SEARCH KEYWORD -- PORT FORWARD
WireGuard VPN: Setup WG_VPN client App on Android phone and connect to local WG_VPN server on VM
We will show the detail steps about how to setup the WireGuard VPN client on an Android phone/pad and configure the VPN client to connect a WG_VPN server in local network. The setup process contents three main steps: Install WireGuard and create a key-pair in WireGuard client. Add the Android client peer information in the WireGuard server’s config file. Config the Android WireGuard client to connect to the server. The test environment network configuration: Step 1. Install Wire...
4 Challenges Women Entrepreneurs Face and How to Overcome Them
The statistics on women entrepreneurship is becoming mindblowing with each passing day. In fact, if you just take a glance over the figures of past a few years, a huge percentage of women entrepreneurs have come up in the UK. Also, the scenario is the same in all other parts of the world as well. According to a 2017’s report by American Express, the women entrepreneurship organizations have grown up to 114%. Also, it is true that now one among the five firms belongs to women entrep...
C vs Java Complete Comparison
Similarities: Java and C have same syntax operators. Difference—thinking Two paradigms: Java: Object oriented language C: Structured language Differences: --Syntax No preprocessor Java does not include a preprocessor and does not define any analogs of the #define, #include, and #ifdef directives. Constant definitions are replaced with static final fields in Java. (See the java.lang.Math.PI field for an example.) Macro definitions are not available in...
C,Java,Comparison,Difference,Similaritie 2011-10-06 12:46:39
In-memory key-value store in C, Go and Python
Subtitle: Wow Go’s net library is fast On paternity leave for my second child, I found myself writing an in-memory hashmap (a poor-man’s memcached), in Go, Python and C. I was wondering how hard it would be to replace memcached, if we wanted to do something unusual with our key-value store. I also wanted to compare the languages, and, well, I get bored easily! The code is on github as Key-Value-Polyglot. Each version implements enough of the get and set commands from the mem...
Guide on recovering data in MySQL
In our daily work, there might be mistakes made which got some data or even databases deleted in MySQL. If this happens on production, it would be a nightmare. In case this happens, normally DBA would jump in to save the world. And they would try to recover the data from the backup if there is any. But if there is no backup, then the show stops. Hence database backup is necessary on production environments to avoid such awkward situation. Also normally in MySQL, binlog should be enabled as well ...
Making Your Tech Conference Presentation, and Experience, Not Suck
Tech conferences are incredibly expensive, and not just in dollars. Even free conferences like BarCamps incur the expense of the attendee’s time. Taking time off from work or family is a hassle at the very least, and it’s time that isn’t billable. The draw of the conference boils down to those 45 minute sessions, and speaker and attendee alike should make the most of it. Speakers often start off by wasting time. They front-load the presentation with worthless informatio...
Soft skill,Tech presentation,Advice,Highlight 2011-12-20 08:50:00
Test-Driven Development? Give me a break...
Update: At the bottom of this post, I've linked to two large and quite different discussions of this post, both of which are worth reading... Update 2: If the contents of this post make you angry, okay. It was written somewhat brashly. But, if the title alone makes you angry, and you decide this is an article about "Why Testing Code Sucks" without having read it, you've missed the point. Or I explained it badly :-)Some things programmers say can be massive red flags. When I h...
Test driven,Application design,tool 2011-10-17 10:19:16
Dividing any number By 9, 90, 900 and so on
The technique for Dividing any number by 9 mentally is simply to reduce a complex division to a very simple addition. The technique can be applied from both ends i.e. from right-most digit or from left-most digit. Dividing by 9 into a mixed number from right-most digit uses the Divisibility Rules for 9: 1. First, add all the digits together and divide by 9, keeping in mind the whole number and the remainder. 2. Write the remainder o...
Readability in Programming Languages
I saw a side by side comparison of a bunch of scripting languages online recently. Scripting Languages: PHP, Perl, Python, Ruby My first, and second reaction was yuck! Now I have my biases – biases which may not be shared by others of course. But I like readable code and for me anytime I see a special character (anything not an alphanumeric) it slows me down. This got me thinking about where we are going in design of programming languages? Are we moving forward (what ever ...
Programming,Style,Coding style,Readabili 2011-09-22 09:20:03
9 reasons to use Zsh
Like majority *nix users, I have been using bash for many years. Sometimes I feel uncomfortable with bash. I tried use some other shells as well such as ksh, tcsh and zsh which I am going to talk about. A few days ago, I found an open source project ranking in the 6th named oh-my-zsh on Github, I downloaded it and had a try with it. It's amazing. We should use zsh to replace bash now. Why do we need to use zsh? Here is a 4 minutes YouTube video which shows many reasons why we should switch from ...
RECENT
- The Most Popular Car Color
- Exploring Open edX: A Global Platform for Online Education
- What Is The Best SaaS CRM In 2024?
- Common Pitfalls When Handling JSON in Golang
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- more>>