Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Bamdeb Ghosh
Page 2 of 3
Working with the AWS S3 CLI in Linux
AWS S3 (Simple Storage Service) is a reliable and scalable object storage service commonly used for storing and retrieving data across various industries. The AWS S3 CLI (Command Line Interface) provides developers and system administrators with powerful command-line tools to interact with S3 buckets and objects efficiently. This article explores essential AWS S3 CLI commands for managing buckets, uploading and downloading files, and performing other common operations in Linux environments. Setting up the AWS CLI Before using the AWS S3 CLI, you need to install and configure the AWS CLI on your Linux system. Installation Install ...
Read MoreWorking with the AWS CLI for EC2
The AWS CLI (Amazon Web Services Command Line Interface) is a powerful tool that enables users to manage AWS services, including EC2 (Elastic Compute Cloud) instances, directly from the command line. This unified tool provides an efficient way to automate cloud infrastructure management tasks and streamline operations without using the AWS Management Console. The AWS CLI allows users to automate complex tasks, manage EC2 instances programmatically, and integrate AWS operations into scripts and workflows. This makes it an essential tool for DevOps professionals and system administrators working with AWS infrastructure. Setting Up AWS CLI Before using the ...
Read MoreHow to Find Duplicate Files in Unix?
As we increasingly depend on digital media for storing our important files, we tend to accumulate a large number of files over time. It can be challenging to manage these files, particularly when we have multiple copies of the same file that can consume storage space. Unix provides several powerful command-line methods to find and remove duplicate files, saving both time and disk space. In this article, we will explore various approaches to find duplicate files in Unix and demonstrate the terminal commands that can be used for each method. These approaches allow you to choose the method that ...
Read MoreWorking with Hidden Files in Linux
Hidden files in Linux are files that are not displayed when the standard ls command is executed. A hidden file's name begins with a dot (period). Not only files, but also directories can be hidden in Linux. Files are hidden for various purposes — primarily to prevent accidental modification or deletion of important system configuration files. Hidden files typically contain environment settings or application data that should only be accessed by specific programs, not manually edited by users. In this article, we will explore different methods for finding, creating, and manipulating hidden files in Linux using command-line tools. ...
Read MoreHow to Execute Programs From Anywhere in Linux?
Linux is a widely used open-source operating system that offers users the flexibility to execute programs from any location on the system. Unlike other operating systems, Linux does not restrict programs to fixed directories, enabling users to access executables from anywhere. This feature is particularly advantageous when you need a program to run from multiple locations or when managing custom software installations. To execute programs from anywhere in Linux, the system uses the PATH environment variable, which contains a list of directories where Linux searches for executable files. Understanding how this works and where programs are typically stored is ...
Read MoreHow to Mount and Unmount Filesystems in Linux?
In Linux, everything (pictures, binary files, text files, directories, etc.) is treated as a file. Understanding how to organize and access files efficiently is crucial for system administration. The mount and umount commands are essential tools for this purpose. In this article, we will explore these two commands in detail. The mount command allows us to attach a filesystem to a directory in the filesystem hierarchy, while the umount command detaches it. These operations can be performed on hard disks, USB drives, and other storage devices. Important: All mount and unmount operations require sudo or root privileges. Listing ...
Read MoreA Guide to Yum and Apt on Linux
Package management is a fundamental aspect of Linux system administration, enabling users to install, update, and remove software efficiently. Two of the most widely used package managers are Yum (used on Red Hat-based distributions like CentOS and Fedora) and Apt (used on Debian-based distributions like Ubuntu). These tools provide command-line interfaces for managing software packages and their dependencies automatically. This guide explores the essential commands and features of both Yum and Apt package managers, helping you understand how to effectively manage software packages on different Linux distributions. Managing Packages with Yum Yum (Yellowdog Updater, Modified) is the ...
Read MoreJava Multicasting (Typecasting multiple times) Puzzle
Introduction Java Multicasting known as typecasting multiple times. It is the process of converting a value from one data type to another and it involves multiple typecasting conversions. It allows us to change the data type of a variable to perform operations that would not be possible otherwise. Let us discuss multicasting in Java. We will talk about numeric multicasting to convert between numeric data types. We will also discuss object multicasting to treat subclass objects as superclass objects. We will also provide simple programming examples to understand this topic easily. Numeric Multicasting in Java In this programming example we ...
Read MoreJava Method Parameters
Introduction We know that Java Method Parameters are variables used in method declarations to accept inputs and enable the methods to work with data that are dynamic. Let us discuss the Java Method Parameters and their use in making methods reusable and adaptable. We will discuss the importance of data input, code reusability, and flexibility. We will also explain about the pass−by−value and pass−by−reference by using Java Parameters with basic programming examples. By understanding the article, we hope our readers will understand the importance of the Java Method Parameters as it helps to create essential and maintainable Java programs. Definition ...
Read MoreJava JSON Processing (JSON-P) with Example
Introduction Java programs can operate with JSON data due to the strong Java JSON Processing (JSON-P) API. Web servers and clients frequently exchange data using the lightweight JSON data transfer standard. JSON-P offers the Object Model API and the Streaming API as its two primary methods for processing JSON data. Let us talk about these two strategies and use examples to show how they work and what they can do. We hope that our readers will learn about the Object Model API and Streaming API, together with Programming examples, by understanding this article's explanations on Java JSON Processing (JSON-P) with ...
Read More