part of a lawsuit. To stop recording, tap 4 again or hang up. You can hit the 4 key as often as you like in a conversation to start and stop recording.

"Incoming call options" must be activated in the Google Voice settings, which you can reach via the hamburger menu () in the mobile app or via on the desktop.

Record an incoming call using Google Voice

Google Voice can record incoming calls for freeThe only setbacks are that Google doesn’t allow you to record outgoing calls — only incoming ones — and you have to port your phone number over to Google to get access to the recording feature. This makes it rather inconvenient if you’re hoping to record any conversations that you yourself need to initiate, or if you like your current carrier.

What you can do with blockchain

Once you wrap your head around what blockchain is and how it works, one of the first questions people ask is what you can do with it beyond powering cryptocurrencies. Blockchain experts often point to banking and finance, insurance and healthcare, and digital identity as first-mover industries and applications. However, one that's sometimes overlooked is how blockchain could revolutionize global trade and supply chain management.

In the U.S., discounter JetBlue is now the largest U.S. carrier at New York’s JFK and Boston’s Logan.

To minimize training and maintenance costs, they mainly have fleets of the same kind of planes—some now outfitted with leather seats and seat-back entertainment. And they often buy those planes in bulk from Boeing Co. or Airbus SE to get discounts.

1,069 robots broke a Guinness World Record for the "most robots dancing simultaneously" in Guangzhou, China

The humanoid machines were created by WL Intelligent Technology.

Switch from Http to Https: Resolving problems with mixed content

If you enable HTTPS for your site, and your site's HTML still references images, CSS, or JavaScript over HTTP, then your site is serving mixed content, and you may have trouble loading assets. Serving mixed content also makes your site less secure. To remove your site's mixed content, improve your site's security, and resolve problems related to loading mixed content, edit your site's HTML files and change http:// to https:// so that all of your assets are served over HTTPS.
Examples of how assets may be referenced in an HTML fileAsset typeHTTPHTTPSCSS<link rel="stylesheet" href=""><link rel="stylesheet" href="">JavaScript<script type="text/javascript" src=""></script><script type="text/javascript" src=""></script>Image

Dovecot is among the highest performing IMAP servers while still supporting the standard mbox and Maildir formats.

The mailboxes are transparently indexed, which gives Dovecot its good performance while still providing full compatibility with existing mailbox handling tools.

Java 8 offers static methods join as part of the String class definition.

The join method offers the convenience of not adding the delimiter at the end of the string as well. As a matter of fact, class String offers two join methods with the following signatures:

public static String join(CharSequence delimiter, CharSequence... elements)

public static String join(CharSequence delimiter, Iterable<? extends CharSequence> elements)

The method's contract doesn't allow the parameters to be passed as null. If the contract is violated, i.e. if one or both the parameters are null, then the method will throw a NullPointerException.
String.join("; ", myList);

Arch Linux is called highly personalized Operating System

Arch Linux is not a typical OS like other distros but comes with a Linux kernel and package manager, Pacman. It's also come without a graphical interface. Basically, Arch Linux comes with a bare bone base where the users can pick the required components and make the system without any bloat programs. That's why it's called highly personalized Operating System.

Linux Mint is the #1 most popular and best user-friendly Ubuntu-based Linux distro available out there

Linux Mint is similarly perfect fit for both newcomers and advanced users. The main motto of Linux Mint is "From freedom came elegance" which provides a stable, powerful, easy to use, and a complete out of the box experience.

Fedora is a community-powered Linux OS which is backed by Red Hat Inc and as famous for providing blending edge features.

The software repository is well updated and if you face any bug problem then you will be helped by a large number of community people in the forum. It comes with an open source component thus makes the open source lover happy. As it comes from the house of Red Hat, so you can run it without any issues for developing your applications and programs. Even Fedora is liked by the Linux kernel creator Linus Torvalds.

AdSense application disapproved because of unsupported language

If the majority of your site's content is in a language AdSense does not currently support, this can happen.

Right now, Google is only able to offer language support and ad targeting for 40 languages.

Oracle Opening Up Java EE

Oracle announced that Java EE will begin a transition to open sourcing.

Google holds just 7 percent of the worldwide cloud market

Worldwide cloud computing market is forecast by Gartner to be worth nearly $50 billion. and Microsoft hold 41 percent and 13 percent of cloud market share, respectively

According to Synergy Research Group.

How to enable Audit Logging in Glassfish Server

Auditing is the process of recording key security events in your GlassFish Server environment. You use audit modules to develop an audit trail of all authentication and authorization decisions. To enable audit logging, two steps are required: 1. On the Security page, select the Audit Logging Enabled checkbox to enable audit logging.
2. Set the auditOn property for the active audit module to true.

<audit-module classname=""name="default"> <property name="auditOn"value="false"></property>

How to fix postfix master dead but pid file exists

$ sudo service postfix status master dead but pid file exists One possible likely problem is that another process has already occupied the default port 25.

$ sudo -i lsof -i :25 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME sendmail 2607 root4uIPv4114060t0TCP localhost:smtp (LISTEN)

In /var/log/maillog you could get the line in the log:
Code: postfix/master[7240]: fatal: bind port 25: Address already in use
You can fix it by:

$ sudo yum -y remove sendmail

The Java Virtual Machine is used by computers to run Java bytecode.

The JVM is an abstract virtual computer running on various operating systems. In fact, the JVM is what makes Java "platform independent," because it acts as an abstraction between the executed code and the OS.

Policy controls are an important feature of MTAs that are connected to the Internet.

Perhaps their most important job is to stop MTAs being abused as "open relays" by misguided individuals who send out vast amounts of unsolicited junk, and want to disguise its source.

Print what Exim is doing right now

$ sudo exiwhat 23372 daemon(4.88): -q1h, listening for SMTP on port 25 (IPv6 with IPv4) port 587 (IPv6 and IPv4) and for SMTPS on port 465 (IPv6 and IPv4)

Exim works best when its queue is kept short

# There are circumstances where this is not always possible. If you uncomment
# the setting below, messages on the queue are held in 62 subdirectories of
# "input" instead of all in the same directory. The subdirectories are called
# 0, 1, ... A, B, ... a, b, ... z. This has two benefits: (1) If your file
# system degrades with many files in one directory, this is less likely to
# happen; (2) Exim can process the queue one subdirectory at a time instead of
# all at once, which can give better performance with large queues.

# split_spool_directory = true

Location of Exim configuration file

$ sudo cp /etc/exim/exim.conf /etc/exim/exim.conf.bak

Exim: accepting and delivering a message

From the Exim FAQ: Accepting and delivering a message are two entirely separate, independent processes, which communicate only by writing/reading the message on the disc.

Show the exim mail queue

To view the exim mail queue issue the following command: mailqOR exim -bp

Google Compute Engine offers more options—and massive price cuts.

GCE already offers industry-leading price and performance. Now Local SSDs cost 63% less and preemptible VMs are up to 71% less.

The good programmer

The good programmer is the one that analyze the problem, but does not just think to a solution but to a "class of solutions" that happens when requirements can change a little bit, and implement code in a way that such changes can be easily feasible. But at the same time does not push differentiation over the limits that invalidate the solution.

jQuery has a function called children() that allows you to access the children of whichever element you've selected.

Here's an example of how you would use the children() function:

$("#well").children().css("color", "blue")

Many HTML elements have children which inherit their properties from their parent HTML elements.

For example, every HTML element is a child of your body element.

Taking a break from a problem

Taking a break from a problem and coming back to it when your brain is fresh.

Programming takes a while to master