Articles on Trending Technologies

Technical articles with clear explanations and examples

Consistency Semantics for File Sharing

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 2K+ Views

File-sharing services have become an integral part of modern communication and collaboration. These services allow users to share files with others, enabling them to work together on projects and exchange information. However, with multiple users accessing and updating the same file simultaneously, the problem of data consistency arises. Data consistency refers to the correctness and reliability of data, ensuring that all users see the same view of the data at all times. Consistency semantics is a set of rules that define how data is accessed and updated by different users in a distributed system. It ensures that all users ...

Read More

Top 5 Features of Using Docker Swarm

Aadyaa Srivastava
Aadyaa Srivastava
Updated on 17-Mar-2026 645 Views

Docker Swarm is a powerful container orchestration tool that manages multiple Docker containers across different hosts. It allows developers and IT teams to seamlessly deploy, scale, and manage containerized applications by abstracting the complexity of managing multiple containers and hosts into a simple, unified interface. Docker Swarm transforms a cluster of Docker nodes into a single virtual system. It groups containers together using the concept of services to construct applications, while providing load balancing and automatic container recovery during failures. Its straightforward setup works on both on-premises systems and cloud infrastructure, making it an accessible solution for container orchestration. ...

Read More

How to Generate a Self-Signed Certificate for Kubernetes?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 976 Views

Self-signed certificates provide a cost-effective way to establish secure communication between Kubernetes components such as the API server, etcd, and kubelets. While not signed by a trusted Certificate Authority (CA), they offer encryption for internal cluster communication and development environments. What are Self-Signed Certificates? A self-signed certificate is a digital certificate that is signed by its own private key rather than by a trusted Certificate Authority. In Kubernetes, these certificates secure communication channels between cluster components, ensuring data integrity and confidentiality during transmission. Generating a Self-Signed Certificate Step 1: Generate a Private Key First, create ...

Read More

How to grep multiline search patterns in Linux?

Mukul Latiyan
Mukul Latiyan
Updated on 17-Mar-2026 2K+ Views

In Linux, searching for multiline patterns requires special techniques beyond the basic grep command. While grep is designed primarily for single-line pattern matching, we can use various approaches and tools to search across multiple lines effectively. The grep command in Linux is used to filter searches in a file for a particular pattern of characters. It displays lines that contain the pattern we are trying to search, where the pattern is referred to as a regular expression. Basic Grep Syntax grep [options] pattern [files] Common options include − -c : Count of ...

Read More

Creating a Temporary File in Linux

Pradeep Jhuriya
Pradeep Jhuriya
Updated on 17-Mar-2026 7K+ Views

In Linux, it is often necessary to create temporary files for various purposes, such as storing intermediate data during processing or storing configuration information for a script. Temporary files are usually created in the /tmp directory, which is a standard location for storing temporary files on most Linux systems. The mktemp Command The most common and secure method to create temporary files in Linux is using the mktemp command. This command creates a unique temporary file with proper permissions and prints the file name to the console. Syntax mktemp [options] [template] The template ...

Read More

Bash HereDoc Tutorial With Examples

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 3K+ Views

If you're a Linux or Unix user, you're probably familiar with Bash, the command-line shell that's commonly used on these systems. Bash has a lot of powerful features that can make working on the command line much more efficient, and one of those features is called a HereDoc. In this tutorial, we'll explain what a HereDoc is, how it works, and give you some examples of how you can use it in your Bash scripts. What is a HereDoc? A HereDoc, short for "Here Document, " is a way to include a block of text within a Bash ...

Read More

Convoy Effect in FCFS

Arnab Chakraborty
Arnab Chakraborty
Updated on 17-Mar-2026 4K+ Views

In computer operating systems, scheduling algorithms play a crucial role in managing the execution of multiple processes. The First-Come-First-Serve (FCFS) scheduling algorithm follows a sequential order in executing processes as per their arrival time in the system. Although FCFS is straightforward and easily implementable, it may result in the Convoy Effect, where a resource-intensive process monopolizes system resources and creates a backlog of smaller processes, causing delays and inefficiencies. First Come First Serve (FCFS) Scheduling First-Come-First-Serve (FCFS) is a non-preemptive scheduling algorithm where processes are executed in the order they arrive in the ready queue. When a process ...

Read More

10 7zip (File Archive) Command Examples in Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

If you're a Linux user, you probably deal with file archives frequently. Whether you're sending files to someone, backing up data, or just organizing your files, compressing them into a single file archive can save a lot of space and make things easier to manage. One tool you can use for this purpose is 7zip. In this article, we'll cover 7zip command examples in Linux that you can use to compress and extract files in various ways. What is 7zip? 7zip is a free and open-source file archiver, similar to WinZip or WinRAR on Windows. It was developed ...

Read More

How to Generate SSH Key in Windows 10?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 998 Views

SSH (Secure Shell) is an encryption protocol that provides a secure connection between two computers over an insecure network, such as the internet. It allows users to remotely and securely access and control another computer or server. SSH works by encrypting all data sent between the two computers, including any usernames and passwords used to log in. In order to establish a secure SSH connection between two computers or servers, SSH keys are necessary. An SSH key is a pair of cryptographic keys − one public and one private. The private key is kept on the user's local ...

Read More

Creating Apache Virtual Hosts with Enable_Disable Vhosts Options in RHEL_CentOS

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 1K+ Views

Apache Virtual Hosts are a powerful feature that allows you to run multiple websites on a single server. With virtual hosts, you can configure Apache to serve different content based on the hostname or IP address of the incoming request. This makes it possible to host multiple websites on a single server, each with their own domain name, content, and settings. In this tutorial, we will show you how to create Apache virtual hosts on a RHEL/CentOS 8.0 server. We will cover the basic concepts of virtual hosts and walk you through the steps of creating virtual hosts using ...

Read More
Showing 8471–8480 of 61,297 articles
« Prev 1 846 847 848 849 850 6130 Next »
Advertisements