There are millions of cloud providers out there, may be not, but there are enough to confuse you with their features and creative billing terms. Ofcouse, its traditional VPS style and not using Docker to pack your app. Now, the two cloud provider I choose to choose between are Amazon Web Services – aws.amazon.com Digitalocean – cloud.digitalocean.com Why this two? I am not paid any one of those cloud providers, that further more vaguer for the reasoning. Being said that, to see from the perspective of highly scalable apps there are two philosophies. I build my app using a framework from my cloud provider and my service provider will make it easier to deploy and scale up or down on demand I setup everything and orchestrate the deployment process using chef, puppet or similar application and write my own logic for processing the on demand scaling yes, ordered in the same order as the service provider. I will put my two cents of my philosophy in software development and this totally depends on the type of developer. one follows the guidelines laid out by a framework to strictly develop using those or to use libraries to build ones own app philosophy which dictates its own framework as you build it up. The fight is between libraries and frameworks, when you know what you are building and the final line is the light at the end of the tunnel, its probably much easier to find the suitable framework and nail it! important thing… Read more
Parallel universe: Perceptions from an immigrant
On a metro train travelling to SHARAF DG station, . It has been an intense “yesterday” seeing death, life and the decisions you make when there is a soul trying to escape this world to travel onto another. In a different country travelling from a different country always trying to relate the whole world and its existence to the people you love. People you love being the ones you meet, the people who got you here, the ones you are born with, the ones you want to die with. This whole existence is an art and is always interpreted upon different phases that we go through as a good and bad. The balance of thoughts or the non neutrality of the mind makes every art an interpretation to experience in life. The train is moving fast and its dark and cold. Diversity at its best. People of all sorts. Be it the age, color, language, culture, what they wear and how they smell. I m going insane! There is a guy who is sitting on the other side and I am trying to get a look on him trying to identify his diversity and he looks more similar to those people I was brought up with. Interesting and it changes as he gives that “I m the creepy guy” look. This moment transforms radically when he pushes out through the crowd to get out of the train. There was a whole distance to cover, while he is on the phone…. Read more
Repair your PC from Grub boot rescue!
I was working with windows disk management. It somehow, with a lot of intelligence, dropped the partition that where ubuntu was installed. Obviously, you didn’t see the problem until a reboot and Ubuntu cannot boot. Grub Boot rescue shows up. You tried the following tutorial and didn’t seem to work. If the linux partition holding the grub files still exists, you can use grub prompt. Depends where your Windows install is located. If it’s on the first drive e.g. (hd0,1), this should boot into Windows: set root=(hd0,msdos1) chainloader +1 boot If it’s on the secondary drive e.g. (hd1,1), you’ll have to add drivemap: set root=(hd1,msdos1) drivemap -s hd0 hd1 chainloader +1 boot Source: Stackexchange If it did work, no problem. If it didn’t then this would be the best solution Step 1: Install a bootable windows disk. If you had a 64 bit windows and you have a osX computer. Use boot camp. I was using a 32-bit windows 8.1 and I had to install the bootable USB using unetbootin or Install Ubuntu on the USB media Bootable USB: windows 8 step2: Boot your PC with the USB drive P.S. I did a Ubuntu bootable USB because my Windows 8 media didn’t detect. This screen is a happy moment. Now install Ubuntu normally Yup here it goes!!! U can now normally install Ubuntu and that’s the end of grub boot rescue Note: I lost all the files/projects because the drive with Ubuntu got dropped by windows 8.1
Secure Design for Low Energy Bluetooth (BLE) Applications
Low Energy Bluetooth (BLE) is widely used in various smart devices and IoT scenarios as a low-power, short-range wireless communication technology. However, due to the characteristics of BLE, it is susceptible to various security threats. Therefore, when designing and developing BLE applications, it is crucial to focus on security issues and implement appropriate security measures to protect communication data and user privacy. Firstly, Security Measures for Bluetooth Pairing In the pairing process between BLE devices, it is essential to use FIPS-approved algorithms such as AES-CMAC and P-256 elliptic curve to ensure the security of pairing information. Pairing information should be stored in a secure storage location on the device to prevent malicious attackers from stealing it. For authentication and encryption, FIPS-approved algorithms should also be used to ensure the confidentiality and integrity of communication data. For example, the use of AES-CCM algorithm can encrypt and protect data transmission, while also ensuring the integrity of messages. In healthcare devices, such as a health wristband communicating with a smartphone, the use of AES-CCM algorithm encrypts the user’s health data to ensure its confidentiality. To prevent passive eavesdropping and man-in-the-middle attacks, user-assisted secure simple pairing methods can be used. For instance, using the ECDHE algorithm for Simple Secure Pairing (SSP) to prevent passive eavesdropping attacks, and employing the user-assisted digital method Passkey Entry to prevent man-in-the-middle attacks. Here is the description of the Bluetooth Simple Secure Pairing (SSP) implementation example:Device Preparation• Device A (Initiator): a Bluetooth device, such as a smartphone.• Device B… Read more
Unveiling the Mysteries of BLE 4.0 Range
With the rapid development of the Internet of Things (IoT), Bluetooth Low Energy (BLE) technology has become increasingly important. As the latest version of BLE technology, BLE 4.0 has sparked intense interest in its range. So, how far can BLE 4.0 reach? Today, we’ll uncover the mysteries of BLE 4.0 range. Overview of BLE 4.0 Technology BLE 4.0 is the fourth generation of BLE technology, released by the Bluetooth Special Interest Group (SIG) in 2010. This technology marks a significant leap forward in BLE, featuring lower power consumption, faster data transmission speeds, and longer communication distances. How Far Can BLE 4.0 Reach? The range of BLE 4.0 refers to the maximum communication distance between devices. In ideal environments, BLE 4.0 can reach up to 100 meters (328 feet). However, actual environments are often affected by interference, obstacles, and other factors that can impact BLE 4.0 range. The main factors that affect BLE 4.0 range include: Environmental interference: Signals from Wi-Fi, Bluetooth, and mobile phones can interfere with BLE 4.0 signals. Obstacles: Walls, pillars, and furniture can block BLE 4.0 signals. Device transmission power: Higher transmission power can increase BLE 4.0 range. Receiver sensitivity: Higher receiver sensitivity can also increase BLE 4.0 range. BLE 4.0 Range Testing To better understand BLE 4.0 range, we conducted a series of tests. The test environment was an open, obstacle-free area, with BLE 4.0 devices transmitting at 4dBm and receiving at -90dBm. The test results were: In an open, obstacle-free area, BLE 4.0 range reached… Read more
2013: A Year of Growth and Achievement
As I reflect on the past year, I am filled with a sense of pride and accomplishment. In 2013, I had the opportunity to work as a Communication and Software R&D Engineer, focusing on researching and developing innovative products related to near-field communication technology, with a particular emphasis on Bluetooth Low Energy (BLE). Throughout the year, I had the privilege of delving deeper into the realm of near-field communication, gaining a profound understanding of its underlying principles and mechanisms. My research and development efforts culminated in the successful application of BLE technology to create smart lock products that showcased enhanced user experience and security features. While the journey was not without its challenges, I persevered and overcame numerous obstacles, ultimately yielding substantial results. I am thrilled to have made meaningful contributions to the development of smart locks, which have the potential to revolutionize the industry. As I look back on 2013, I am reminded of the importance of continuous learning and growth. My experience has taught me that staying at the forefront of technological advancements requires dedication, passion, and a willingness to adapt to emerging trends and innovations. In conclusion, 2013 was a pivotal year in my career as a Communication and Software R&D Engineer. I made significant strides in near-field communication technology, and my research and development efforts yielded tangible results. I am excited to carry this momentum forward, continuing to push the boundaries of innovation and excellence in the years to come.
SensyLight: sensible atmosphere using Internet of Things
The above video is from a research lab at the MIT Media Lab called Responsive Environments. They have a really interesting article [1] about a multimodal mediated work environment. Internet of Things has been of great buzz these days. It is interesting, but why is it interesting? Just made a project/home lighting on this project. So, here is the scenario for the internet of things. The thing in the Internet of Things is the web controlled lights – LED strip. The “control” part of the lights is managed by the Arduino. The task of Arduino would be to “GET” data that matters and send that info to the light strip. The ways in which the LED strip can be manipulated from the Arduino can be listed as 1 LED can have 3 inputs, R G B. Each R G B can value from 0 – 255 which is 256 values. There are 32 LEDs in the strip. Which makes a lot of math and logical decisions for the Arduino to handle. That is the whole point of networking these devices, now they have access to on-demand computing resources. This means we need the medium to connect the Arduino to the internet. That is done using the WiFi module which communicates with the Arduino using USART communication. There are two ways to handle the information flow: To directly to give out RGB information an hour A lot of data transfer between the devices, but all of the computing, the decision is taken… Read more
Zigbee Technology: A Comprehensive Review of its History, Technology, Applications, and Future Directions
Zigbee is a low-power, low-data-rate wireless communication technology that has been gaining popularity in recent years due to its ability to enable wireless communication between devices over short distances. In this article, we will delve into the history of Zigbee, its technology, applications, and future directions, providing a comprehensive review of this exciting technology. History of Zigbee The concept of Zigbee was first introduced in the late 1990s by a group of companies, including Motorola, Intel, and Philips, who formed the Zigbee Alliance. The goal of the alliance was to develop a wireless communication technology that could enable low-power, low-data-rate communication between devices over short distances. The first Zigbee standard, Zigbee 1.0, was released in 2004, followed by subsequent updates, including Zigbee 1.1, Zigbee 1.2, and Zigbee 3.0. Zigbee Technology Zigbee is a wireless communication technology that operates on the 2.4 GHz frequency band, using a mesh networking topology. The technology is designed to enable low-power, low-data-rate communication between devices, making it ideal for applications that require low power consumption and low data transfer rates. Zigbee devices can operate in one of three modes: coordinator, router, and end device. The coordinator is the central device that manages the network, while routers act as intermediaries to extend the range of the network. End devices are the devices that communicate with the coordinator and routers to exchange data. Zigbee technology has several advantages, including: Low power consumption: Zigbee devices can operate for years on a single battery, making them ideal for battery-powered… Read more
WiFi Positioning System – Using Python and Google Geolocation API
I consider there is these following steps involved for such a program. I will keep this as a documentation as well as a progress report to keep track of the project. Reading all the required information Reading SSID in MAC Using Airport Shell command Here is how it should look: [viraldownloader id=180] Reading SSID in Linux (Ubuntu), Windows identify shell command for linux/Ubuntu identify shell command for windows Parsing them in JSON format Parsing information into required information into prescribed format CURL and Get the Location information in JSON Parse it and display on google Building a GUI Here is the gitHub repository for the project that I am working on. https://github.com/akrv/pyWPSLocalisation Feel free to contribute/contact it is interesting for you aswin[at]southpaw.in
Why you should draft on Google Docs?, like a boss!
I m writing my thesis as a part of competing my master degree. Its over a 100 page document with images at 300 Dpi. In english, there are a lot of pages with each page having an image more than 2MB. This drastically increases the size of your Microsoft Word document, well if you added it with the text you are writing. I do, just to improve the text I write for it. Some people argue that latex is the best method and it actually helps them in the writing process. If you are that person, this advice is not for you, otherwise lets dive more into the specifics. Well my final report will be in LaTex, of course, but this is describing the process that I go through while you are writing you document. Truth is your document is probably being read by Google and the worst aftermath you get suggested with ads all over the internet. There are some easy ways to get through them. I started out in MS Word, just like I usually used to. I use a Macbook Pro and MS Word 2011 seemed pretty old, so I used 2016. However, it doesn’t matter which word version you use. It will crash if it has to crash. And then in the back of my mind, well 2011 doesn’t crash that much, then why do i have 2016 released in the first place? Lets not go into the software development life cycle, Microsoft tests its latest app for osX version a… Read more