Posts

Showing posts from March, 2019

Building Trust In The Trustless: Blockchain's Best Asset Is Holding It Back

Enterprise-Level Debate Over Blockchain Viability Grows

Nuwave Investment Management Has Lifted Its Holding in Autozone (AZO) by $972080 as Shares ...

Blockchain And Cryptocurrency Securing the Facets of Freelancing Community

Cryptocurrency: An Expert's Guide

This Company Is Using Blockchain Technology to Eradicate Slavery In The Chocolate Industry

Create Commission Factory for your customers | Knowband's Prestashop Affiliate & Referral Program

These CEOs All Work In Blockchain, Now They Want It To Become Invisible

STEX to List Luxury-focused Cryptocurrency Elitium (EUM)

set default Ansible username/password

You can add following section to your inventory file: [all:vars]  ansible_connection=ssh  ansible_user=i88ca  ansible_ssh_pass=super88

Certain settings in Ansible are adjustable via a configuration file (ansible.cfg).

The stock configuration should be sufficient for most users, but there may be reasons you would want to change them.

If installing Ansible from a package manager, the latest ansible.cfg file should be present in /etc/ansible.

Cryptocurrency Market Enjoys Consistent Gains - Weekly Crypto Recap Mar 25 - Mar 31, 2019

Run ansible as a different user

/usr/bin/ansible will default to running from your current user account. You can pass in "-u username". If you want to run commands as a different user, it looks like this:$ ansible all -a "ls" -u username

Specify ansible user name in host file

[i88ca-workstations] 10.8.18.188 ansible_user=i88ca ansible_ssh_pass=test

ssh-agent list keys

se the-loption tossh-addto list them by fingerprint.$ ssh-add -l

Ansible - List available hosts

$ ansible all --list-host

Ansible host inventory

To fix Ansible 'ERROR! Missing target hosts'
Ahostsfile consists of host groups and hosts within those groups. A super-set of hosts can be built from other host groups using the:childrenoperator.

These files can be found within a Ansible repository or in /etc/ansible/hosts.

There is a default ansible 'hosts' file under /etc/ansible/hosts.

Set up SSH-agent so it can remember credentials

Set up SSH-agent so it can remember credentials:$ ssh-agent bash$ ssh-add ~/.ssh/id_rsa

Cryptocurrency-Friendly Financial Companies Start Operating in Russia and the United Kingdom

Petro and Venezuela: The origin of a cryptocurrency that was supposed to save the country

Linux check ansible version command

$ ansible --version

Remove key from known_hosts

sed -i '8d' ~/.ssh/known_hosts Will modify the file ~/.ssh/known_hosts:8 , removing the 8th line.

Haiti - Agriculture : Towards the use of Blockchain technology in agribusiness

Luigi Di Maio Calls for Digitizing Italy via Blockchain

Psychology Meets Email Marketing: The Best-Seller Effect – By Susanne Eberl

You can’t intercept and record the private phone conversations of others. Doing so can land you in prison for up to five years.

The World's First Blockchain Lifestyle Festival, Block Live Asia, Debuts in Singapore on April 18 ...

Curious about cryptocurrency? Here's everything you need to know

Rothfuss taking larger role in blockchain committee

Affiliate Marketing

UNICEF Will Use Blockchain Technology to Put Internet in Every Kyrgyzstan School

'Coinbase Effect' on Cryptocurrency Listing is Back

Twitter: We found more than one account with that telephone number.

Go in to each twitter account individually and removed mobile number like this

Log in to your Twitter account.
Go to your Settings and privacy by clicking your profile icon at the top right of the navigation bar and selecting Settings and privacy from the drop-down menu.
Click on the Mobile tab. Next to where your phone number is listed, click Edit.
Delete your phone number.

You can have multiple Twitter accounts associated with the same phone number.

Warning: This John McAfee-Pumped Cryptocurrency Has Major Red Flags

The Implications of Fusing 5G and Blockchain

Local firms continue testing emerging blockchain applications

Binance CEO says excessive printing of fiat will lead to cryptocurrency market surge

Bithumb cryptocurrency exchange hacked a third time in two years

Facebook's Cryptocurrency Won't Let You Buy Your Privacy Back

Crypto Tidbits: DragonEx Hacked For Bitcoin, VanEck ETF Delayed, Facebook Blockchain Hiring ...

PwC is Top Recruiter for Blockchain-Related Jobs on Indeed, Big 4 Auditing Firms Follow

US, China Face Off Over 5G in Cambodia

For techies and phone geeks, Digital Cambodia 2019 was the place to be. More than a dozen high school students clustered at the booth for Cellcard, Cambodia’s leading mobile operator. Under the booth’s 5G sign, they played video games on their phones. Hak Kimheng, a ninth grade student in Phnom Penh, said his mom bought him a Samsung smartphone a few months ago, when he moved to the capital city from nearby Kandal province to live with his uncle while attending school. Like moms everywhere, she thought the smartphone would help her stay in touch with her son. But smartphones being smartphones and kids being kids, Hak Kimheng, 16, has used it to set up an account on Facebook, Cambodia’s favorite social media platform. He’s also downloaded Khmer Academy, a tutoring app filled with math, physics and chemistry lessons. And for one hour a day, Hak Kimheng watches soccer on the YouTube app he downloaded. While it’s better than nothing, the internet connection is “slow … and the vide…

US, China Face Off Over 5G in Cambodia

For techies and phone geeks, Digital Cambodia 2019 was the place to be. More than a dozen high school students clustered at the booth for Cellcard, Cambodia’s leading mobile operator. Under the booth’s 5G sign, they played video games on their phones. Hak Kimheng, a ninth grade student in Phnom Penh, said his mom bought him a Samsung smartphone a few months ago, when he moved to the capital city from nearby Kandal province to live with his uncle while attending school. Like moms everywhere, she thought the smartphone would help her stay in touch with her son. But smartphones being smartphones and kids being kids, Hak Kimheng, 16, has used it to set up an account on Facebook, Cambodia’s favorite social media platform. He’s also downloaded Khmer Academy, a tutoring app filled with math, physics and chemistry lessons. And for one hour a day, Hak Kimheng watches soccer on the YouTube app he downloaded. While it’s better than nothing, the internet connection is “slow … and the vide…

US, China Face Off Over 5G in Cambodia

For techies and phone geeks, Digital Cambodia 2019 was the place to be. More than a dozen high school students clustered at the booth for Cellcard, Cambodia’s leading mobile operator. Under the booth’s 5G sign, they played video games on their phones. Hak Kimheng, a ninth grade student in Phnom Penh, said his mom bought him a Samsung smartphone a few months ago, when he moved to the capital city from nearby Kandal province to live with his uncle while attending school. Like moms everywhere, she thought the smartphone would help her stay in touch with her son. But smartphones being smartphones and kids being kids, Hak Kimheng, 16, has used it to set up an account on Facebook, Cambodia’s favorite social media platform. He’s also downloaded Khmer Academy, a tutoring app filled with math, physics and chemistry lessons. And for one hour a day, Hak Kimheng watches soccer on the YouTube app he downloaded. While it’s better than nothing, the internet connection is “slow … and the vide…

10 Tips for Growing Your Business with Technology and Talent

SEC Crypto Mom: 'Dismissive' US Regulators Miss the Point of Cryptocurrency

JPMorgan is hiring for more blockchain-related positions than any other financial firm, claims report

Niche Content and Value in Retail – By Brandon Myers

Can E-Sports Support Mainstream Adoption Of Blockchain This Year?

How to Invest in Blockchain Without Buying Any Bitcoin

Coolest High Paying Jobs That Art Stream Students Can Get

Indian cryptocurrency exchange, Coindelta shuts down operations owing to country's lack of crypto ...

Enabling or disabling check mode for Ansible tasks

There are two options:

Force a task to run in check mode, even when the playbook is called without --check. This is called check_mode: yes. Force a task to run in normal mode and make changes to the system, even when the playbook is called with --check. This is called check_mode: no.

Blockchain-based Coffee E-marketplace for Coffee Farmers

Was Bithumb Hacked For Millions Worth Of Crypto? EOS Blockchain Suggests So

Blockchain tech's ins, outs topic of forum at UA

Local firms continue testing emerging blockchain applications

F1 To Release Official Blockchain Game

Cryptocurrency-backed Palladium to be tabled by Russian billionaire

Facebook Beefs Up Political Ad Rules Ahead of EU Election

Facebook said Friday it is further tightening requirements for European Union political advertising, in its latest efforts to prevent foreign interference and increase transparency ahead of the bloc's parliamentary elections. However, some EU politicians criticized the social media giant, saying the measures will make pan-European online campaigning harder. Under the new rules, people, parties and other groups buying political ads will have to confirm to Facebook that they are located in the same EU country as the Facebook users they are targeting. That's on top of a previously announced requirement for ad buyers to confirm their identities. It means advertisements aimed at voters across the EU's 28 countries will have to register a person in each of those nations. "It's a disgrace that Facebook doesn't see Europe as an entity and appears not to care about the consequences of undermining European democracy," Guy Verhofstadt, leader of the parliame…

Facebook Beefs Up Political Ad Rules Ahead of EU Election

Facebook said Friday it is further tightening requirements for European Union political advertising, in its latest efforts to prevent foreign interference and increase transparency ahead of the bloc's parliamentary elections. However, some EU politicians criticized the social media giant, saying the measures will make pan-European online campaigning harder. Under the new rules, people, parties and other groups buying political ads will have to confirm to Facebook that they are located in the same EU country as the Facebook users they are targeting. That's on top of a previously announced requirement for ad buyers to confirm their identities. It means advertisements aimed at voters across the EU's 28 countries will have to register a person in each of those nations. "It's a disgrace that Facebook doesn't see Europe as an entity and appears not to care about the consequences of undermining European democracy," Guy Verhofstadt, leader of the parliame…

West Virginia gives mobile sports betting the go ahead

Op Ed: Answering 10 Common Questions About Cryptocurrency and Taxes

Indian Street Protests for Cryptocurrency

Breaking: Japan's Biggest Railway Plans to Accept Cryptocurrency Payments

Students Mix Tech, Fashion Wearables for the Disabled

Most of us don't give much thought to getting dressed every day, but for the elderly and disabled, seemingly simple tasks - like buttoning a shirt - can prove complicated. Fashion design students recently looked at low-tech ways to make clothes smarter. Tina Trinh reports.

Swedish operators warned about affiliate marketing strategies

Students Mix Tech, Fashion Wearables for the Disabled

Most of us don't give much thought to getting dressed every day, but for the elderly and disabled, seemingly simple tasks - like buttoning a shirt - can prove complicated. Fashion design students recently looked at low-tech ways to make clothes smarter. Tina Trinh reports.

Facebook's Blockchain Hiring Spree Continues With 5 New Postings

Affiliate Marketing's Digital Diversity – By Kevin Edwards

Top US Energy Provider Ameren Eyes Blockchain Promise in Clean Energy Boost

After birthing two of the most successful cryptocurrency CEOs, does this equate that Canada is ...

We Can't Take Wells Fargo's and Mastercard's Blockchain Bearishness Seriously (And Neither ...

Meet the teams: Berkeley Blockchain Xcelerator kicks off with first batch

How to stick to your budget

Tips to help you stick to your budget:

limit your spending as much as possible to what is in your budget
keep receipts and bills
list your income and expenses
compare your budget to what you actually spend at the end of each month

Need vs want

A need is something that is necessary, required or essential. For example, a roof over your head, clothing, food, or medication.

A want is something that you'd like, but don't necessarily need. For example, meals at a restaurant, a trip, a gym membership, or designer shoes.

Making a budget may help you

set spending limits
live within your means
find ways to get rid of your debts
reduce costs
have more money for things that are important to you

A budget is a plan that helps you manage your money.

A budget helps you figure out how much money you get, spend and save. Making a budget can help you balance your income with your regular expenses and guide your spending to help you reach your financial goals.

Here's a Detailed Look at the adidas YEEZY Boost 350 V2 “Clay” Releasing this Weekend

Blockchain Technology May (Eventually) Fix Healthcare: Just Don't Hold Your Breath

Amazon S3 Redirect for Cloudfront

For web site-like functionality in S3, such as redirects, html error messages, and index documents, you can't use the REST endpoint (${bucket_name}.s3.amazonaws.comor${bucket_name}.s3.${region}.amazonaws.com) since these features are only provided by the web site endpoints (${bucket_name}.s3-website.${region}.amazonaws.com).http://docs.aws.amazon.com/AmazonS3/latest/dev/WebsiteEndpoints.html To make the behavior available in Cloudfront, you need to configure Cloudfront to use this endpoint, as well, not the REST one offered via autocomplete in the console.Enter the Amazon S3 static website hosting endpoint for your bucket. This value appears in the Amazon S3 console, on thePropertiespage underStatic Website Hosting.When you specify the bucket name in this format, you can use Amazon S3 redirects and Amazon S3 custom error documents.http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/DownloadDistS3AndCustomOrigins.html

How to file taxes on your cryptocurrency trades in a bear year

US Housing Department Charges Facebook With Housing Discrimination

Facebook was charged with discrimination by the U.S. Department of Housing and Urban Development because of its ad-targeting system. HUD said Thursday Facebook is allowing advertisers to exclude people based on their neighborhood by drawing a red line around those neighborhoods on a map and giving advertisers the option of showing ads only to men or only to women. The agency also claims Facebook allowed advertisers to exclude people that the social media company classified as parents; non-American-born; non-Christian; interested in accessibility; interested in Hispanic culture or a wide variety of other interests that closely align with the Fair Housing Act's protected classes. HUD, which is pursuing civil charges and potential monetary awards that could run into the millions, said Facebook's ad platform is "encouraging, enabling, and causing housing discrimination" because it allows advertisers to exclude people who they don't want to see their ads. The …

Samsung Galaxy S10's cryptocurrency wallet to be made available only in 3 countries

Salesforce Automated Sales, Marketo Automated Marketing, Now Impact Is Automating Partnerships

Glassfish Server Set Log Level

asadmin set-log-levels javax.enterprise.system.ssl.security=FINE​
javax.enterprise.system.ssl.security package set with log level FINE.​ These logging levels are set for server.​ Command set-log-levels executed successfully.​ asadmin list-log-levels | grep -i ssl​ javax.enterprise.system.core.classloading       <SEVERE>​ javax.enterprise.system.ssl.security    <FINE>

US Housing Department Charges Facebook With Housing Discrimination

Facebook was charged with discrimination by the U.S. Department of Housing and Urban Development because of its ad-targeting system. HUD said Thursday Facebook is allowing advertisers to exclude people based on their neighborhood by drawing a red line around those neighborhoods on a map and giving advertisers the option of showing ads only to men or only to women. The agency also claims Facebook allowed advertisers to exclude people that the social media company classified as parents; non-American-born; non-Christian; interested in accessibility; interested in Hispanic culture or a wide variety of other interests that closely align with the Fair Housing Act's protected classes. HUD, which is pursuing civil charges and potential monetary awards that could run into the millions, said Facebook's ad platform is "encouraging, enabling, and causing housing discrimination" because it allows advertisers to exclude people who they don't want to see their ads. The …

Glassfish server check log level

asadmin list-log-levels | grep -i ssl
javax.enterprise.system.core.classloading       <SEVERE>​ javax.enterprise.system.ssl.security    <SEVERE>

Debug Java SSL Errors

Using the Java VM parameter: -Djavax.net.debug=ssl:handshake

For example, for Glassfish server:
asadmin create-jvm-options -Djavax.net.debug=ssl,handshakeCreated 1 option(s)
Command create-jvm-options executed successfully.
asadmin list-jvm-options | grep ssl
-Djavax.net.ssl.keyStore=${com.sun.aas.instanceRoot}/config/keystore.jks
-Djavax.net.ssl.trustStore=${com.sun.aas.instanceRoot}/config/cacerts.jks
-Djavax.net.debug=ssl,handshake

TF Blockchain Opens New Chapters In Portland and Vancouver, Austin Next

British Report Finds Technical Risks in Huawei Network Gear

British cybersecurity inspectors have found significant technical issues in Chinese telecom supplier Huawei's software that they say pose risks for the country's telecom companies.   The annual report Thursday said there is only "limited assurance" that long-term national security risks from Huawei's involvement in critical British telecom networks can be adequately managed.   The report adds pressure on Huawei, which is at the center of a geopolitical battle between the U.S. and China.   The U.S. government wants its European allies to ban the company from next-generation mobile networks set to roll out in coming years over fears Huawei gear could be used for cyberespionage.   The report noted that Britain's cybersecurity authorities did not believe the defects were a result of "Chinese state interference."

BofA, Wells Fargo sour on blockchain

British Report Finds Technical Risks in Huawei Network Gear

British cybersecurity inspectors have found significant technical issues in Chinese telecom supplier Huawei's software that they say pose risks for the country's telecom companies.   The annual report Thursday said there is only "limited assurance" that long-term national security risks from Huawei's involvement in critical British telecom networks can be adequately managed.   The report adds pressure on Huawei, which is at the center of a geopolitical battle between the U.S. and China.   The U.S. government wants its European allies to ban the company from next-generation mobile networks set to roll out in coming years over fears Huawei gear could be used for cyberespionage.   The report noted that Britain's cybersecurity authorities did not believe the defects were a result of "Chinese state interference."

British Report Finds Technical Risks in Huawei Network Gear

British cybersecurity inspectors have found significant technical issues in Chinese telecom supplier Huawei's software that they say pose risks for the country's telecom companies.   The annual report Thursday said there is only "limited assurance" that long-term national security risks from Huawei's involvement in critical British telecom networks can be adequately managed.   The report adds pressure on Huawei, which is at the center of a geopolitical battle between the U.S. and China.   The U.S. government wants its European allies to ban the company from next-generation mobile networks set to roll out in coming years over fears Huawei gear could be used for cyberespionage.   The report noted that Britain's cybersecurity authorities did not believe the defects were a result of "Chinese state interference."    

How To Make Money Online In Nigeria As Beginners For Free

Blockchain Exchange Secures $50 Million in Diamonds for ETF Launch

Wells Fargo, Mastercard CEOs say blockchain has yet to live up to the hype

NBCU Wades Into E-Commerce, Enlisting Bill Murray as Pitchman

Link Rot – An Old Marketing Challenge That Deserves Your Attention

Marco Polo Blockchain Built on R3's Corda Sees First Live Trades

Cryptocurrency Will Bring Us More Freedom – Right?

Enron's Jeff Skilling is the latest tarnished executive to look to blockchain for redemption

Students Mix Tech, Fashion Wearables for Elderly, Disabled

Most of us don't give much thought to getting dressed every day, but for the elderly and disabled, seemingly simple tasks like buttoning a shirt can prove complicated. Fashion design students recently looked at low-tech ways to make clothes smarter. VOA's Tina Trinh reports.

What Is Cryptocurrency?

Students Mix Tech, Fashion Wearables for Elderly, Disabled

Most of us don't give much thought to getting dressed every day, but for the elderly and disabled, seemingly simple tasks like buttoning a shirt can prove complicated. Fashion design students recently looked at low-tech ways to make clothes smarter. VOA's Tina Trinh reports.

Students Mix Tech, Fashion Wearables for Elderly, Disabled

Most of us don't give much thought to getting dressed every day, but for the elderly and disabled, seemingly simple tasks like buttoning a shirt can prove complicated. Fashion design students recently looked at low-tech ways to make clothes smarter. VOA's Tina Trinh reports.

Ansible is a great tool for managing a large number of servers.

With Ansible, you can create flexible, automated tasks that run from a centralized server to act on remote hosts. 
You can undertake admin duties that would otherwise require you to log onto each remote machine manually and run those commands individually.

Convert the pem to ppk file

PuTTYGen is a RSA and DSA key generation utility. It can be used to convert the pem to ppk file.
After you load pem file into PuTTYGen, you are able to save either public key or private key.

We Are Not Adding Pinterest Shares To Our Investment Board At This Valuation

The Benefits of Investing in Your Affiliate Tracking

Install Ansible on AWS Linux

Image
ansible is available in Amazon Linux Extra topic "ansible2"
​ To use, run​ # sudo amazon-linux-extras install ansible2​ ​ Learn more at​ https://aws.amazon.com/amazon-linux-2/faqs/#Amazon_Linux_Extras
Amazon Linux2 FAQs Q. Which on-premises virtualization platforms does Amazon Linux 2 run on? Amazon Linux 2 virtual machine images are currently available for KVM, Microsoft Hyper-V, Oracle VM VirtualBox, and VMware ESXi virtualization platforms for development and testing use. aws.amazon.com

Facebook, Instagram Ban White Nationalism Speech

Facebook has announced it is banning praise, support, and representation of white nationalism and separatism on its site and on Instagram, which it also owns. The company made the announcement Wednesday in a blog post, saying, "It's clear that these concepts are deeply linked to organized hate groups and have no place on our services." The post says Facebook has long banned hateful speech based on race, ethnicity and religion, though it had permitted expressions of white nationalism and separatism because it seemed separate from white supremacy. "But over the past three months," the post read, "our conversations with members of civil society and academics who are experts in race relations around the world ... have confirmed that white nationalism and separatism cannot be meaningfully separated from white supremacy and organized hate groups." "Going forward," it continued, "while people will still be able to demonstrate pride in …

Enable epel on AWS Linux

sudo yum-config-manager --enable epel

Swiss watchdog says cryptocurrency mining firm's $90M ICO was illegal

Rhode Island governor gives mobile sports betting bill the green light

Most Powerful Woman in Banking Bearish on Blockchain, But Amassing More Patents Than Anyone

How to add PDF title

Open thePDFdocument in Adobe Acrobat Pro: Select File > Properties.Select the Description tab to view the metadata in the document, including the document information dictionary.Modify theTitlefield to add or change the document'sTitleentry.

Artificial Intelligence Pioneers Win Tech's 'Nobel Prize'

Computers have become so smart during the past 20 years that people don't think twice about chatting with digital assistants like Alexa and Siri or seeing their friends automatically tagged in Facebook pictures. But making those quantum leaps from science fiction to reality required hard work from computer scientists like Yoshua Bengio, Geoffrey Hinton and Yann LeCun. The trio tapped into their own brainpower to make it possible for machines to learn like humans, a breakthrough now commonly known as "artificial intelligence," or AI. Their insights and persistence were rewarded Wednesday with the Turing Award, an honor that has become known as technology industry's version of the Nobel Prize. It comes with a $1 million prize funded by Google, a company where AI has become part of its DNA. The award marks the latest recognition of the instrumental role that artificial intelligence will likely play in redefining the relationship between humanity and technology in …

Big names in VOX speaker line-up

CabbageTech owner charged with running $200K cryptocurrency and cash swindle

Artificial Intelligence Pioneers Win Tech's 'Nobel Prize'

Computers have become so smart during the past 20 years that people don't think twice about chatting with digital assistants like Alexa and Siri or seeing their friends automatically tagged in Facebook pictures. But making those quantum leaps from science fiction to reality required hard work from computer scientists like Yoshua Bengio, Geoffrey Hinton and Yann LeCun. The trio tapped into their own brainpower to make it possible for machines to learn like humans, a breakthrough now commonly known as "artificial intelligence," or AI. Their insights and persistence were rewarded Wednesday with the Turing Award, an honor that has become known as technology industry's version of the Nobel Prize. It comes with a $1 million prize funded by Google, a company where AI has become part of its DNA. The award marks the latest recognition of the instrumental role that artificial intelligence will likely play in redefining the relationship between humanity and technology in …

Nvidia “never had plans for cryptocurrency” ahead of its doomed fling with miners

India Conducts First Successful Test of Anti-Satellite Weapon

India says it has successfully tested a new anti-satellite missile, marking another major development in its budding space program. Prime Minister Narendra Modi announced Wednesday in a nationally televised address that scientists had destroyed a satellite orbiting about 300 kilometers above Earth's atmosphere in a mission that lasted only three minutes. The prime minister said the country has now "registered its name as a space power" alongside the United States, China and Russia, the only other nations to achieve such a feat. The United States and the former Soviet Union conducted anti-satellite tests from the early days of the space age, with the U.S. successfully shooting down a satellite in 1985. China achieved the feat in 2007. Modi insisted that Wednesday's test did not violate any international treaties, and was conducted purely in the interest of national security. The test was conducted as Modi leads his Hindu-nationalist Bharatiya Janata Party into…

India Conducts First Successful Test of Anti-Satellite Weapon

India says it has successfully tested a new anti-satellite missile, marking another major development in its budding space program. Prime Minister Narendra Modi announced Wednesday in a nationally televised address that scientists had destroyed a satellite orbiting about 300 kilometers above Earth's atmosphere in a mission that lasted only three minutes. The prime minister said the country has now "registered its name as a space power" alongside the United States, China and Russia, the only other nations to achieve such a feat. The United States and the former Soviet Union conducted anti-satellite tests from the early days of the space age, with the U.S. successfully shooting down a satellite in 1985. China achieved the feat in 2007. Modi insisted that Wednesday's test did not violate any international treaties, and was conducted purely in the interest of national security. The test was conducted as Modi leads his Hindu-nationalist Bharatiya Janata Party into…

India Conducts First Successful Test of Anti-Satellite Weapon