Skip to main content

Posts

Showing posts from 2019

How to upgrade python in ubuntu ?

To upgrade your python version in Ubuntu 18.10 Following these steps: omprakash@omprakash: ~$ sudo apt-get install python3.7 Reading package lists... Done Building dependency tree       Reading state information... Done The following additional packages will be installed:   python3.7-minimal Suggested packages:   python3.7-venv python3.7-doc binfmt-support The following NEW packages will be installed:   python3.7 python3.7-minimal 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. Need to get 1,944 kB of archives. After this operation, 10.2 MB of additional disk space will be used. Do you want to continue? [Y/n] y Get:1 http://in.archive.ubuntu.com/ubuntu cosmic-updates/main amd64 python3.7-minimal amd64 3.7.3-2~18.10 [1,660 kB] Get:2 http://in.archive.ubuntu.com/ubuntu cosmic-updates/main amd64 python3.7 amd64 3.7.3-2~18.10 [284 kB] Fetched 1,944 kB in 12s (164 kB/s)                                             Selecting previously unselected package python3.7-minimal.

Cloud computing

What Is Cloud Computing? Cloud computing is the on-demand delivery of IT resources and applications via the Internet with pay-as-you-go pricing. Whether you run applications that share photos with millions of mobile users or deliver services that support the critical operations of your business, the cloud provides rapid access to flexible and low-cost IT resources. With cloud computing, you don’t need to make large up-front investments in hardware and spend a lot of time managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. With cloud computing, you can access as many resources as you need, almost instantly, and only pay for what you use. Advantages of Cloud Computing Variable vs. Capital Expense Economies of Scale Stop Guessing Capacity Increase Speed and Agility Focus on Business Differentiators Go Global in Minutes

Set up a third party domain to google blogger domain

When you buy a domain, you can personalize your blog’s website address. Important: If you use CAA Records on your custom domain, add a record for lets encrypt.org, or Blogger won't create or renew your SSL certificate.  Step 1: Buy a domain See if you can buy a Google Domain or buy a domain from a non-Google provider. To buy a Google domain:     Sign in to Blogger.     Select the blog to update.     On the left, click Settings and then Basic.     Under "Publishing," next to "Blog Address," click Buy a domain.     At the top, search for a domain.     Next to the domain you want, click Buy.     To finish buying your domain, follow the on-screen steps. Note: If you’re an administrator, learn more about managing domains registered through Blogger. Step 2: Set up your domain with your blog   Connect to your Google Domain from Blogger  Sign in to Blogger.  Select the blog you want to update.  On the left, click Settings and then Basic.  Under

Build a Serverless Real-Time Data Processing App

 Overview Serverless applications don’t require you to provision, scale, and manage any servers. You can build them for nearly any type of application or backend service, and everything required to run and scale your application with high availability is handled for you. Serverless architectures can be used for many types of applications. For example, you can process transaction orders, analyze click streams, clean data, generate metrics, filter logs, analyze social media, or perform IoT device data telemetry and metering. In this project, you’ll learn how to build a serverless app to process real-time data streams. You’ll build infrastructure for a fictional ride-sharing company. In this case, you will enable operations personnel at a fictional Wild Rydes headquarters to monitor the health and status of their unicorn fleet. Each unicorn is equipped with a sensor that reports its location and vital signs. You’ll use AWS to build applications to process and visualize this

What is a Process?

A process is a running instance of a launched, executable program. A process consists of: an address space of allocated memory, security properties including ownership credentials and privileges, one or more execution threads of program code, and the process state. The environment of a process includes: local and global variables, a current scheduling context, and allocated system resources, such as file descriptors and network ports. An existing ( parent ) process duplicates its own address space ( fork ) to create a new ( child ) process structure. Every new process is assigned a unique process ID (PID) for trackin

Special Permissions in linux

The setuid permission on an executable file means that the command will run as the user owning the file, not as the user that ran the command. One example is the passwd command: [student@desktopX ~]$ ls -l /usr/bin/passwd -rw s r-xr-x. 1 root root 35504 Jul 16 2010 /usr/bin/passwd In a long listing, you can spot the setuid permissions by a lowercase s where you would normally expect the x (owner execute permissions) to be. If the owner does not have execute permissions, this will be replaced by an uppercase S . The special permission setgid on a directory means that files created in the directory will inherit their group ownership from the directory, rather than inheriting it from the creating user. This is commonly used on group collaborative directories to automatically change a file from the default private group to the shared group, or if files in a directory should be

Changing File/Directory Permissions

The command used to change permissions from the command line is chmod , short for "change mode" (permissions are also called the mode of a file). The chmod command takes a permission instruction followed by a list of files or directories to change. The permission instruction can be issued either symbolically (the symbolic method) or numerically (the numeric method). Symbolic Method Keywords chmod WhoWhatWhich file|directory Who is u, g, o, a (for user, group, other, all) What is +, -, = (for add, remove, set exactly) Which is r, w, x (for read, write, execute) The symbolic method of changing file permissions uses letters to represent the different groups of permissions: u for user, g for group, o for other, and a for all. With the symbolic method, it is not necessary to set a complete new group of permissions. Instead, it is possibl

Linux File System Permissions

Access to files by users are controlled by file permissions . The Linux file permissions system is simple but flexible, which makes it easy to understand and apply, yet able to handle most normal permission cases easily. Files have just three categories of user to which permissions apply. The file is owned by a user , normally the one who created the file. The file is also owned by a single group , usually the primary group of the user who created the file, but this can be changed. Different permissions can be set for the owning user, the owning group, and for all other users on the system that are not the user or a member of the owning group. The most specific permissions apply. So, user permissions override group permissions, which override other permissions. In the graphic that follows, joshua is a member of the groups joshua and web, while allison is a member of allison, wheel, and web. Whe

Managing Supplementary Groups

A group must exist before a user can be added to that group. Several command-line tools are used to manage local group accounts. groupadd Creates Groups groupadd groupname without options uses the next available GID from the range specified in the /etc/login.defs file. The -g GID option is used to specify a specific GID. [student@serverX ~]$ sudo groupadd -g 5000 ateam Note Given the automatic creation of user private groups (GID 1000+), it is generally recommended to set aside a range of GID numbers to be used for supplementary groups. A higher range will avoid a collision with a system group (GID 0-999). The -r option will create a system group using a GID from the range of valid system GID numbers listed in the /etc/login.defs file. [student@serverX ~]$ sudo groupadd -r appusers groupmod Modifies Existing Groups The groupmod comm

tag