Sep 30, 2017

All-New Amazon Fire TV with 4K Ultra HD and HDR

All-New Amazon Fire TV with 4K Ultra HD and HDR

The all-new Fire TV supports 4K Ultra HD and High Dynamic Range (HDR) and packs a lot of punch into its portable form factor design. Your apps and games will pop with true-to-life picture quality, and the dual-band, 802.11ac Wi-Fi (or optional Amazon Ethernet Adapter) provide your app with the bandwidth to ensure the best possible streaming experience.

The best cash back credit cards let you earn points with few restrictions.

Citi Double Cash gives you points worth $2 back for every $100 you spend—on anything. There are no category restrictions. No rotating categories to keep track of. And no caps on the amount of rewards you can earn. This Citi Mastercard also has no annual fee and offers a below-average APR if you have good credit.

Rewards: Two points for every $1 spent and paid off
Annual Fee: $0
APR: 14.49%–24.49%

Consumers owe more than $1 trillion in revolving credit card debt, an all-time record.

171 million Americans have at least one credit card in their wallet, the highest number since 2005.

Human relationships are highly underrated.

You'll be shocked by how much more you can get done when you have the right people working with you. And when that relationship is face-to-face, it's even more valuable.

Amazon announces two new Echo products

Amazon held an event in Seattle, and the announcements were non-stop. The company showed off two brand new Echos: a cloth-covered $99 version and a $149 Echo Plus with a dedicated smart home hub.

Kill processes older than a given age

GNU Killall can kill processes older than a given age, using their processname.
if [[ "$(uname)" = "Linux" ]];then killall --older-than 1h;fi

Sep 29, 2017

Microservices are a viable design pattern

Microservices is a new term of modular design.

Microservices are the right choice if you have a system that is too complex to be handled as a monolith. And this is exactly what makes this architectural a valid choice for enterprise applications.

Oracle Code is a free event for developers to learn about the latest developer technologies, practices, and trends.

Learn from technical experts, industry leaders, and other developers in keynotes, sessions, and hands-on labs. Experience cloud development technology in the Code Lounge with workshops and other live, interactive experiences and demos.

Devops are on the top of The pyramid of modern enterprise application development.

Devops are on the top of The pyramid of modern enterprise application development.

Low-code and visual programming environments

Low-code and visual programming environments have proliferated around a number of use cases, with a steady influx of tools, including Google App Maker, APPIAN, and Oracle Visual Builder Cloud Service.

Low-code development environments

Low-code development environments are ideal for scientists or academics who need to solve complex problems with a minimum of coding knowledge, and for business users who don't want to wait for IT to write them a new mobile app.

Oracle RAC allows multiple computers to run Oracle RDBMS software simultaneously while accessing a single database, thus providing clustering.

In an Oracle RAC environment, 2 or more instances concurrently access a single database. This allows an application or user to connect to either computer and have access to a single coordinated set of data. The instances are connected within each other through an "Interconnect" which enables all the instances to be in sync in accessing the data.

Add-ons are specially packaged Apps Script projects that run inside Google Slides and can be installed from the Google Slides add-on store.

If you've developed a script for Google Slides and want to share it with the world, Apps Script lets you publish your script as an add-on so other users can install it from the add-on store.

Google Apps Script includes special APIs to let you programmatically create, read, and edit Google Slides.

Google Apps Script can interact with Google Slides in two broad ways: any script can create or modify a presentation if the script's user has appropriate permissions for the presentation, and a script can also be bound to a presentation, which gives the script special abilities to alter the user interface or respond when the presentation is opened. To create a bound script, select Tools > Script editor from within Google Slides.

Google People API now supports updates to Contacts and Contact Groups

The new endpoints allow developers to create, delete and update a single contact as well as to read and write contact groups.

Government funding programs can support small businesses, large corporations, non-profits and post-secondary research institutions.

However, the key to accessing these programs are knowing which ones provide the best fit for your organization and upcoming projects.

A common challenge among business owners is the limited internal resources available to explore government funding options and navigate the application process.

Proper planning is critical to accessing government funding, allowing businesses to align their projects' timelines with funding programs' deadlines.

Java has dominated the non-Microsoft development landscape.

Java EE has been the platform of choice for a significant number of enterprises, ranging from banks and hospitals to airplane manufacturers and national defense departments.

Online job marketplaces

According to the World Bank, more than 5m people already offer to work remotely on online marketplaces such as and UpWork. Jobs range from designing websites to writing legal briefs, and typically bring in at least a few dollars an hour.

A manual transmission is generally more fuel-efficient than an automatic.

When used properly, a manual transmission can save you five to 10 per cent in fuel compared to its automatic counterpart.

If you don't know how to drive a manual vehicle and your only option is automatic, opt for an automatic transmission with more gears. Extra gears can help keep the engine running at its most efficient level. Consider the following:

A 4-speed overdrive transmission is three to five per cent more fuel-efficient than a 3-speed.
A 5-speed automatic can improve fuel efficiency by another three per cent over a 4-speed.

Performance testing can usually be separated into two categories by methods

Load testing and stress testing.

Security is a mindset.

Security is not a tool that we set and forget. It's not a one-time code decision. It needs to be in the forefront of our minds during our daily work.

JPQL provides a natural object-oriented related way to query objects.

JPQL looks very familiar if you have used SQL and follows many of the same conventions. Although the subject of the query is the class name of the entity rather than the table name.

Sep 28, 2017

IBM Now Has More Employees in India Than in the U.S.

Today, IBM employs 130,000 people in India — about one-third of its total work force, and more than in any other country.

Front end is a specialized domain where engineers have to care about many issues

Front end is a specialized domain where engineers have to care about many issues related to browser compatibilities, the Document Object Model, JavaScript performance, CSS layouts, and so on.

Interviewing is a skill that you can get better at by studying, preparing, and practicing for it.

Most people are just not good at coding interviews when they first start out.

Facebook just switched several of its open source projects — including React — over to the popular MIT license.

Before that, Facebook was using their own custom "BSD+Patents" license. This was similar to the widely-used BSD license, but also included a clause that basically said: "you can't sue Facebook for infringing on your patents."

Firefox Developer Edition is a special version of Firefox just for developers.

Create fast, flexible interactive UI with a special CSS Grid Inspector, minimized browser UI and tools to help you test your site in many browser configurations and devices (including mobile).

All-New Amazon Devices

All-New Echo—the hands-free speaker your readers can control with their voice. Just ask the Alexa Voice Service to play music, make calls, provide instant news and weather updates, and more. This new generation Echo is available in multiple colors and features expertly tuned speaker quality at a significantly reduced price ($99.99).
Echo Plus—everything your readers love about Echo with a built-in smart home hub. Starting a smart home or integrating with an existing system is now easier than ever for your readers with the built-in smart hub and simple setup for compatible connected devices.
The All-New Fire TV—connects you to a world of entertainment. With a compatible 4K Ultra HD and High Dynamic Range (HDR) TV, read readers can watch as thousands of movies and shows come to life in brilliant colors and detailed contrast. Plus, the Alexa Voice Remote can easily find, launch, and control content. For a limited time, your readers can get up to $45 in digital content from Amazon Video, Hulu, and Showtime when they register their Fire TV.
Fire TV Bundles & Deals
Fire TV + HD Antenna Bundle—$14.99 Off Pre-Order Bundle, with special pricing available now through 10/7.
Fire TV + Echo Dot—$39.99 Off Pre-Order Bundle, with special pricing available now through 10/7.
Fire TV Stick + Echo Dot—$29.99 Off Bundle, with special pricing available now through 10/7.

Polyglotism is nice, but not important

Sometimes a jack of all trades can be a master of none.

DevOps is built for agility and handling change.

Python is one of the primary languages used by DevOps engineers.

Containers are becoming mainstream.

Containers are being adopted and moving to production. 

Google Cloud Bigtable is good for cases where you want to optimize throughput for a large load.

The smallest Cloud Bigtable setup allows for 30k QPS (queries per second). The cost relates to how much throughput you need, which translates to the node count, and how much storage you use.

Preventing SQL Injection

Ensure that any input used by an embedded SQL query is validated and that the SQL query is parameterized.

Create an AMP AdSense ad unit

AMP pages are written in AMP HTML, which is like standard HTML with some restrictions for reliable performance and some extensions for building rich content beyond basic HTML. This means that AMP ad units require different ad tags from the usual AdSense tags.

To create an AMP ad unit, follow these steps

AMP schema publisher example

    "publisher": {
      "@type": "Organization",
      "name": "Google",
      "logo": {
        "@type": "ImageObject",
        "url": "",
        "width": 600,
        "height": 60

Next Permutation is the immediate lexicographically larger permutation of a sequence.

In most languages there is a function already implemented.

In C++
string s("abcd"); 
will give
Note that when a string is already the lexicographic largest, next_permutation returns 0 and hence doesn't loop forever if given in a while loop.

Java String toCharArray() method example

  1. public class StringToCharArrayExample{  
  2. public static void main(String args[]){  
  3. String s1="hello";  
  4. char[] ch=s1.toCharArray();  
  5. for(int i=0;i<ch.length;i++){  
  6. System.out.print(ch[i]);  
  7. }  
  8. }}  

How to scan the input from users in Java

You can use the Scanner class of Java. It has methods of all type one can use.

How to use?
Create the object of the Scanner class like Scanner scan = new Scanner(;
You can use the below methods to get the user input
  1. public String next() | it returns the next token from the scanner.
  2. public String nextLine() | it moves the scanner position to the next line and returns the value as a string.
  3. public byte nextByte() | it scans the next token as a byte.
  4. public short nextShort() | it scans the next token as a short value.
  5. public int nextInt() | it scans the next token as an int value.
  6. public long nextLong() | it scans the next token as a long value.
  7. public float nextFloat() | it scans the next token as a float value.
  8. public double nextDouble() | it scans the next token as a double value.
  1. Scanner scan = new Scanner(; //Creating object
  2. int number = scan.nextInt(); // Getting input
  3. System.out.println(number); // print the input

Sep 27, 2017

Twitter announced it is testing a longer tweet limit of 280 characters

Twitter announced it is testing a longer tweet limit of 280 characters in every language except Japanese, Chinese and Korean, languages in which it is generally possible to express more information in fewer characters.

Sep 26, 2017

Average application has dozens serious vulnerabilities

The average breach costs multiple million.

Cirtually no one buys on the first contact

You need to start building relationships and building trust with your potential buyers.

The average eCommerce conversion rate is 1.33%

Only one out of 100 visitors will convert into a sale.

Microsoft co-founder Bill Gates has revealed he uses an Android-powered smartphone, rather than a Windows one.

"Recently, I actually did switch to an Android phone," he said, speaking on Fox News Sunday.

No matter what kind of small business you operate, you need insurance to protect against the risks you may be facing.

You need help to shield you from expensive data breaches and cyber hacks, property damage, costly lawsuits and more.

How to Integrate CRM System

One key element of any successful CRM project is the ability to migrate data and keep data integrated between applications.  

In order to have a stable and viable CRM environment you need to ensure that all your data integration and migration is done using a supported method.  Directly modifying data in the database is not supported for a number of architectural reasons.  This means that  you should not perform direct inserts, updates or deletes. Instead, you should interface with CRM by leveraging the CRM web services and supported methods.  There are different supported ways to read data from CRM: primary one is to use the CRM web service, the other choice is to use SQL statements to query the CRM system.

Since there would be significant development effort to build code from scratch to use the CRM web services, and others have already created integration applications, most choose to use one of the available tools. Some ETL vendors have been adding CRM webservice adapters and other supported tools to their own suites.

From a feature perspective  all data integration solutions have some similarities and generally include the following basic features:

  • Source-to-target mapping
  • Data manipulation and transformation
  • Scheduling (for batch-based processing)
  • Error handling

From a performance perspective, all data integration solutions are designed to be able to scale by taking advantage of the server computing resources.  However, your choice of adapters might perform differently depending on environment.

Data types of Custom Fields of objects

Summary of some common used supported data types of Custom Fields of objects:

  • Auto Number—a system-generated read-only sequence number, analogous to the SQL identity type. These fields can be used to provide a unique ID that is independent of the internal object ID. These fields are not used in creating object relationships.
  • Checkbox—for representing Boolean data.
  • Date or Date/Time—for representing dates or date and time combinations.
  • Number—for representing real numbers, with optional decimal points.
  • Email, Phone and URL—format-validated email, phone and URL string representations.
  • Picklist and Multi-Select Picklists—represent values from a list.
  • Text and Text Areas—for representing text of various lengths.
  • Currency—a formatted number type, with optional multi-currency support.
  • Formula—a read-only field holding data generated from a formula expression.
  • Geolocation—allows you to identify locations by their latitude and longitude and calculate distances between locations.

A franchise is a network of businesses

Franchisor, or master business, takes a fee in exchange for taking care of network-wide chores like finding locations, setting up real estate leases, ordering and distributing supplies, and marketing and advertising. In some cases, the chain also takes care of financials and accounting for individual franchisees.

Franchising is a popular way to start a business

Franchising gives an entrepreneur access to a franchise brand, marketing and ready-made operational model.

With a franchise, a company licences its processes, intellectual property (e.g., trademarks), trade secrets and proprietary knowledge to an entrepreneur for a one-time fee and ongoing annual royalties.

An entrepreneur who buys a franchise is called a franchisee. The business that originally developed the products, services and proprietary knowledge being licenced is called the franchisor.

Algorithms - links and books

Books on algorithms:
  • Introduction to Algorithms: This is the most popular college textbook for algorithms. It is both rigorous—proving that algorithms are correct and have the claimed running times—and comprehensive—covering dozens of algorithms in over 1300 pages.
  • Algorithms Unlocked: This is targeted more at readers who want to get a taste of algorithms and how to analyze them. It's less mathematical than Introduction to Algorithms, and it includes a little more in the way of intuition and applications.

Building Microservices: Free Ebook from O’Reilly and NGINX

The free preview edition features three chapters from Building Microservices:
Microservices—Chapter 1 explains how microservices function as “small, autonomous services that work together” by exposing their APIs to other services. Perhaps the defining feature of a microservice is that you can change and redeploy it without requiring any change to collaborating services.
Integration—Of course, the more small, independent components you’re using, the more challenging it can be to integrate them correctly. Chapter 2 considers the pros and cons of different integration approaches in detail, and describes specific pitfalls to avoid.
Microservices at Scale—A “problem” every app developer both loves and hates is needing to scale up to meet increased demand. Chapter 3 discusses how to make your app resilient in the face of overwhelming demand or network outages, the benefits of caching, the trade-off between consistency and availability of distributed data, solutions for service discovery, and more.
Or buy it from Amazon

Recommended IT books

The Object-Oriented Thought Process, Fourth Edition

Introduction to Programming in Java: An Interdisciplinary Approach

EJB 3 in Action, Second Edition

Mining the social web Second edition.

Big data for dummies

Introduction to algorithms 3rd ed.

Recommended Business Books

Selection sort

Selection sort is a simple sorting algorithm. This sorting algorithm is a in-place comparison based algorithm in which the list is divided into two parts, sorted part at left end and unsorted part at right end. Initially sorted part is empty and unsorted part is entire list.

Smallest element is selected from the unsorted array and swapped with the leftmost element and that element becomes part of sorted array. This process continues moving unsorted array boundary by one element to the right.

This algorithm is not suitable for large data sets as its average and worst case complexity are of O(n**2) where n are no. of items.

Why padding?

Padding makes all objects take space that is a mulitple of 8 bytes. This can waste some memory but it speeds up memory access and garbage collection.

Are you looking to start your own business?

Franchising is a tried and true business model that can help you become your own boss. 

Essential business skills

  • managed a staff, (supervisory skills), 
  • done charity work (community service),
  • team building skills (played competitive sports)

Franchising is the world’s most successful business model

No specific degree or prior industry knowledge is required to become a franchisee. 

Franchising is the world’s most successful business model because it takes people from all walks of life and gives them the tools they need to be entrepreneurs in specialized fields. 

A cash cow requires little investment capital and perennially provides positive cash flows

A cash cow can refer to a business, product or asset that, once acquired and paid off, will produce consistent cash flow over its lifespan. 

Health-conscious people walk right past "junk food" vending machines.

Health-conscious people want healthy, cold drinks and tasty, nutritious snacks and they spend millions of dollars a year getting them. 

AMP HTML is a way to build web pages that render with reliable and fast performance.

You can learn more at including what AMP ishow it works and the importance of validation in AMP. You can also walk through creating an AMP page and read through the reference docs.

Web applications have become an indispensable asset.

Foremost among web applications is the Representational State Transfer (REST) web service, with Java becoming one of the most popular implementation languages.

Sep 25, 2017

Investing profitably is hard.

If you enter an investment when you are already at a disadvantage, then you should know you have already lost.

New Order Indefinitely Bars Almost All Travel From Seven Countries

Starting next month, most citizens of Iran, Libya, Syria, Yemen, Somalia, Chad and North Korea will be indefinitely banned from entering the United States.

Windows Containers

With the introduction of container support in Windows Server 2016, new opportunities are available to take traditional, monolithic applications on a journey to modernize them for better agility.

Sep 24, 2017

Panopticlick is a research project designed to better uncover the tools and techniques of online trackers and test the efficacy of privacy add-ons.

Running tests on Panopticlick both gives you information about your own browser, and also helps EFF use statistical methods to evaluate the capabilities of Internet tracking and advertising companies, and the best forms of protection against tracking without consent.

Sep 22, 2017

There are 2 ways to access Google Drive files and keep them in sync on all your devices.

Drive File Stream, available September 26, is best for most organizations. This application lets you stream My Drive and Team Drive files directly from the cloud, which in turn:

Frees up disk space and network bandwidth
Decreases sync time
Minimizes the amount of company data stored on users' hard drives

You can also make Drive files available for offline access. These cached files sync back to the cloud when you're online, so the latest version is available on all your devices.

Backup and Sync is consumer sync client, but organizations can use it, too.

LinkedIn has created a MySQL Query Analyzer tool in order to analyze and tune expensive queries.

It runs on the network layer, stores everything within a centralized server, and provides a UI for users to analyze metrics.

GitHub and Facebook have joined together to release Atom-IDE

Repackaging some of the work Facebook has done to create a more functional Atom text editor.

Quora's mission is to share and grow the world's knowledge.

Quora is creating the best page on the internet for any given question — pages that are valuable and reusable resources to readers.

DevOps works

Especially when organizations are invested in the tools, organizational structure and processes to make it successful.

The primary benefit the Single Responsibility Principle is high-cohesion, low-coupling code.

Following the SRP minimizes the chance that one class will have to change for a given requirement, and maximizes the possibility that changing one class will not impact any other classes.

How to get system information from iDRAC command line

% Get current system information
racadm getsysinfo

The best way to escape HTML in Javascript

Flushing and Renaming MySQL Error Log File

Flushing and Renaming the Error Log File

You can flush the logs using FLUSH LOGS or mysqladmin flush-logs
shell> mv /var/log/mysqld.log /var/log/mysqld.log_old
mysql > flush error logs or shell > mysqladmin flush-logs error

Fixed: MySQL: You are enforcing ssl conection via unix socket. Please consider switching ssl off as it does not make connection via unix socket any more secure.

A user connecting with unix socket files is necessarily coming from localhost.
A user connecting with TCP could be from either localhost or from some other host.
So, create one [email protected] (or at %, or whatever) with REQUIRE SSL, and create another [email protected] which does not REQUIRE SSL.
It's not perfect, because a user could connect over TCP without SSL, but only on localhost, so it's probably not that big a concern.

MySQL Option Files Read on Unix and Unix-Like Systems

File NamePurpose
/etc/my.cnfGlobal options
/etc/mysql/my.cnfGlobal options
SYSCONFDIR/my.cnfGlobal options
$MYSQL_HOME/my.cnfServer-specific options (server only)
defaults-extra-fileThe file specified with --defaults-extra-file, if any
~/.my.cnfUser-specific options
~/.mylogin.cnfUser-specific login path options (clients only)

How to start a scan with the clamscan command.

Running clamscan --help in the terminal will spit out a lot of different options which you can use to customize how Clam scans your files. However, if you want to keep it rather simple, you can recursively scan the folder “user” within the home folder by running the command clamscan -r /home/user. The recursive flag “-r” is important because otherwise Clam would simply scan any files within the user folder, but nothing that’s inside a folder inside the user folder.

Update the Clam antivirus engine virus definitions to be able to detect the latest threats.

This can be easily accomplished by running the command sudo freshclam. It will instantly contact the Clam servers and download the latest definitions. The initial download will take a while as the definitions are newly downloaded.

$ sudo freshclam
ClamAV update process started at Fri Sep 22 10:32:18 2017
main.cvd is up to date (version: 58, sigs: 4566249, f-level: 60, builder: sigmgr)
daily.cvd is up to date (version: 23862, sigs: 1743102, f-level: 63, builder: neo)
bytecode.cvd is up to date (version: 312, sigs: 74, f-level: 63, builder: neo)

How to install the Clam antivirus engine.

You can search through your respective package manager for “clam antivirus“, and then install the main package. All other dependencies should be pulled in automatically.

sudo apt install -y clamav

How to copy your file to your clipboard from command line on Linux

For example, copy your ssh public key to your clipboard:
xclip -sel clip < ~/.ssh/
$ mongoimport --help | xclip -sel clip
See also:

xclip - command line interface to X selections (clipboard)

[HDGEM] Examples of xclip - copy and paste from command line

       uptime | xclip

       Put your uptime in the X selection. Then middle click in an X application to paste.

       xclip -loops 10 -verbose /etc/motd

       Exit after /etc/motd (message of the day) has been pasted 10 times. Show how many selection requests (pastes) have been processed.

       xclip -o > helloworld.c

       Put the contents of the selection into a file.

       xclip -t text/html index.html

       Middle click in an X application supporting HTML to paste the contents of the given file as HTML.

Get ready for a major music upgrade. Just open your Music app and try Apple Music for free. You can cancel anytime.

Try It Free for Three Months
Enjoy 40 million songs. Plus your iTunes library.
Apple Music for iOS 11 gives you instant access to a massive catalogue of songs — completely ad-free. And everything in your iTunes library, no matter where it came from, lives right alongside it.

Create playlists. Or listen to ours.
Be your own DJ by making playlists of your favourite songs, and listen to mixes Apple Music creates based on the music you like the most.

Stream ad-free radio.
Create your own stations from any song, artist, or album on Apple Music. Or, check out dozens of others in all your favourite genres. Every music station is ad-free with unlimited skips.

Discover personalized recommendations.
The more you listen, the more Apple Music can suggest songs, artists, and albums you might like. You can also create a profile to follow friends and see what they're into.

Listen anywhere. Online or off.
You can add up to 100,000 songs to your library — 10 times as many as Spotify. Then enjoy your music wherever you go and save cellular data by downloading it to your phone.

Join today, cancel anytime.
Student $4.99/mo.†
Individual $9.99/mo.
Family $14.99/mo.††

Try it free for three months*

Does iPhone work with any SIM card or carrier worldwide?

The iPhone models currently sold on work with nano-SIM cards from compatible carriers. And they work on many 4G LTE networks around the world. Contact service providers for details.

The most common code vulnerability evident in static application security testing (SAST) during the software development process is Unpatched Libraries.

A lot of software is largely assembled of separate components, and everybody uses open source libraries today. These libraries offer readily available options, but are not very secure.

PL/SQL is not a legacy technology

It is actively used today both to provide data APIs to UI developers. It is also very actively used as a development language in Oracle Application Express (APEX), an extremely popular RAD tool for building websites.

Java SE version 9 is finally released

Java Platform, Standard Edition
Java SE 9
Java SE 9 is the latest update to the Java Platform. This release includes much awaited new features like the modularization of the Java Platform, better performance, support for new standards, and many other improvements.

Sep 21, 2017

With Azure Container Service, provisioning of a production ready DC/OS cluster is simple and quick.

DC/OS provides a distributed platform for running modern and containerized applications. 

It's always worth noting that git reset --hard is a potentially dangerous command

Since it throws away all your uncommitted changes. For safety, you should always check that the output of git status is clean (that is, empty) before using it.

How to revert a file in Git

git checkout HEAD~2 -- myFile

Portfolio for JIRA has launched a new dependency report that shows you dependencies across multiple teams and projects in a single view.

It helps you avoid possible project delays and will save you from scouring individual JIRA Software issue links for updates on dependent work items.

Sep 19, 2017

How to change sql_mode in MySQL

Adding a mode to sql_mode:

SET sql_mode=(SELECT CONCAT(@@sql_mode,',<mode_to_add>'));

Removing a mode from sql_mode:

SET sql_mode=(SELECT REPLACE(@@sql_mode,'<mode_to_remove>',''));

How to Disable ONLY_FULL_GROUP_BY SQL mode in MySQL

mysql > SET GLOBAL sql_mode=(SELECT REPLACE(@@sql_mode,'ONLY_FULL_GROUP_BY',''));

Adding a mode to sql_mode:

SET sql_mode=(SELECT CONCAT(@@sql_mode,',<mode_to_add>'));

Removing a mode from sql_mode:

SET sql_mode=(SELECT REPLACE(@@sql_mode,'<mode_to_remove>',''));

Fixed: Error occurred during deployment: Could not load any resource bundle by Please see server.log for more details.

To fix Error occurred during deployment: Could not load any resource bundle by 

Make sure you compile and run the application with the same Java version.

HTML Entity Encode Untrusted Data is not enough

Even if you use an HTML entity encoding method everywhere, you are still most likely vulnerable to XSS. 

HTML entity encoding is okay for untrusted data that you put in the body of the HTML document, such as inside a <div> tag. It even sort of works for untrusted data that goes into attributes, particularly if you're religious about using quotes around your attributes. But HTML entity encoding doesn't work if you're putting untrusted data inside a <script> tag anywhere, or an event handler attribute like onmouseover, or inside CSS, or in a URL.

You MUST use the escape syntax for the part of the HTML document you're putting untrusted data into.

Sep 18, 2017

How to use Dell iDrac to reboot your server from command line

Connect to the Dell Remote Access Controller (Drac) IP address via SSH. Then execute:
racadm serveraction <action>

whereas you replace <action> with one of the following:

  • powerdown — Powers down the managed system.
  • powerup — Powers up the managed system.
  • powercycle — Issues a power-cycle operation on the managed system. This action is similar to pressing the power button on the system's front panel to power down and then power up the system.
  • powerstatus — Displays the current power status of the server ("ON", or "OFF")
  • hardreset — Performs a reset (reboot) operation on the managed system.

So, to power off and back on your server, you just type racadm serveraction powercycle.

If your Drac crashes for any reason, you may want to reset it: racadm racreset

If you want to have information about your current server, type: racadm getsysinfo

Batch to setup JAVA programming environment for Algorithm class from princeton

Original web site:

Fixed: Can't locate ExtUtils/

yum install perl-devel

Fixed: Can't locate Data/ in @INC

How to install Data/Dumper

tar xvzf Data-Dumper-2.161.tar.gz
cd Data-Dumper-2.161/
perl Makefile.PL
make install

See also:

MySQLTuner is a script written in Perl that allows you to review a MySQL installation quickly and make adjustments to increase performance and stability.

The current configuration variables and status data is retrieved and presented in a brief format along with some basic performance suggestions.

A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities.

Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security fixes.

syslog is a standard for message logging.

syslog allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, indicating the software type generating the message, and assigned a severity label.

Computer system designers may use syslog for system management and security auditing as well as general informational, analysis, and debugging messages. A wide variety of devices, such as printers, routers, and message receivers across many platforms use the syslog standard. This permits the consolidation of logging data from different types of systems in a central repository. Implementations of syslog exist for many operating systems.

How to suppress the use of option files by a MySQL client program

You can suppress the use of option files by a MySQL client program by invoking it with the --no-defaults option. For example:

shell> mysqladmin --no-defaults -u root version

The only way to truly learn anything is by doing it

A lot and in as many ways as possible.

Sep 16, 2017

Consumer scores are similar to FICO credit scores

But unlike them aren't regulated as to what factors can be used and how transparent the score and its contributing factors are to the scored individual.

The consequences of identity theft are substantial.

People struggle for years of their lives trying to fix their credit.

Sep 15, 2017

JShell is a new tool which supports a Read-Evaluate-Print-Loop (REPL) style of programming.

JShell is a great way to quickly run small code experiments and test new APIs. 

The Java SE 9 Module system

The Java SE 9 Module system makes it easier for developers to construct and maintain libraries and large applications by providing modules, a fundamental new kind of Java program component. Modules ensure reliable configuration, improved security and performance, and applications that are more easily scalable down to small computing devices.

Trello is one of the worlds most popular project planning and collaboration tools

And it's now a core part of Bitbucket's experience. With Trello boards in Bitbucket you can:
• Simplify your workflow – create new branches from cards and get to coding quickly.

• Get status at a glance – see pull request and build status from the front of the card.

• Do everything in one place – plan, track, collaborate, and deploy, all from Bitbucket.

JConsole - a monitoring tool that complies to the Java Management Extensions (JMX) specification

The JConsole graphical user interface uses the extensive instrumentation of the Java Virtual Machine (Java VM) to provide information about the performance and resource consumption of applications running on the Java platform.

You start JConsole by typing the following command at the command line.

% jconsole

Once you have connected JConsole to an application, JConsole is composed of six tabs.
  • Overview: Displays overview information about the Java VM and monitored values.
  • Memory: Displays information about memory use.
  • Threads: Displays information about thread use.
  • Classes: Displays information about class loading.
  • VM: Displays information about the Java VM.
  • MBeans: Displays information about MBeans.

Example Methods of browser Console object


Log a message and stack trace to console if first argument is false.
Log the number of times this line has been called with the given label.
An alias for log();
Displays an interactive listing of the properties of a specified JavaScript object. This listing lets you use disclosure triangles to examine the contents of child objects.
Displays an XML/HTML Element representation of the specified object if possible or the JavaScript Object view if it is not.
Outputs an error message. 
An alias for error();
Creates a new inline group, indenting all following output by another level. To move back out a level, call groupEnd().
Creates a new inline group indenting all following output by another level; unlike group(), this starts with the inline group collapsed, requiring the use of a disclosure button to expand it. To move back out a level, call groupEnd().
Exits the current inline group.
Informative logging information.
For general output of logging information. You may use string substitution and additional arguments with this method.
Starts the browser's build-in profiler (for example, the Firefox performance tool). You can specify an optional name for the profile.
Stops the profiler. You can see the resulting profile in the browser's performance tool (for example, the Firefox performance tool).
Displays tabular data as a table.
Starts a timer with a name specified as an input parameter. Up to 10,000 simultaneous timers can run on a given page.
Stops the specified timer and logs the elapsed time in seconds since its start.
Adds a marker to the browser's Timeline or Waterfall tool.
Outputs a stack trace.
Outputs a warning message. You may use string substitution and additional arguments with this method.

Eclipse Vert.x is a tool-kit for building reactive applications on the JVM.


Eclipse Vert.x is event driven and non blocking. This means your app can handle a lot of concurrency using a small number of kernel threads. Vert.x lets your app scale with minimal hardware.


You can use Vert.x with multiple languages including JavaJavaScriptGroovyRuby, and Ceylon.
Vert.x doesn't preach about what language is best — you choose the languages you want based on the task at hand and the skill-set of your team.
We provide idiomatic APIs for every language that Vert.x supports.

General purpose

Vert.x is incredibly flexible - whether it's simple network utilities, sophisticated modern web applications, HTTP/REST microservices, high volume event processing or a full blown back-end message-bus application, Vert.x is a great fit.
Vert.x is used by many different companiesfrom real-time gaming to banking and everything in between.


Vert.x is not a restrictive framework or container and we don't tell you a correct way to write an application. Instead we give you a lot of useful bricks and let you create your app the way you want to.
Need some guidance? We provide a large selection of examples to get you started for the particular type of application you want to write.

Vert.x is fun

Enjoy being a developer again.
Unlike restrictive traditional application containers, Vert.x gives you incredible power and agility to create compelling, scalable, 21st century applications the way you want to, with a minimum of fuss, in the language you want.
  • Vert.x is lightweight - Vert.x core is around 650kB in size.
  • Vert.x is fast. Here are some independent numbers.
  • Vert.x is not an application server. There's no monolithic Vert.x instance into which you deploy applications. You just run your apps wherever you want to.
  • Vert.x is modular - when you need more bits just add the bits you need and nothing more.
  • Vert.x is simple but not simplistic. Vert.x allows you to create powerful apps, simply.
  • Vert.x is an ideal choice for creating light-weight, high-performance, microservices.