SEARCH KEYWORD -- REMOTE WORK
Check whether a remote server port is open on Linux
As a system administrator or network engineer or application developer, there is a need to check whether a port on remote server is open so that you can tell whether the service under check is running or not. In this post, we would cover a few methods to check whether a remote server port is open or not on Linux. telnet telnet is the most frequently used command on both Windows and Linux to check port. The simple usage for this command is telnet [host] [port] When the port is open, the o...
git reset vs git revert
When maintaining code using version control systems such as git, it is unavoidable that we need to rollback some wrong commits either due to bugs or temp code revert. In this case, rookie developers would be very nervous because they may get lost on what they should do to rollback their changes without affecting others, but to veteran developers, this is their routine work and they can show you different ways of doing that. In this post, we will introduce two major ones used frequently by develo...
GIT,GIT RESET,GIT REVERT 2019-02-02 08:26:39
Reset submodule to checkout state in git
Sometimes there would be a submodule or some submodules within one git repository, in some cases the submodule may be out of sync with the checkout state as some files in submodule may be changed unexpectedly. How to reset the submodule to be the same as the original checkout state? Let's take an example that we have a git repository A and there is a submodule called ruby-gems under it. Assuming the submodule at remote origin has commit a. And on our local environment, the repository A has a la...
GIT RESET,GIT SUBMODULE 2020-09-05 08:30:57
Using public key authentication in SSH
SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc. To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...
LINUX,DEBUG,SSH,PUBLIC KEY 2016-09-10 05:55:46
SSL in PHP for WAMP
Sometimes when we need to use email service provided by WAMP, we need to use some remote mail server such as Gmail. In Gmail, if we want to use the SMTP server to send email and want to use port 465, then the SSL connection should be setup. But by default in WAMP, the ssl is not usable. So to allow use SSL, what we should do is go to system tray and click PHP->PHP Extensions->php_openssl. Then now you can use Gmail to send email easily....
Eclipse 4.4 is going to fully support Java 8
Eclipse is the most popular IDE for developing Java applications, but it seems lag behind the Java 8 release a couple of months ago. The current Eclipse is not supporting Java 8 and if you want to run Java 8 programs on it, you need to install a plugin. You can find the plugin at the Eclipse market place. Now Eclipse 4.4 is coming to us on 25th June and the code name for it is Luna. This new version of Eclipse introduces some new features which can ease developer's work, these features includin...
Simple tutorial on git cherry-pick
It is a common operation to move code from one branch to another branch in a multi-branch git repository. Normally there are two scenarios: Want to move all changes in one branch to another branch, now it's called git merge Want to move only some change/changes from one branch to another branch, now it's called git cherry-pick Usage The purpose of git cherry-pick is to apply some change from one branch to another branch. git cherry-pick [commitHash] The above command is to app...
GIT,GIT CHERRY-PICK,TUTORIAL 2020-05-02 00:02:58
10 modern technologies we will still use in 2030
Although there is rapid revolution for new technology, some technologies can survive with the passage of time. Here are 10 modern technologies which may continue to exist in 2030. 1. QWERTY keyboard Speech recognition, handwriting recognition and gesture control input will become the trend for the next two decades. Nonetheless QWERTY keyboard input is still one of the most accurate way - although not necessarily the most convenient. Although physical keyboard disappear on phones and tablet PCs, ...
New technology,Trend 2012-11-12 11:02:02
How Digital Technology is Transforming Healthcare?
Digitalization is the trendsetter for every industry. Healthcare has also been greatly influenced by digital technology. In fact technology has greatly improved the working of healthcare organization and in turn, outcomes of healthcare services have risen to new heights. This is not an overnight dream but result of immense hard work and efforts done by IT industry. The amalgamation of IT and healthcare has yielded a new era of healthcare that is quick and more reliable as compared to olden days...
HEALTHCARE TECHNOLOGY,PATIENT MANAGEMENT SYSTEM 2017-05-05 04:09:33
Using Fabric to deploy web app
Many people may use FTP and rsync to synchronize codes to server, this way is fine but it may be troublesome when you need to deploy many times a day, actually there is a simple way if you can spend time on finding the fast way. We introduce Fabric today for deploying web app to remote server. Fabric is a deployment tool written with Python, the biggest feature if it is you no need to login to remote server, you can execute remote commands locally. Here is s simple deployment script written with...
Fabric, Web deployment,SSH,Python 2012-12-08 03:16:00
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>