Skip to main content

Posts

Showing posts with the label Software

PostgreSQL list of commands

PostgreSQL, or Postgres, is an object-relational database management system that utilizes the SQL language. PSQL is a powerful interactive terminal for working with the PostgreSQL database. It enables users to execute queries efficiently and manage databases effectively. Here, we highlight some of the most frequently used PSQL commands, detailing their functionalities to enhance your PostgreSQL experience. Top PSQL Commands in PostgreSQL Here are the top 22 PSQL commands that are frequently used when querying a PostgreSQL database: Serial No.CommandDescription1 psql -d database -U user -W Connects to a database under a specific user 2 psql -h host -d database -U user -W Connect to a database that resides on another host 3 psql -U user -h host "dbname=db sslmode=require" Use SSL mode for the connection 4 \c dbname Switch connection to a new database 5 \l List available databases 6 \dt List available tables 7 \d table_name Describe a table such as a column, type, modifiers of c...

How to deply Ollama & open web-ui on your laptop

How to deploy Ollama  Installation: Download Ollama:   Get the Ollama package from the  GitHub repository .   Install Dependencies:   Ensure you have any required dependencies, including libraries for your specific model.   Verify Installation:   Use  ollama --version  to confirm Ollama is installed correctly.   2. Model Deployment and Usage: Pull the Model:   Use the  ollama pull <model_name>  command to download the desired model.   Run the Model:   Use  ollama run <model_name>  to initiate the model's execution.   Interacting with the Model:   Ollama provides an API at  http://localhost:11434/api/generate  for interacting with the model.   Optional: Web UI:   Explore  Open WebUI  for a user-friendly interface to manage and interact with models.   Optional: Custom Applications:   Build custom applications using libraries like FastAPI and Gr...

pivot_root vs chroot vs switch_root

The chroot command modifies the root directory for a process, limiting its access to the rest of the filesystem. This is useful for security, containerization, or testing purposes. The process running under chroot has no knowledge of anything outside its jail, making it appear as if it is running on the root filesystem. pivot_root vs chroot vs switch_root 1 2 3 In Linux, pivot_root, chroot, and switch_root are commands used to change the root filesystem of a process. Each has its specific use cases and functionalities. pivot_root The pivot_root command is used to change the root filesystem of the current process and its children. It swaps the current root filesystem with a new one, making the old root accessible at a specified location. This command is typically used during the boot process when the system transitions from an initial ramdisk (initrd) to the real root filesystem 1 . Example: mount  /dev/hda1 /new-root cd  /new-root pivot_root . old-root exec chroot  . sh ...

Vim Copy & Paste Terminology

The keyboard shortcuts to copy, cut, and paste can be boiled down into three characters that utilize Vim-specific terminology. Understanding these terms will help you recall the correct keyboard shortcut. Y stands for “yank” in Vim, which is conceptually similar to copying. D stands for “delete” in Vim, which is conceptually similar to cutting. P stands for “put” in Vim, which is conceptually similar to pasting. I deliberately use the phrase “conceptually similar to” because these actions are not one and the same. If you want to dive deeper into this explanation, scroll down to the section below titled “What Happens Under the Hood?” Copy, Cutting, and Pasting in Vim/Vi - The Basics 1.Press esc to return to normal mode. Any character typed in normal mode will be interpreted as a vim command. 2.Navigate your cursor to the beginning of where you want to copy or cut. 3.To enter visual mode, you have 3 options. We suggest using visual mode because the selected characters are highlighted, an...

What is avahi in Linux?

avahi is a Linux implementation of a   protocol   also known as "Rendezvous" or "Bonjour"). Its goal is to let devices, connected to the local network, broadcast their IP-address together with their   function . Hence the printer can from time to time broadcasts : My IP is   192.168.23.45   and I can print any postscript document with ipp prottocol; a NAS can say: My IP is   192.168.23.88   and I can stream music, save your backups, and act as a fileserver. If it is not what you want to hear on your network you can stop / disable the avahi daemon with the standard  systemctl  command, but if you run a cups-broadcast daemon, it will start the avahi itself. Linux uses  fictive  users usually for security reasons, not to give the attacker any chance to hack a process owned by root. So you can see a  postfix  or  mail , and  postgres  or  mysql  users. The daemon, owned by such unprivileged user, gives...

Interview preparation Guide for Software Engineers

- Designing Data-Intensive Applications by Martin Kleppmann Amazon: https://amzn.to/4dlfPed - Database Internals by Alex Petrov Amazon: https://amzn.to/3YI515e - System Design Interview (Volume 1) by Alex Xu Amazon:  https://amzn.to/3WJzwVV   - System Design Interview (Volume 2) by Alex Xu Amazon:  https://amzn.to/3M7zEtv   - Grokking the System Design Interview https://lnkd.in/ebEwFWbP - Grokking the Advanced System Design Interview https://lnkd.in/e_c2CWge - Donne Martin's System Design Primer https://github.com/krmadhukar/system-design-primer - Site Reliability Engineering: How Google Runs Production Systems https://lnkd.in/edYzQwXW - The Site Reliability Workbook: Practical Ways to Implement SRE https://lnkd.in/e9tKypna - Understanding Distributed Systems https://amzn.to/4fGzg2H - Fundamentals of Software Architecture - Mark Richards & Neal Ford https://amzn.to/3Xdozxv - Software Architecture: The Hard Parts - Mark Richards & Neal Ford https:...

𝐅𝐑𝐄𝐄 𝐂𝐨𝐮𝐫𝐬𝐞𝐬 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐫𝐞𝐠𝐫𝐞𝐭 𝐧𝐨𝐭 𝐭𝐚𝐤𝐢𝐧𝐠 𝐢𝐧 𝟐𝟎𝟐𝟒

1 Introduction Generative Al imp.i384100.net/5gNjVj 2. Generative AI with Large Language Models imp.i384100.net/k0qRez 2 a) React Fundamentals imp.i384100.net/9gYeRW 2 b) Angular: imp.i384100.net/eKWR9r 2 c) SEO: imp.i384100.net/xkGnW5 3. Generative Adversarial Networks (GANs) Specialization imp.i384100.net/DKNLPn 4. Introduction to Artificial Intelligence (AI) imp.i384100.net/QyQKoA 5. AI Engineering imp.i384100.net/9gYeRy 6. Natural Language Processing Specialization imp.i384100.net/rQPgZR 7. Deep Learning Specialization imp.i384100.net/jrL1k5 8. Generative AI for Data Scientists Specialization imp.i384100.net/k0qReN 9. IBM Data Science Professional Certificate imp.i384100.net/AWNK91 10. Introduction to Data Science imp.i384100.net/GmNDek 11. Learn SQL Basics for Data Science imp.i384100.net/Vm54E3 12. Excel for Business imp.i384100.net/g1EojB 13. Python for Everybody imp.i384100.net/B0MKrL 14. Machine Learning Specialization imp.i384100.net/WqkYnM 15. SQL for Data Science imp.i38410...

Golden rule of Programming - Don’t code today what you can’t debug tomorrow.

  One of the golden rule of programming is : 💡 Don’t code today what you can’t debug tomorrow. Below some advices to improve yourself every day : 👉Master Your Tools: Become proficient in the programming languages, frameworks, and tools relevant to your field. 👉Problem-Solving Skills: Develop strong problem-solving skills to efficiently tackle coding challenges. 👉Debugging Proficiency: Sharpen your debugging skills to identify and fix issues quickly. 👉Algorithmic Understanding: Develop a strong understanding of algorithms and data structures for efficient problem-solving. 👉Code Readability: Write clean and readable code; it helps you and others understand and maintain it. 👉Time Management: Prioritize tasks, set deadlines, and manage your time effectively to stay productive. 👉Continuous Learning: Stay updated with industry trends, new technologies, and best practices to enhance your skills. 👉Testing: Embrace testing methodologies to ensure the reliability and correctness of ...