Design Pattern

Origin The idea originates from construction work and civil engineering architecture work. Definition A general solution to a recurring problem.

April 4, 2022 · 1 min · jaavedkhan

Systemd

Introduction fc position ease box interval due front 2.50 2 1.00 2021-08-08T07:36:20Z ref What is init? In Linux, init is a abbreviation for Initialization. The init is a daemon process which starts as soon as the computer starts and continue running till, it is shutdown. In-fact init is the first process that starts when a computer boots, making it the parent of all other running processes directly or indirectly and hence typically it is assigned “pid=1“....

April 4, 2022 · 4 min · Jaaved Khan

Operator

Summary ref Custom Kubernetes controller. A operator is an application-specific controller that extends the functionality of the Kubernetes API to create, configure, and manage instances of complex applications on behalf of a Kubernetes user. It builds upon the basic Kubernetes resource and controller concepts, but includes domain or application-specific knowledge to automate the entire life cycle of the software it manages. In Kubernetes, controllers of the control plane implement control loops that repeatedly compare the desired state of the cluster to its actual state....

April 4, 2022 · 3 min · Jaaved Khan

BlockChain @KFUPM 2nd meeting–20211212-133437

First meeting ATTACH Questions Why signer is required? This is optional, based on the configured workflow. Points Start up started in 2017 from KFUPM Enterpreneur Institute. Raised 1.5 Million from Aramco. Next DocCerts: https://next.doccerts.com Already onboarded Universities already adopted blockchain solution Doc Cert Solution Issuer and Signer of certificates Any one can request for a certificate from outside for signing....

April 4, 2022 · 2 min · Jaaved Khan

20210908-103720–Microsoft Power Platform, PowerBI, presentation By Netways

Questions API data source connection to Canvas apps Multiple APi, combinations of API and database Canvas vs PowerBI? difference Canvas is for building low code apps for mobile and tablet. PowerBI dashboard can also be displayed inside the Canvas. PowerBI publish datasets? Combine API with database data source. yes, combination possible....

April 4, 2022 · 1 min · Jaaved Khan

Tawakkalna meeting for the web version–20210916-222825

No google Not so confident on frontend Camera TODO Env separation

April 4, 2022 · 1 min · Jaaved Khan

Blockchain usecase at @KFUPM–20211201-130620

Summary Difficult to tamper data on block chain Blockchain is the secure database, information is stored on a difficult to tamper with network, and it costs money to store data. Questions compared with signing? linkage, Which two network? more options Etherum and IBM block chain network, information stored public? public and private networks. data stored public data. Can cantorl what type of information can be stored related to degree on network....

April 4, 2022 · 1 min · Jaaved Khan

Ansible Role

April 4, 2022 · 0 min · Jaaved Khan

Persistent Volume Claim (PVC)

Summary is a request for storage by a user. It is similar to a Pod. Pods consume node resources and PVCs consume PV resources. Pods can request specific levels of resources (CPU and Memory). Claims can request specific size and access modes (e.g., they can be mounted ReadWriteOnce, ReadOnlyMany or ReadWriteMany, see AccessModes). While PersistentVolumeClaims allow a user to consume abstract storage resources, it is common that users need PersistentVolumes with varying properties, such as performance, for different problems....

April 4, 2022 · 1 min · Jaaved Khan

Role Based Access Control

Summary wiki In computer systems security, role-based access control (RBAC)[1][2] or role-based security[3] is an approach to restricting system access to authorized users. It is an approach to implement mandatory access control (MAC) or discretionary access control (DAC). [kubeternetes official](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#:~:text=Role%2Dbased%20access%20control%20(RBAC,individual%20users%20within%20your%20organization.) Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within your organization.

April 4, 2022 · 1 min · Jaaved Khan