Profile

Cover photo
Tech Informant
3 followers|4,250 views
AboutPostsPhotosVideos+1's

Stream

Tech Informant

Shared publicly  - 
 
MySQL is the most popular Opensource Relational SQL database management system in use for web server applications in Linux, and it is an open-source database combined with the relational database management system, called as RDBMS. MySQL delivers a secure, cost-effective and enterprise-grade MySQL database service for your modern applications.
1
Add a comment...

Tech Informant

Shared publicly  - 
 
Linux uses single rooted, inverted tree-like file system hierarchy, and according to the FHS, the following mount point is the most important system/user directories in Linux. This is very important to know about Linux File System Hierarchy to manage a Linux Operating system and this is highly important to get knowledge on the default directories that exist on most of the UNIX/Linux Operating system. The Similar Directory structure you’ll find in all the major Linux Operating Systems.
Linux uses single rooted, inverted tree-like file system hierarchy, and according to the FHS, the following mount point is the most important system/user directories in Linux. This is very important to know about Linux File System Hierarchy to manage a Linux Operating system and this is highly important to get knowledge on the default directories that exist on most of the UNIX/Linux Operating system. The Similar Directory structure you’ll find in...
1
Add a comment...

Tech Informant

Shared publicly  - 
 
It is very important to know about Linux booting process of RHEL/CentOS 7 to troubleshoot the booting problem and also understand the Linux OS functionality. In this article, I’m going to explain about the Linux Operating system Booting process and its functionality. If know the booting process of Linux it is easy to understand the process most of the operating system run level problems.
1
Add a comment...

Tech Informant

Shared publicly  - 
 
The shell is the most important component of the operating system which is transparent to a user. It acts as an interface between the user and the operating system by intercepting the commands entered as inputs.
When the command requires the utility, the shell communicates with the kernel to run the utility, upon getting the response, the shell gives the result back to the user.
The shell is the most important component of the operating system which is transparent to a user. It acts as an interface between the user and the operating system by intercepting the commands entered as inputs. When the command requires the utility, the shell communicates with the kernel to run the utility, upon getting the response, the shell gives the result back to the user.
1
Add a comment...

Tech Informant

Shared publicly  - 
 
The NVD vulnerability report breaks 600 in the last full week of October. Dirty Cow continues on its path of bovine destruction, powering a new method for rooting Android devices that's believed to work on every version of the mobile operating system and a wide array of hardware. A week after the Dyn DDoS attack, it looks like shoddy IoT device security played a major role.
This Bug is called ‘Dirty-COW’. It is an error situation prevailed at the Linux kernel’s memory mapping system where it breaks the private memory mappings of read-only. Private mapping means when a resource is allocated by a process, we see if there are any memory leaks as none of the other processes are supposed to access this resource. In short memory mapping, breakage means modifying the original contents of a data blocks instead of writing it...
1
Add a comment...

Tech Informant

Shared publicly  - 
 
Finally, Ubuntu 16.10 Yakkety Yak stable version is released and it’s now ready to download for universal Ubuntu users. Ubuntu 16.10 Yakkety Yak will be supported for 9 months, of course, also we can use 16.04 LTS for Long-term service for next 3 years.

Canonical released Ubuntu 16.10 Yakkety Yak with Hybrid cloud operations with the new version of Unity 8 for desktops users, and few more updates with new features.
If you’re looking for version updating 16.04 to 16.10 follow this article to get information.
Finally, Ubuntu 16.10 Yakkety Yak stable version is released and it’s now ready to download for universal Ubuntu users. Ubuntu 16.10 Yakkety Yak will be supported for 9 months, of course, also we can use 16.04 LTS for Long-term service for next 3 years. Canonical released Ubuntu 16.10 Yakkety Yak with Hybrid cloud operations with the new version of Unity 8 for desktops users, and few more updates with new features. If you’re looking for version u...
1
Add a comment...

Tech Informant

Shared publicly  - 
 
It is very important to know about Linux booting process of RHEL/CentOS 7 to troubleshoot the booting problem and also understand the Linux OS functionality. In this article, I’m going to explain about the Linux Operating system Booting process and its functionality. If know the booting process of Linux it is easy to understand the process most of the operating system run level problems.
1
Add a comment...

Tech Informant

Shared publicly  - 
 
It is very important to know about Linux booting process of RHEL/CentOS 7 to troubleshoot the booting problem and also understand the Linux OS functionality. In this article, I’m going to explain about the Linux Operating system Booting process and its functionality. If know the booting process of Linux it is easy to understand the process most of the operating system run level problems.
1
Add a comment...

Tech Informant

Shared publicly  - 
 
Solus OS has its own system circumstances called Budgie which is very clean and shiny and minimalistic. it is very good for beginners who want to use Linux Operating system. Solus is an open source operating system and it is built by the volunteers and spend their time and resource to create this free open source and we are thankful to all who contributes and their affection to provide the support and to improve Solus.
1
Add a comment...

Tech Informant

Shared publicly  - 
 
This Bug is called ‘Dirty-COW’. It is an error situation prevailed at the Linux kernel’s memory mapping system where it breaks the private memory mappings of read-only. Private mapping means when a resource is allocated by a process, we see if there are any memory leaks as none of the other processes are supposed to access this resource. In short memory mapping, breakage means modifying the original contents of a data blocks instead of writing it...
1
Add a comment...

Tech Informant

Shared publicly  - 
 
Every Linux Admin should know about Logical CPU/CPU core Hot-plug in Linux System.
This is a very common task, but very important for every Linux Engineer has to know that how to do hotplugging the failed or faulty CPUs or CPU cores without rebooting the system. Another reason is when system required extra CPU Cores adding to the host for increase the better performance of applications. This is very useful for Large-scale Enterprise application service providers. Linux kernel above 2.6 version architecture supports for Hot Plug...
1
Add a comment...

Tech Informant

Shared publicly  - 
 
Cloud Computing Engine..
Google Compute Engine allows us to create Virtual machines on Google Cloud Infrastructure, this service is like an IaaS (Infrastructure as a Service). Google Compute Engine provides High performance and high scalable virtual machines, it allows us to create a large scale of virtual instances, and we can choose 1 to 32 CPU virtual cores with 208GB of High memory, 64TB of root persistent boot disk per virtual machine. Instances Starting with the f1...
1
Add a comment...
Story
Tagline
The Tree of Knowledge
Introduction
<p style="border: 0px; font-family: Vollkorn, serif; margin: 0px 0px 1.5em; outline: 0px; padding: 0px; vertical-align: baseline; orphans: 4; color: rgb(68, 68, 68);">Tech Informant- the Tree of Knowledge serves as a vessel to project our passion for technology, and sharing knowledge to my loyal readers as to what inspires me in this crazy world.</p><p style="border: 0px; font-family: Vollkorn, serif; margin: 0px 0px 1.5em; outline: 0px; padding: 0px; vertical-align: baseline; orphans: 4; color: rgb(68, 68, 68);">So, sit back, relax, and read on.</p><p style="border: 0px; font-family: Vollkorn, serif; margin: 0px 0px 1.5em; outline: 0px; padding: 0px; vertical-align: baseline; orphans: 4; color: rgb(68, 68, 68);">Tech Informant, started with a group of talented technical professionals &amp; Individual Tech Geeks with an intention of writing articles and contents and this website is designed exclusively for&nbsp;<strong style="border: 0px; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">tech freaks&nbsp;</strong>to publish practical and useful out-of-the-box articles for aspirants like you and me. It gives depth coverage of the&nbsp;technology related content and covers all the IT Technical topics that are&nbsp;related to new technology, business, and its culture.</p>
Collections Tech is following
Contact Information
Home
Phone
9866847272
Email
Address
Hyderabad, India
Tech Informant's +1's are the things they like, agree with, or want to recommend.