Desktop Virtualization as VDI (Virtual Desktop Infrastructure) could not have been successful on a broad front. This has technical and financial reasons. All one to two percent of the worldwide installed 15 million desktops are currently loaded with VDI (Virtual Desktop Infrastructure) completely from the server. Given that the the technology is advertised aggressively for years, there is not much … [Read more...]
grep command : Details, Examples and Usages of Grep Command
grep command is for the program for usage in command line for UNIX and and Unix derivatives which is used to search and filter strings from from a junk of files.It was originally developed by Ken Thompson in 1973. The term grep stands for g lobal / r egular e xpression / p rint or g lobal search for a r egular E xpression and p rint out matched lines : "global search for a regular expression and … [Read more...]
Exposure Triangle
Exposure Triangle is made of three points as if forming a virtual triangle which can be explained in illustration. These are - Aperture, ISO and Shutter Speed. When we press the shutter button on our camera, for a short period of time the light passes through the lens hitting the sensor staring into an image - actually the process of creating an image is more complex, but for now we just this is … [Read more...]
Cloud Security Tools
Cloud Security Tools checks the security in cloud environments, there are several tools available for free, users not necessarily have to buy expensive suites. Basic idea behind using these Cloud Security Tools is to ensure the security points on Cloud Platform. Cloud Computing does have security issues - you can read our articles like Secure Cloud Computing Guide to somewhat manage or control … [Read more...]
OpenShift SSH : Video Guide
OpenShift SSH is not very difficult to use by an user used with Git and SSH/Telnet through Command Line. Here is a Video Guide keeping the new users in mind. We will demonstrate the functions those are mentioned in official website for OpenShift SSH and remote access. Getting Started With OpenShift SSH and Remote Access Blindly copy pasting the commands which we have shown in this … [Read more...]
How to Choose Lens for DSLR Based on Focal Length and Speed
How to Choose Lens for DSLR Based on Focal Length and Speed ? How you will determine which Lens is not a bad investment but a good to have in your camera bag ? Like many other hobbies, DSLR photography can be very expensive. Soon, as that our passion for photography and our knowledge grows up, we realize that the Lens purchased has some technical boundaries. We also discover that the camera body … [Read more...]
Semantic Web : How Semantic Web Works
Semantic Web is a concept in the development of the World Wide Web and the Internet. In the context of development for Internet of Things and ubiquitous computing, it is necessary that machines can process the information gathered from people. All which are expressed in human language as information on the Internet are a unique description with their meaning. The mechanical use of the data from … [Read more...]
Tips for Cloud Computing
Tips for Cloud Computing points on the diversity and complexity of cloud computing which has led to veritable mess in many IT departments of various companies. The cloud is getting the contours: A significant number of companies have decided, at least for individual projects or as a first strategy to enter cloud computing and to promote internally and to integrate into the existing IT landscape. … [Read more...]
APS-C Format Sensor
APS-C Format Sensor is the acronym of Advanced Photo System type-C. The size of APS-C Format Sensor is approximately equal to the film APS size negative. The original negative of APS measures 25.1 × 16.7 mm with an aspect ratio of 3:2. Sensors with approximately of this APS dimensions are used on many consumer grade digital SLRs and on advanced Point and Shoot Camera, DSLM cameras etc. APS-C … [Read more...]
Distributed Replicated Block Device or DRBD
Distributed Replicated Block Device or DRBD is a free network storage solution software. A kernel module together with a management application in user space with a script serves the function of a a block device on a productive (primary) server in real time to another (secondary) server to reflect it. This method is used to acheive high availability (HA) in the Linux environment and thus can … [Read more...]
Github SSH Key Not Working For Command Line : Troubleshooting
Github SSH Key not working for command line but is working for Mac GUI Tool from Github - this is quite common situation and here is very easy way to fix it. Github has official guide for Github SSH Key not working for command line, but actually that is not very practical in all cases. They have used an one user, one repository (that is Github) specific guide. Github SSH Key not working … [Read more...]