by Ramesh Natarajan
on April 12, 2013
Apache Solr is an open source text search server. It is based on the Apache Lucene search libraries. Solr does full-text search, highlight the hits, near real-time indexing.
It has an extremely scalable search infrastructure that provides replication, load-balanced search query, and automatic failover. This can get the input data that needs to be indexed for searching from various sources including information from a database. You can use HTTP/XML, JASON APIs provided by Apache Solr and write application code in any programming language.
[continue reading…]
by Himanshu Arora
on April 10, 2013
Python is an object oriented language with can be used in both scripting and non scripting contexts. Python has clean and easy syntax that makes it easy to read. In this article, we will understand python language from scratch through examples. We will often compare Python programming features/syntax with some popular languages like C/C++. Also, we will be using Linux command line for all the examples.
This is a new series. We’ll be publishing several articles on Python on an on-going basis.
[continue reading…]
by Himanshu Arora
on April 9, 2013
Sort command is helpful to sort/order lines in text files. You can sort the data in text file and display the output on the screen, or redirect it to a file. Based on your requirement, sort provides several command line options for sorting data in a text file.
[continue reading…]
by Himanshu Arora
on April 5, 2013
Constructors and destructors are fundamental to the concept of classes in C++. Both constructor and destructor are more or less like normal functions (but with some differences) that are provided to enhance the capabilities of a class.
Constructor, as the name suggests is used to allocate memory (if required) and construct the objects of a class while destructor is used to do the required clean-up when a class object is destroyed. In this article, we will study the concept of constructors and destructors through working examples.
[continue reading…]
by Ramesh Natarajan
on April 3, 2013
Linux provides several powerful administrative tools and utilities which will help you to manage your systems effectively.
If you don’t know what these tools are and how to use them, you could be spending lot of time trying to perform even the basic administrative tasks. The focus of this course is to help you understand all the basic system administration tools, which will help you to become an effective Linux system administrator.
[continue reading…]
by Lakshmanan Ganapathy
on April 1, 2013
As many organizations move away from paper documents to digital documents, digital signatures are required to manage any sensitive digital documents. Digital signatures can be used to authenticate the source of the message, such that the receiver can decide whether to trust the sender or not. Now-a-days it is most widely used for software distribution and financial transactions.
In public key cryptography, it is possible to use a private key to sign a file. Anyone who has the corresponding public key can check whether the file was signed by the private key. Anyone who doesn’t have the private key cannot forge such a signature.
[continue reading…]
by Himanshu Arora
on March 20, 2013
Computer networks can be of any form like a LAN, WAN etc. If you are connected to a local LAN or an internet connection, the IP addresses form the basis of communication over computer networks. An IP address is the identity of a host or a computer device while connected to any network.
In most of the cases when you connect your computer to a LAN or internet, you’ll notice that the IP address and other information like subnet mask etc are assigned to your computer automatically. Have you ever thought about how this happens? Well, in this article we will understand the concept of DHCP that forms the basis of this functionality.
[continue reading…]
by Balakrishnan Mariyappan
on March 6, 2013
cp is one of the basic command in Unix. You already know that it is used to copy one or more files or directories from source to destination.
While this tutorial is for beginners, it is also helpful for everybody to quickly review various cp command options using some practical examples.
Even if you are using cp command all the times, probably one or more examples explained below might be new to you.
[continue reading…]