Navigating Life's Waters: The Dynamic Dance Between Happiness and Peace

Happiness and Peace
As widely recognized, a significant majority of individuals actively pursue happiness, while only a small fraction genuinely seeks peace. Despite their interconnected nature, peace and happiness, when considered on a broader scale, are inherently independent of external factors.
 

Happiness, essentially, is the sensation of contentment or satisfaction stemming from various actions, deeds, or events. It revolves around the notion of 'feeling good,' excluding any sense of discomfort. Its correlation lies more in the quality of life one experiences. Achievements, recognition, ambition, desires, and dreams serve as indicators for measuring happiness, but these metrics are transient and conditional. Over time, they inevitably diminish, highlighting the impermanence of happiness. Succumbing to the pressure of elusive pursuits is unwise. In the context of relationships and marriages, the misconception prevails that matrimony eradicates problems, ensuring perpetual happiness—a myth. The expectation of continuous happiness is unrealistic. Nevertheless, society often indulges in living vicariously through others' lives. It is crucial to recognize that happiness is fleeting, discouraging the relentless pursuit of a permanent state of happiness.
 

Contrary to a common perception associating peace with dullness, I posit that this is a misunderstanding; peace is, in fact, synonymous with calmness. It represents a state of inner tranquility achieved by letting go of all desires. A peaceful mind avoids excessive contemplation and refrains from analyzing every situation. Unlike happiness, peace is unconditional and defines a sense of fulfillment—an ultimate, indefinable feeling. To attain peace, one must wholly accept the present circumstances without any yearning for change. I firmly believe that once we attain peace, the ceaseless quest for happiness becomes obsolete. Peace resonates in the mind, while happiness emanates from the heart. Happiness, akin to a bucket draining the soul's water, facilitates navigating the sea of life. In contrast, peace repairs the soul's fissures, preventing leakage.
 

Upon introspection into our lives, the ephemeral nature of happiness becomes evident, contrasting with the enduring essence of peace. Happiness aligns with what is deemed best for an individual, whereas peace aligns with what is right. Happiness might involve indulging in sweets and fried food, while peace is synonymous with maintaining fitness and health. Happiness could manifest in smoking a cigarette, whereas peace is embodied in possessing clear lungs. Acting against one's better judgment for momentary joy is associated with happiness, whereas acting against perceived limitations for the greater good defines peace. Long-term happiness, if it exists, is inseparable from a sense of inner peace. The path to peace is not a journey but a state in itself. Ultimately, peace should be the ultimate destination for everyone

happiness peace life balance inner fulfillment joyful living
A
@ 28/12/2023

100 Commonly Used Idioms with Meanings: Enhance Your English Vocabulary

1. A piece of cake (Something that is very easy)

 

2. Let the cat out of the bag (To reveal a secret)

 

3. Break a leg (Good luck)

 

4. Hit the nail on the head (To say something accurately or correctly)

 

5. Barking up the wrong tree (To pursue the wrong course of action or to have a mistaken belief)

 

6. Bite the bullet (To face a difficult or unpleasant situation with courage)

 

7. Kill two birds with one stone (To accomplish two things with a single action)

 

8. Don't cry over spilled milk (Don't worry about something that has already happened and cannot be changed)

 

9. Kick the bucket (To die)

 

10. On cloud nine (To be extremely happy or joyful)

 

11. The ball is in your court (It is now your turn to take action or make a decision)

 

12. A dime a dozen (Very common and easy to find)

 

13. Cry wolf (To give a false alarm)

 

14. Go the extra mile (To put in extra effort or do more than what is expected)

 

15. A penny for your thoughts (A request to know what someone is thinking)

 

16. Under the weather (Feeling sick or unwell)

 

17. Out of the blue (Unexpectedly or without any warning)

 

18. You can't judge a book by its cover (You can't make assumptions based on appearances alone)

 

19. Cut corners (To do something poorly or take shortcuts in order to save time or money)

 

20. In the same boat (Facing the same situation or challenge)

 

21. All ears (Paying full attention and listening carefully)

 

22. Break the ice (To overcome initial social tension or awkwardness)

 

23. Butterflies in my stomach (Feeling nervous or anxious)

 

24. Cross that bridge when you come to it (To deal with a problem when it actually happens, not beforehand)

 

25. Get a taste of your own medicine (To experience the same negative treatment that one has given to others)

 

26. Hit the jackpot (To achieve a great success or win a significant prize)

 

27. Keep your chin up (To remain cheerful or optimistic in difficult times)

 

28. Let sleeping dogs lie (To avoid discussing or interfering with a situation)

 

29. Make a long story short (To summarize or give a shortened version of a story or explanation)

 

30. On thin ice (In a risky or precarious situation)

 

31. Put all your eggs in one basket (To risk everything on a single opportunity)

 

32. The best of both worlds (To have the advantages or benefits of two different things at the same time)

 

33. Take it with a grain of salt (To not completely believe or trust something)

 

34. Time flies (Time passes quickly)

 

35. A watched pot never boils (Waiting for something to happen can make it feel like it takes longer)

 

36. Actions speak louder than words (What someone does is more important than what they say)

 

37. Beggars can't be choosers (When you are in need, you must accept whatever help you can get)

 

38. Birds of a feather flock together (People with similar interests or characteristics tend to associate with each other)

 

39. Don't count your chickens before they hatch (Don't make plans based on something that may not happen)

 

40. Every cloud has a silver lining (There is something positive or hopeful in every difficult situation)

 

41. Give someone the cold shoulder (To intentionally ignore or be unfriendly towards someone)

 

42. Hit the ground running (To start a project or task immediately and with great enthusiasm)

 

43. Keep your fingers crossed (To hope for good luck or a positive outcome)

 

44. Let bygones be bygones (To forget about past disagreements or conflicts)

 

45. Rome wasn't built in a day (Big achievements take time and effort)

 

46. Shake a leg (To hurry up or move quickly)

 

47. The early bird catches the worm (Being early or punctual gives you an advantage)

 

48. When it rains, it pours (Problems or difficulties often come all at once)

 

49. You scratch my back, I'll scratch yours (Mutual assistance or cooperation)

 

50. A picture is worth a thousand words (An image can convey a complex idea or message)

 

51. All that glitters is not gold (Things that appear attractive or valuable may not be what they seem)

 

52. Beat around the bush (To avoid addressing an issue directly)

 

53. Curiosity killed the cat (Being too inquisitive can lead to trouble)

 

54. Don't put all your eggs in one basket (To not risk everything on a single opportunity)

 

55. Every dog has its day (Everyone will have a chance to be successful or fortunate)

 

56. Fish out of water (Feeling uncomfortable or out of place in a particular situation)

 

57. Haste makes waste (Rushing or acting too quickly can lead to mistakes)

 

58. Ignorance is bliss (Not knowing about a problem can make you happier)

 

59. It's a piece of cake (It's very easy)

 

60. Jump on the bandwagon (To join or support something that is already popular)

 

61. Like a fish out of water (Feeling uncomfortable or out of place in a particular situation)

 

62. Misery loves company (People who are unhappy often seek out others who are also unhappy)

 

63. No pain, no gain (You have to work hard and endure difficulties to achieve success)

 

64. Out of sight, out of mind (If something is not visible, it is easily forgotten)

 

65. Practice makes perfect (Repeating an activity helps you improve)

 

66. Put the cart before the horse (To do things in the wrong order)

 

67. Saved by the bell (Rescued from a difficult situation at the last moment)

 

68. The grass is always greener on the other side (People tend to be dissatisfied with their own situation and think others have it better)

 

69. The pen is mightier than the sword (Words and communication have more power and influence than violence)

 

70. Two heads are better than one (Collaboration and teamwork lead to better results)

 

71. When pigs fly (Something that is highly unlikely to happen)

 

72. A watched kettle never boils (Impatiently waiting for something makes it seem to take longer)

 

73. Actions speak louder than words (What someone does is more important than what they say)

 

74. All that glitters is not gold (Things that appear attractive or valuable may not be what they seem)

 

75. An apple a day keeps the doctor away (Eating healthily helps prevent illness)

 

76. Beauty is in the eye of the beholder (Different people have different opinions on what is beautiful)

 

77. Better late than never (It's better to do something late than to not do it at all)

 

78. Blood is thicker than water (Family relationships are stronger than other relationships)

 

79. Don't bite the hand that feeds you (Don't harm or be ungrateful towards someone who helps or supports you)

 

80. Don't judge a book by its cover (Don't make assumptions based on appearances alone)

 

81. Don't put all your eggs in one basket (To not risk everything on a single opportunity)

 

82. Every cloud has a silver lining (There is something positive or hopeful in every difficult situation)

 

 

83. Fortune favors the bold (Taking risks can lead to success)

 

 

84. Give the benefit of the doubt (To trust someone's good intentions despite some doubts)

 

85. Go the whole nine yards (To put in maximum effort or complete a task thoroughly)

 

86. Haste makes waste (Rushing or acting too quickly can lead to mistakes)

 

87. It takes two to tango (Both parties are responsible for a situation or conflict)

 

88. Know the ropes (To be familiar with the details or procedures of something)

 

89. Let sleeping dogs lie (To avoid discussing or interfering with a situation)

 

90. Money doesn't grow on trees (Money is not easily obtained)

 

91. Nothing ventured, nothing gained (You have to take risks in order to achieve something)

 

92. Off the top of my head (Without thinking or planning in advance)

 

93. Rome wasn't built in a day (Big achievements take time and effort)

 

94. The devil's advocate (Someone who presents counterarguments or alternative viewpoints)

 

95. The early bird catches the worm (Being early or punctual gives you an advantage)

 

96. There's no smoke without fire (There is usually some truth to rumors or suspicions)

 

97. Time flies (Time passes quickly)

 

98. When in Rome, do as the Romans do (To adopt the customs or behavior of a particular place)

 

99. You can't have your cake and eat it too (You can't have or do two conflicting things at once)

 

100. You can't make an omelette without breaking eggs (Some sacrifices or negative consequences are necessary to achieve a desired outcome)

 


Please note that the interpretations of idioms may vary slightly depending on context and usage.

common idioms idioms meanings popular idioms
A
@ 08/06/2023

Unraveling the World of NFTs: Exploring the Revolutionary Potential

In recent years, a groundbreaking technology has taken the digital world by storm, transforming the way we perceive and trade digital assets. Non-Fungible Tokens, or NFTs, have emerged as a revolutionary force, disrupting traditional notions of ownership, authenticity, and value. From artwork and collectibles to virtual real estate and virtual goods, NFTs have ushered in a new era of digital ownership. In this comprehensive guide, we delve into the intricacies of NFTs, exploring their origins, mechanics, and the impact they are having across various industries. Join us as we unravel the world of NFTs and discover their transformative potential.

1: Understanding NFTs

1.1 What are NFTs?
Non-Fungible Tokens (NFTs) are unique digital assets that are indivisible and cannot be exchanged on a one-to-one basis like cryptocurrencies. Unlike Bitcoin or other cryptocurrencies, which are fungible, NFTs are distinguished by their distinct properties and characteristics.


1.2 The Difference Between Fungible and Non-Fungible Assets
Fungible assets, such as cryptocurrencies, can be replaced with something of equal value. Non-fungible assets, on the other hand, are unique and cannot be replicated or interchanged. NFTs represent ownership or proof of authenticity of a particular digital asset.

 

1.3 How NFTs Utilize Blockchain Technology
NFTs leverage blockchain technology, a decentralized and transparent digital ledger. Blockchain ensures the authenticity, provenance, and scarcity of NFTs, creating a trustless environment for digital asset ownership.

 

1.4 Exploring the Interplay of Scarcity and Value in NFTs
Scarcity plays a vital role in determining the value of NFTs. Limited edition NFTs or those associated with renowned creators or iconic moments tend to command higher prices due to their exclusivity and desirability.

 

1.5 NFT Standards: ERC-721 and ERC-1155
The ERC-721 and ERC-1155 standards are widely adopted in the NFT ecosystem. ERC-721 provides a blueprint for creating unique NFTs, while ERC-1155 enables the creation of both fungible and non-fungible tokens, allowing for greater flexibility in tokenizing digital assets.

 

 

2: NFTs and the Art World
 

2.1 The Rise of Digital Art and NFTs
Digital art has flourished with the advent of NFTs, providing artists with new opportunities for monetization and ownership. NFTs allow artists to tokenize their creations, proving authenticity and enabling direct sales to collectors.

 

2.2 Tokenizing Art: The Process of Creating NFTs
Tokenizing art involves minting a unique NFT representing a specific artwork. Artists can attach additional metadata, such as the creation date, artist information, and provenance, enhancing the value and story behind the artwork.

 

2.3 NFT Marketplaces: Where Art and Technology Converge
NFT marketplaces serve as platforms for buying, selling, and trading digital assets. These marketplaces provide a space for artists, collectors, and enthusiasts to discover, showcase, and transact NFTs, fostering a vibrant ecosystem.

 

2.4 NFTs as a Solution for Artists and Content Creators
NFTs empower artists by allowing them to retain ownership rights and earn royalties on secondary sales. This newfound control over their work revolutionizes the art industry and opens up opportunities for artists to build sustainable careers.

 

2.5 NFTs and the Evolution of Copyright and Intellectual Property Rights
NFTs present challenges and opportunities in the realm of copyright and intellectual property rights. Smart contracts embedded in NFTs can automate royalty payments and ensure artists receive compensation for the use of their work.

 

 

3: NFTs in Gaming and Virtual Worlds
 

3.1 NFTs and Virtual Real Estate: Redefining Digital Ownership
NFTs have introduced the concept of virtual real estate, allowing users to own and trade digital land or virtual spaces. Virtual worlds built on blockchain technology enable unique experiences and economies, creating a new frontier for innovation.

 

3.2 NFTs in Gaming: Unlocking True Ownership and Value
NFTs have the potential to revolutionize the gaming industry by granting players true ownership of in-game assets. Players can buy, sell, and trade NFT-based items, providing a more immersive and player-centric gaming experience.

 

3.3 Play-to-Earn: How NFTs are Revolutionizing Gaming Economies
Play-to-earn models leverage NFTs to reward players with valuable digital assets for their in-game achievements. This innovative approach disrupts traditional gaming economies by allowing players to earn real-world value from their gaming skills.

 

3.4 Blockchain-Based Virtual Worlds: The Metaverse of NFTs
NFTs are integral to the development of the metaverse, a virtual reality space where users can interact with each other and digital assets. Blockchain-based virtual worlds powered by NFTs offer vast possibilities, ranging from social interactions to immersive experiences.

 

 

4: NFTs and Collectibles
4.1 NFT Collectibles: From Trading Cards to Virtual Pets
NFTs have revitalized the world of collectibles, digitizing trading cards, virtual pets, and other cherished items. Collectors can now own and trade digital collectibles securely, enjoying the benefits of provenance and scarcity.

 

4.2 The Digital Renaissance of Collectibles
The digital realm has unleashed a renaissance in collecting, democratizing access to rare and valuable items. NFTs bring the excitement of collecting to a global audience, eliminating geographical barriers and enabling new forms of curation and exhibition.

 

4.3 The Role of NFTs in Verification and Provenance
NFTs provide an immutable record of an asset's history, facilitating verification and provenance. Collectibles authenticated through blockchain technology gain credibility and can be traced back to their original creators or owners.

 

4.4 NFTs and the Democratization of Collecting
NFTs have made collecting more inclusive by lowering entry barriers and expanding the scope of what can be collected. Anyone can participate in the world of digital collectibles, fostering a diverse and vibrant community.

 

 

5: NFTs Beyond Art, Gaming, and Collectibles
 

5.1 NFTs and Music: Transforming the Music Industry
NFTs offer musicians new avenues for monetization, allowing them to sell unique experiences, merchandise, and rights to their music directly to fans. NFTs empower artists and reshape the music industry's revenue model.

 

5.2 Tokenizing Real-World Assets with NFTs
NFTs have the potential

to revolutionize ownership of real-world assets, such as real estate, luxury goods, and intellectual property. Tokenizing these assets on the blockchain can enhance liquidity, streamline transactions, and simplify ownership transfer.

 

5.3 NFTs and the Future of Identity and Authentication
NFTs can play a crucial role in identity verification, digital identity, and authentication. By leveraging blockchain technology, NFTs can enhance security, privacy, and trust in digital interactions.

 

5.4 NFTs in Sports: Changing the Game
NFTs are making waves in the sports industry, allowing fans to own unique moments, collectibles, and even fractional ownership of sports teams. NFTs provide new revenue streams for athletes and teams, while fans gain unprecedented engagement opportunities.

 

Conclusion
As we reach the end of our comprehensive journey into the world of NFTs, we can see the tremendous potential and impact they hold across various industries. NFTs have disrupted the traditional boundaries of ownership and created exciting new opportunities for creators, collectors, and investors alike. The digital revolution propelled by NFTs is only in its infancy, and the future promises even more innovative applications and advancements. Embrace the power of NFTs and prepare for a paradigm shift in the way we perceive, trade, and own digital assets.

NFTs Non-Fungible Tokens digital assets blockchain virtual worlds tokenization virtual real estate digital art NFT marketplaces intellectual property real-world assets future of NFTs
A
@ 26/05/2023

The Secret of Becoming Truly Rich: Unveiling the True Nature of Money

In our relentless pursuit of wealth and prosperity, we often ponder upon the secret behind becoming truly rich. But before delving into the depths of this secret, it is imperative to understand the essence of money itself. What is money? Is it merely a medium of exchange or does it hold a deeper significance? Join us as we unravel the mysteries surrounding money and reveal the key to unlocking true riches.
 

1.  Money as a Medium of Exchange
Money, in its simplest form, serves as a medium of exchange. It enables the smooth flow of goods and services within an economy, facilitating transactions and trade. Money acts as a universally accepted tool to measure the value of goods and services, providing a common ground for economic interactions. This essential function of money ensures that individuals can exchange their labor and expertise for financial compensation, creating a system of economic prosperity.
 

2. The Power of Money
Beyond its role as a medium of exchange, money possesses immense power and influence in society. It grants individuals access to resources, opportunities, and experiences that would otherwise be inaccessible. The accumulation of wealth affords individuals a certain level of freedom, enabling them to make choices and shape their lives according to their desires. Money provides a means to meet basic needs, access quality education, secure healthcare, and improve one's standard of living. Moreover, money can be leveraged to support philanthropic endeavors, driving positive change in communities and making a lasting impact.
 

3. The Illusion of Wealth
However, it is crucial to recognize that wealth and true richness are not synonymous. The pursuit of money alone can lead individuals astray, blurring their understanding of what it means to be truly rich. Society often equates wealth with happiness, success, and fulfillment, but this equation is often flawed. True richness encompasses aspects beyond material possessions, encompassing emotional well-being, meaningful relationships, personal growth, and contribution to society. It is essential to look beyond the illusion of wealth and uncover the deeper layers of richness that lie within.
 

4. The Secret of True Richness
To become truly rich, one must embark on a journey that extends beyond the mere accumulation of wealth. The secret lies in finding a balance between financial prosperity and a fulfilling life. It involves cultivating a mindset that values experiences, personal growth, and the well-being of oneself and others. True richness is about living a purpose-driven life that aligns with one's values and aspirations. It is about finding fulfillment in pursuing one's passions, nurturing meaningful relationships, and making a positive impact on the world.


5. Pursuing Wealth with Purpose
To pursue wealth with purpose, it is essential to set clear financial goals aligned with one's values and aspirations. Develop a holistic approach that encompasses financial literacy, investment strategies, and entrepreneurship while emphasizing personal well-being, philanthropy, and community involvement. True richness is found in striking a harmonious balance between financial success and meaningful, purpose-driven life. By making conscious decisions about how to earn, spend, and invest money, individuals can create a positive ripple effect in their own lives and the lives of others.
 

6. The Importance of Financial Education
One key aspect of unlocking true riches is gaining financial education. Understanding money management, budgeting, investing, and debt management is crucial for long-term financial success. By developing financial literacy skills, individuals can make informed decisions and avoid common pitfalls that may hinder their path to true richness. Financial education empowers individuals to take control of their finances, make sound investment choices, and build wealth wisely.
 

7. Cultivating a Wealth Mindset
A wealth mindset goes beyond the accumulation of money; it involves adopting beliefs and attitudes that promote abundance, gratitude, and generosity. Cultivating a positive mindset can attract opportunities and foster a sense of prosperity in all aspects of life. By focusing on abundance rather than scarcity, individuals open themselves up to possibilities and approach wealth creation with an empowered mindset.
 

8. Embracing Holistic Richness
True richness extends beyond financial abundance. It encompasses emotional well-being, physical health, fulfilling relationships, personal growth, and a sense of purpose. Embracing holistic richness means prioritizing self-care, investing in personal development, nurturing meaningful connections, and engaging in activities that bring joy and fulfillment. By aligning financial goals with overall well-being, individuals can create a life of abundance and happiness.


Conclusion
Money, though instrumental in shaping our lives, should not be the sole measure of richness. It is through understanding the true nature of wealth that we can uncover the secret to becoming truly rich. By embracing a well-rounded approach that considers personal growth, meaningful relationships, and a positive impact on society, we unlock the potential for a life filled with true richness and fulfillment. So, let us embark on this journey together, discovering the secret of true wealth and creating a life of abundance, purpose, and happiness. Remember, true richness lies not just in what we have but in who we become.

becoming truly rich true nature of money secrets to wealth wealth mindset financial prosperity holistic richness
A
@ 20/05/2023

The Truth About Freelancing: What You Need to Know Before You Start

Freelancing has become an increasingly popular career choice in recent years, with many people seeing it as an opportunity to work for themselves, be their own boss, and enjoy the flexibility of being able to work from anywhere. However, the reality of freelancing is often quite different from the image that people have in their minds. In this article, we'll explore what it takes to succeed as a freelancer and provide some guidance for those who are considering this career path.

1. Freelancing is Hard Work:
While freelancing can be incredibly rewarding, it's also hard work. As a freelancer, you are responsible for finding your own clients, managing your own projects, and handling all of the administrative tasks that come with running a business. This can be overwhelming for those who are used to working in a more structured environment.


2. Freelancing Requires Expertise:
To be successful as a freelancer, you need to have a specific skill set that you can offer to clients. Whether it's writing, web development, design, or something else, you need to be an expert in your field and be able to deliver high-quality work that meets your clients' needs. Simply having a general interest in freelancing or a desire to work from home is not enough.


3. Freelancing is Competitive:
The freelance market is highly competitive, with many talented individuals vying for the same jobs. To stand out from the crowd, you need to have a strong portfolio, excellent communication skills, and a willingness to go above and beyond for your clients.
 

4. Freelancing Requires Discipline:
As a freelancer, you need to be self-motivated and disciplined. You won't have a boss to hold you accountable or a set schedule to follow, so it's up to you to stay on track and meet your deadlines.
 

5. Freelancing is Not a Get-Rich-Quick Scheme:
While it's possible to earn a good living as a freelancer, it's not a get-rich-quick scheme. It takes time and effort to build a successful freelancing business, and there may be periods of uncertainty or low income along the way.


6. Freelancing Requires Business Skills:
To be successful as a freelancer, you need to have some basic business skills. This includes things like invoicing, bookkeeping, and marketing. You don't necessarily need to be an expert in these areas, but you do need to have a basic understanding of how they work.
 

7. Freelancing is not for Everyone:
Finally, it's important to remember that freelancing is not for everyone. Some people thrive in a structured work environment with set hours and clear expectations, while others prefer the freedom and flexibility of freelancing. If you're considering freelancing, it's important to be honest with yourself about whether it's the right fit for your personality and work style.


In conclusion, freelancing can be a rewarding and fulfilling career choice for those who have the skills, discipline, and business acumen to succeed. However, it's important to understand that freelancing is not a quick and easy path to success. If you're considering freelancing, take the time to research the industry, develop your skills, and build a strong portfolio before making the leap. With hard work and determination, you can achieve success as a freelancer.

freelancing freelance career get-rich-quick discipline expertise preparation
A
@ 30/04/2023

How to Optimize a Website for SEO: A Comprehensive Guide

Search Engine Optimization (SEO) is the practice of improving the quantity and quality of traffic to your website through organic search engine results. SEO is an essential aspect of website optimization that helps to drive more traffic to your website, boost your online visibility, and improve your website's overall performance. In this article, we'll explore some best practices for optimizing your website for SEO.


1. Conduct Keyword Research:
The first step in optimizing your website for SEO is to conduct keyword research. Keywords are the search terms that users type into search engines to find content related to their interests. By identifying the most relevant and popular keywords for your website, you can optimize your content to rank higher in search engine results pages (SERPs). Tools like Google Keyword Planner or Ahrefs can help you conduct keyword research.


2. Optimize Your Website Content:
Once you've identified your target keywords, the next step is to optimize your website content. This includes your website's title tags, meta descriptions, header tags, and page content. Make sure to include your target keywords in these areas, but also ensure that the content reads naturally and provides value to your readers.
 

3. Use Descriptive URLs:
Descriptive URLs are URLs that include keywords and accurately describe the content of the page. For example, instead of using a generic URL like "
https://saljaf.com/page1," use a descriptive URL like "https://saljaf.com/post/object-oriented-programming-opp-concept-in-a-simple-way" This helps search engines understand the content of your pages and can improve your website's overall SEO.


4. Improve Website Speed:
Website speed is an important factor in SEO. Slow websites can negatively impact user experience and increase bounce rates, which can lower your search engine rankings. Use tools like Google PageSpeed Insights or GTmetrix to test your website speed and identify areas for improvement.


5. Mobile Optimization:
Mobile optimization is becoming increasingly important in SEO. Google now uses mobile-first indexing, which means that it primarily looks at the mobile version of a website to determine search rankings. Ensure that your website is optimized for mobile devices, with responsive design and fast load times.


6. Build Quality Backlinks:
Backlinks are links from other websites that point to your website. High-quality backlinks from reputable websites can significantly improve your website's SEO. Reach out to other websites in your industry and ask if they would be willing to link to your content.


7. Use Social Media:
Social media can be a powerful tool for improving your website's SEO. By sharing your content on social media, you can increase its visibility and attract more backlinks to your website.

 

SEO search engine optimization keyword research content optimization descriptive URLs website speed mobile optimization backlinks website traffic social media.
A
@ 30/04/2023

The Ultimate Guide to Creating a Productive Routine for Software Developers

As a software developer, you know that working on complex projects can be challenging. With so many tasks to complete and deadlines to meet, it's easy to get overwhelmed and lose track of your priorities. To stay on top of your work and achieve your goals, it's essential to create a routine that works for you. Here's a guide to help you create the perfect routine for your workday:

Start with a healthy morning routine:

 

  1. 1. A healthy morning routine sets the tone for your day. Wake up early, have a nutritious breakfast, and exercise to get your blood flowing. You can also add mindfulness practices like meditation or yoga to reduce stress and improve focus. Starting your day off right will help you stay energized and focused throughout the day.

 

2. Prioritize your work: Plan your day ahead and prioritize your work based on importance and urgency. Set achievable goals and schedule your work throughout the day. Use tools like project management software to help you stay organized and track your progress. Break down complex projects into smaller, more manageable tasks so you can focus on one thing at a time.

 

3. Divide your work into smaller tasks: Breaking down complex projects into smaller, more manageable tasks will help you stay focused and avoid feeling overwhelmed. Each task should be specific and measurable, so you can track your progress and feel a sense of accomplishment when you complete it. Use tools like Trello or Asana to help you organize your tasks and keep track of your progress.

 

4. Take breaks: Taking breaks is essential to staying focused and productive. Taking a quick walk, stretching, or simply taking a few deep breaths can help you refresh your mind and come back to your work with renewed focus. Use the Pomodoro Technique, where you work for 25 minutes and then take a 5-minute break, to help you stay focused and energized throughout the day.

 

5. Learn and Grow: Devote time each day to learn new technologies and programming languages. Attend webinars, read blogs, and take online courses to stay up to date with industry trends. Learning new skills will not only help you stay relevant in your field, but it will also help you stay motivated and engaged in your work.

 

6. Maintain a healthy work-life balance: Burnout can lead to a decrease in productivity and creativity. Make sure to allocate time for your family, hobbies, and other interests to avoid burnout. Take time to relax and recharge, so you can come back to your work with renewed energy and enthusiasm.

 

7. End the day with reflection: Reflect on your day, review your accomplishments, and plan for the next day. This will help you stay organized and focused. Use a journal or a planner to write down your thoughts and goals for the next day, so you can start your day off on the right foot.

 

In conclusion, creating a routine that works for you can help you stay productive and achieve your goals as a software developer. Incorporate healthy habits like exercise, breaks, and learning, and remember to maintain a healthy work-life balance. With the right routine, you'll be able to maximize your productivity and take your career to the next level.

software developer routine productivity time management project management task management goal setting prioritization breaks learning work-life balance mindfulness Pomodoro Technique burnout reflection
A
@ 29/04/2023

What is the use and difference between --save and --save-dev in NPM?

NPM, or Node Package Manager, is a popular tool for managing dependencies in Node.js applications. When you use NPM to install a package, it is saved in the node_modules directory and its metadata is saved in the package.json file. This file contains information about the packages that your project depends on, including their version numbers and any other relevant metadata.
 

The npm install command is used to install packages, and it provides several options that can be used to customize how packages are installed. Two of the most commonly used options are --save and --save-dev. These options specify whether a package should be installed as a production dependency or as a development dependency. In this article, we'll explain the difference between these two options and provide examples of when each should be used.

What is a Production Dependency?

A production dependency is a package that is required for your application to run correctly. These packages are installed when your application is deployed and are used to provide core functionality. For example, if you are building a web application using Express.js, you will need to install Express.js as a production dependency:


<code> npm install --save express</code>
 

This command installs Express.js and adds it to the dependencies section of the package.json file. When you deploy your application, NPM will install all of the packages listed in the dependencies section.

 

What is a Development Dependency?

A development dependency is a package that is only required during development. These packages are not necessary for your application to run correctly, but they may be required for testing, building, or debugging your application. For example, if you are using Mocha as your test runner, you will need to install Mocha as a development dependency:

<code>npm install --save-dev mocha</code>

 

This command installs Mocha and adds it to the devDependencies section of the package.json file. When you run your tests, NPM will install all of the packages listed in the devDependencies section.

 

When to Use --save vs --save-dev

Knowing when to use --save vs --save-dev is important for keeping your project organized and ensuring that your dependencies are managed correctly. Here are some general guidelines:

Use --save for Production Dependencies

Use --save when installing packages that are required for your application to run correctly. These packages should be production dependencies and should be installed in the dependencies section of the package.json file.

 

For example, if you are building a web application using Express.js, you should use --save to install Express.js:

<code>npm install --save express</code>

 

Use --save-dev for Development Dependencies

Use --save-dev when installing packages that are only required during development, such as test runners or build tools. These packages should be installed in the devDependencies section of the package.json file.

 

For example, if you are using Mocha as your test runner, you should use --save-dev to install Mocha:

<code>npm install --save-dev mocha</code>
 

Benefits of Using --save and --save-dev

Using --save and --save-dev options provide several benefits:

 

Better Dependency Management

Using --save and --save-dev options allows developers to manage project dependencies more efficiently. By separating production and development dependencies, it is easier to keep track of which packages are required for the application to run and which packages are only needed during development.

npm --sav-dev --dev --save package-dependency dependency
A
@ 23/04/2023

Top 7 Technology Trends to Watch Out for in 2023

In today's world, technology is advancing at a rapid pace, with new developments and innovations emerging every day. As we look ahead to 2023, there are several technology trends that are poised to have a significant impact on our lives. Here are the top 7 technology trends to watch out for in 2023:

 

  1. 1. Quantum Computing
  2. Quantum computing has the potential to revolutionize computing power and solve problems that are currently impossible for traditional computers. With its ability to perform calculations at a speed that is orders of magnitude faster than classical computers, quantum computing has the potential to transform industries such as finance, healthcare, and cybersecurity.
  3.  
  4. 2. Augmented Reality
  5. Augmented reality (AR) technology is already making waves in industries such as gaming and entertainment. In 2023, we can expect to see more sophisticated AR technology that allows for even more immersive experiences, from training simulations for medical professionals to virtual fashion try-ons.

 

3. Artificial Intelligence

AI is already being used to automate tasks, personalize experiences, and solve complex problems. In 2023, we can expect to see even more advanced AI systems that can perform tasks such as natural language processing, decision-making, and problem-solving. These systems will have applications in fields such as healthcare, finance, and transportation.

 

4. Blockchain

Blockchain technology is already being used for cryptocurrency transactions, but its potential extends far beyond that. In 2023, we can expect to see more widespread adoption of blockchain technology in industries such as supply chain management, real estate, and healthcare. Blockchain's ability to provide secure and transparent record-keeping has the potential to revolutionize these industries.

 

5. Internet of Things (IoT):

The IoT refers to the network of connected devices and objects that can communicate with each other. In 2023, we can expect to see more advanced IoT systems that can collect and analyze data to improve efficiency and productivity in industries such as manufacturing, agriculture, and transportation. These systems will be powered by technologies such as 

5G and edge computing.

 

6. 5G:

5G is the next generation of mobile network technology, which promises faster download and upload speeds, lower latency, and greater capacity. In 2023, we can expect to see more widespread adoption of 5G technology, which will enable the development of new applications and services such as autonomous vehicles, smart cities, and remote surgery.

 

7. Edge Computing:

Edge computing refers to the processing and analysis of data at the edge of the network, rather than in a centralized location. This technology has the potential to improve response times, reduce latency, and increase security, making it particularly important for applications that require real-time data processing, such as autonomous vehicles and smart cities.

 

In conclusion, the technology trends of 2023 promise to have a significant impact on our lives, from the way we work and communicate to the way we live and play. By staying informed and keeping up with the latest developments, we can prepare ourselves for the exciting technological advancements that lie ahead.

technology tech trend blockchain artificial intelligence 5G AR VR IoT
A
@ 30/03/2023

The Benefits of Strength Training for Women

Strength training
Strength training, also known as resistance training, involves exercises that use weights, resistance bands, or bodyweight to build strength, power, and endurance. While it has traditionally been associated with male bodybuilders and athletes, strength training is becoming increasingly popular among women for its many health benefits.

 

In this post, we'll explore the top benefits of strength training for women and provide tips on how to get started.

 

  1. 1. Increased Muscle Mass: 
    One of the most obvious benefits of strength training is increased muscle mass. Contrary to popular belief, this doesn't mean that women will become bulky or masculine. In fact, women have lower levels of testosterone than men, which means they're less likely to bulk up.
  2.  

Instead, strength training helps to build lean muscle mass, which can increase metabolic rate and burn more calories throughout the day. This can be especially beneficial for women who are trying to lose weight or maintain a healthy body composition.

  1.  
  2. 2. Improved Bone Density:
  3. Another major benefit of strength training for women is improved bone density. As women age, their bones become more susceptible to fractures and osteoporosis, a condition in which bones become weak and brittle.
  4.  

Strength training has been shown to increase bone density and reduce the risk of osteoporosis. By putting stress on the bones, strength training helps to stimulate the growth of new bone tissue, making bones stronger and less prone to fractures.

 

  1. 3. Better Metabolic Function:
  2. Strength training can also improve metabolic function, which can help to prevent or manage chronic diseases such as diabetes, heart disease, and hypertension.
  3.  

By building muscle mass, strength training can increase insulin sensitivity, which means that the body can more effectively regulate blood sugar levels. Strength training has also been shown to reduce inflammation and improve lipid profiles, which can lower the risk of heart disease.

 

  1. 4. Enhanced Athletic Performance:
  2. Strength training can also enhance athletic performance, allowing women to perform better in sports and other physical activities. By building strength and power, strength training can improve speed, agility, and endurance.
  3.  

Strength training can also help to prevent injuries by strengthening muscles and joints, which can improve balance and stability.

 

  1. 5. Increased Confidence:
  2. Finally, strength training can increase confidence and self-esteem in women. By achieving new personal records and building strength, women can feel more empowered and capable in all areas of life.
  3.  

Tips for Getting Started:

If you're new to strength training, it's important to start slowly and gradually increase the intensity and frequency of your workouts. Consider working with a personal trainer or fitness professional who can help you develop a safe and effective strength training program.

 

You can also start with bodyweight exercises, such as squats, lunges, and push-ups, and gradually incorporate weights or resistance bands as you become more comfortable. Aim to strength train at least two to three times per week, and allow for rest and recovery between workouts.

 

In conclusion, strength training offers numerous benefits for women, including increased muscle mass, improved bone density, better metabolic function, enhanced athletic performance, and increased confidence. By incorporating strength training into your fitness routine, you can improve your overall health and well-being.

health training for women self-esteem workout fitness routine well-being
A
@ 29/03/2023

Unit Testing in Laravel

Introduction

Laravel is a popular PHP framework for building web applications. One of the key features of Laravel is its support for testing. Testing is an essential part of software development, and Laravel makes it easy to write and run unit tests.

 

Unit testing is the process of testing individual units or components of a software application to ensure that they work as expected. In Laravel, unit tests are typically written using PHPUnit, a popular testing framework for PHP.

 

Why Unit Testing is Important

 

Unit testing is important for several reasons:

  1. 1. It helps ensure that the application works as expected.
  • 2. It catches bugs and errors early in the development process, making them easier and cheaper to fix.
  • 3. It helps developers write better code by encouraging them to write modular, testable code.
  • 4. It provides a safety net for refactoring, allowing developers to make changes to the codebase with confidence.

 

Writing Unit Tests in Laravel

Writing unit tests in Laravel is easy and straightforward. Here are the basic steps:

a. Create a new test file: Laravel provides a php artisan make:test command to create a new test file. This command creates a new test class in the tests directory.

 

b. Write a test method: In the test class, write a test method that tests a specific feature or functionality of the application.

 

c. Use assertions to check for expected behavior: Inside the test method, use assertions to check for the expected behavior of the code being tested. PHPUnit provides a wide range of assertion methods for different types of tests.

 

d. Run the test: Once the test method is written, run the test using the php artisan test command. Laravel will run all the tests in the tests directory.

 

e. Refactor and repeat: If the test fails, fix the code and run the test again. If the test passes, move on to the next feature or functionality and repeat the process.

 

Example: Testing a Laravel Controller


Here's an example of how to write a unit test for a Laravel controller:


namespace Tests\Unit;

use App\Http\Controllers\HomeController;
use Tests\TestCase;

class HomeControllerTest extends TestCase
{
   public function testIndex()
   {
       $controller = new HomeController();

       $response = $controller->index();

       $this->assertEquals('Welcome to the home page!', $response->getContent());
   }
}

 

In this example, we're testing the index method of the HomeController. We create a new instance of the controller, call the index method, and use an assertion to check that the response content matches the expected value.

 

Best Practices for Unit Testing in Laravel

  1. Here are some best practices for unit testing in Laravel:
  2. Write tests for all new features and functionality.
  3. Test both positive and negative cases.
  4. Use descriptive test names that clearly explain what the test is testing.
  5. Keep tests small and focused on testing a single feature or functionality.
  6. Use mocks and stubs to isolate the code being tested from its dependencies.
  7. Use fixtures to set up the test data.
  8. Run tests frequently, preferably as part of a continuous integration (CI) process.
  9.  

Conclusion

Unit testing is an essential part of software development, and Laravel makes it easy to write and run unit tests. By following best practices and writing comprehensive tests, you can ensure that your application works as expected and catch bugs and errors early in the development process.
 

unit testing testing software testing laravel testing in laravel
A
@ 29/03/2023

Creative thinking - how to get out of the box and generate ideas?

Creative thinking - how to get out of the box and generate ideas? Creative thinking is a skill that can be developed and improved with practice. Sometimes we get stuck in the same thought patterns and find it difficult to generate new and innovative ideas. However, by adopting certain techniques and approaches, we can train our brains to think creatively and generate fresh ideas. In this article, we'll explore some tips and techniques for getting out of the box and generating ideas.

 

1. Brainstorming

Brainstorming is a classic technique for generating ideas. It involves gathering a group of people and having them share ideas freely without judgment or criticism. The goal is to generate as many ideas as possible, regardless of their quality or feasibility. Once you have a large list of ideas, you can then evaluate and refine them. The key to successful brainstorming is to create a non-judgmental environment where everyone feels comfortable sharing their ideas.

 

  1. 2. Mind Mapping

Mind mapping is another technique that can help to generate new ideas. It involves creating a visual representation of your ideas, with the main idea in the center and related ideas branching out from it. This technique can help you to see connections between different ideas and generate new ones.

  1.  
  2. 3. Take a Different Perspective

Sometimes, simply changing your perspective can help you to generate new ideas. For example, if you're working on a problem related to your business, try thinking about it from the perspective of a customer, employee, or even a competitor. This can help you to see the problem in a new light and generate fresh ideas.

 

  1. 4. Set Constraints

Setting constraints can also help to spark creativity. For example, if you're working on a design project, try setting a constraint such as using only one color or working within a certain budget. This can help to focus your thinking and generate innovative solutions.

  1.  
  2. 5. Use Analogies

Analogies can be a powerful tool for generating ideas. By comparing your problem to something else, you can often find new and innovative solutions. For example, if you're working on a problem related to sustainability, you could compare it to the natural systems that exist in nature and look for inspiration there.

  1.  
  2. 6. Take Breaks

Taking breaks is also important when it comes to creative thinking. Sometimes, stepping away from a problem and doing something else can help you to come up with new ideas. This is because your brain continues to work on the problem even when you're not actively thinking about it.

 

Conclusion

In conclusion, there are many techniques and approaches that you can use to generate new and innovative ideas. By practicing these techniques and being open to new perspectives, you can train your brain to think creatively and come up with fresh ideas. Remember, creativity is a skill that can be developed and improved with practice, so don't be afraid to experiment and try new things!

 

creative thinking creativity ideas brainstorming mind mapping
A
@ 26/03/2023

Basic git commands

Github is distributed version control system that is commonly used by coders/developers. By Version control, also known as source control we mean a tool to manage the software source code where usually more developers are working. The version control application keeps track of every change to the source code. If a mistake is made, developers can turn back the clock and compare earlier versions of the code to help fix the mistake while minimizing disruption to all team members. It supports non-linear development through its thousands of parallel branches.

The followings are the top version control systems that are currently being used by the largest companies to maintain their source codes.

1. GitHub

2. GitLab

3. Beanstalk

4. Apache Subversion

5. AWS CodeCommit

6. Bitbucket

 

Every version control system has its own drawback and benefits and companies are using any of them by evaluating these as per their requirement.
 

Basic commands of Git

The following are some basic git commands that every developer uses in their daily coding life while working with a group of developers on the same project.

  1. git init
    The git init command is used to create the empty repository and consider the very first command of the git.
     
  2. git pull
    git pull command is used to download the content of the remote reposity. We need to apply the branch name with the git pull command like "git pull origin develop".
     
  3. git add
    git add command, followed by the file name(s) or dot (.) adds a change in the working directory to the staging area. It makes the changes ready to be committed in the next commit. We can use the git add command in the following way:
    a. git add file_a.php
         to ad a single file
    b. git add . 
        to add all the files
     
  4. git commit -m 
    The git commit -m command capture the snapshot of the project's current stash status. And the committed stage of the code is considered as a save version as well. The -m is used for the commit message. We have to add the message/description for each commit to understand the purpose of the changes. An example of this command is as below:
    git commit -m "Fixing UI/UX bug on the dashboard".
     
  5. git push
    This command is the opposite of the git pull command by using git push we add the local changes to the remote branch. When there are commented changes in the local working directory we need to push them to the remote branch to sync with. git push origin develop  command will be used to push the changes into the develop branch
     
  6. git commit --amend -m
    Sometimes we type the wrong message/typo error or something else goes wrong with the commit message and we want to change it before pushing the code the following command can be used to modify it.

    git commit --amend -m "Your new message goes here"


Hotfix branch
A hotfix branch in Git is a branch that is created to quickly fix a problem or issue in a production environment. The branch is typically created from the production branch and is used to make the necessary changes to fix the issue. Once the changes have been made and tested, the hotfix branch is then merged back into the production branch and deployed to the live environment. This process allows for quick and efficient problem resolution without disrupting ongoing development work.

git github gitlab git command
A
@ 28/08/2022

Parents Should Never Say These Things to Their Children

A father or mother should NEVER say the following things to their children.

1. Why can’t you be like ____ [So-and-so]?

This is really stupid stuff to say to your children.

Can I give a simple answer to this…

Your child cannot be like _______[falan falan], because your child didn’t have the fortune to have such wonderful parents as that child have.

So you should make yourself believe that this was only possible if ____ were the parent of your child. So simple. Got It?

Trust the fact that your childern would be wishing the same for you that why you are his/her parent instead of ___. Every time you say this, keep in mind this fact as well.

 

2. “I don’t have time right now.”

Ok. Wait for a few years. They will return the favor. As you so so shall you reap. One day the children will be not spending a tiny amount of time on you. So please give them time, and make them your priority. Your job and business are only for the bright future and good education of your children. If you don't give them time you gave them nothing.

 

3. “I don’t think you can do it.”

This is the most discouraging satement. Before your child improves his/her capability, you must improve your thinking. Your child needs a super believer parent, only then your child can try their best.

 

4. “You’re such a disappointment.”

No. Not as big as you. They can be disappointed because of you. Because you are the root of this issue, and never tried to make it fix.

 

5. “Can’t you do anything right?”

Well, you see… they need better mentors! People can only learn from their mistakes. A single mistake of a child is not so wrong that you should use this discouraging nonsense.

  

6. Why B? Why not A? Why the marks are not good as others?

Please don't compare your children, especially in terms of marks in exams/tests. Instead, ask. have you done better this time than the previous exam.

A
@ 07/08/2022

Error: Operation not permitted on MacOS while installing the Homebrew

brew Homebrew operation not permitted. mac os homebrew error
A
@ 27/10/2021

COVID-19: No vaccine prevents illness 100% of the time. No doubt for any vaccine, there are breakthrough cases, but it surely reduces the risk of dead and serious illness.

It has been well known since the very first day of the vaccine that although COVID-19 Vaccines are no doubt effective, however, some people still can be affected if the virus attack. It doesn’t matter if the person is fully, partially, or not vaccinated at all, to get affected by this deadlier disease. But the good news is the vaccinated people are capable to overcome this, which means that they are unlikely to get as sick. It’s not an assumption it is a reality. We see thousands of people are getting a positive result from the COVID test but nobody dies, nobody develops severe symptoms and nobody needs to be hospitalized.

 

The vaccines reduce the risk of developing severe illness that requires hospitalization and the coverage is almost 90% to 96% high. It is very curtailed for everyone to get vaccinated ourselves and our loved ones.

 

We need to understand that vaccine doesn’t kill the COVID-19 virus but it makes our immune system strong to fight against the virus by creating antibodies in our body. Thus this is the case that the vaccinated people can also get affected but will not be as much ill as non-vaccinated one.

 

This is not the first time where the world has experienced a deadlier disease, before ages ago the POLIO had made the same feelings among the people, and fortunately, the world control almost 99% of this through the vaccine. Polio still exists in some countries where people don’t vaccinate their children. To challenge the COVID-19’s vaccine is just like to challenge the Polio vaccine, that is simple.

 

There are few symptoms of COVID-19 among the vaccinated persons.

1. Headache

2. Sore throat

3. Runny Nose

4. Sneezing

5. Loos of smell

 

This is pretty much possible that a vaccinated person could pass the virus onto a non-vaccinated person without seeing the symptoms in him/herself. But the ratio of spreading the virus to a vaccinated person is much less than the non-vaccinated one.

 

We should also be ready for the future by keeping in mind the fact that the current vaccines (all types of vaccines) are effective only for the current live (circulating) viruses. The other variant/types of COVID-19 are expected to appear in the future with the capability to bypass the vaccines and their produced antibodies.

 

To protect us and others we must follow the Government’s and other healthcare authorities’  imposed rules and regulations, keep distance as much as you can, get vaccinated when it is possible for you, get yourself tested if you feel any symptoms, and keep yourself isolated. Although all these can’t finish the COVID-19, surely will help the fight against it.

COVID-19 vaccines corona corona variants
A
@ 25/07/2021

Malicious Android Apps “Facebook Credentials Compromiser” downloaded more than 5.9 millions from Google Play Store

Android users are advised to reset their passwords from time to time to avoid their accounts remain compromised for days. Social account security risks increase at the same speed as the tech world achieves a new era in today’s most developing age. Tremendous innovations are there to see that make human life completely change and dependent on devices, applications, and different types of widgets. But the same is also alarming in the perspective of cybersecurity-related issues. We need to be aware all the time before using any sort of technological instrument.

 

Recently nine (9) different malicious android apps are found involved in stealing Facebook user’s credentials. They were doing their job behind the scene, keeping the user in dark about all the stuff.

 

According to a report, a total of 5.9 million users have installed these apps. This means that the same number of users may have been victimized.


Researchers said that

“The advertisements inside some of the apps were indeed present, and this maneuver was intended to further encourage Android device owners to perform the required actions”

 

Following is the list of those malicious android applications. Please check your device if you have any one of these, and uninstall immediately.

  1. Processing Photo
  2. PIP Photo
  3. Rubbish Cleaner
  4. Horoscope Daily 
  5. App Lock Manager
  6. Horoscope Pi 
  7. Lockit Master
  8. App Lock Keep
  9. Inwell Fitness
     

The above applications were programmed in a way that the actual Facebook login page (https://facebook.com/login) is being displayed to the users and it’s the original login page of the Facebook Page. But they were injection some sort of JavaScript code that gets send the user's login information to the attacker’s servers while the user types his/her username and password on the Facebook login form.

 

Researchers found that they were using the below technique to get the user credentials:

 “These trojans used a special mechanism to trick their victims. After receiving the necessary settings from one of the command-and-control servers (C2) upon launch, they loaded the legitimate Facebook web page into WebView. Next, they loaded JavaScript received from the C2 server into the same WebView. This script was directly used to highjack the entered login credentials.”

 

These apps can have access to the user's other data as well. The hacker can easily hack the device session data, cookies, etc.

 

There are have been many incidents and it’s expected to see these in the future as well. We don’t have control over them but we can protect ourselves by accepting the consent of only the trustworthy apps while downloading. Avoid unnecessary downloads. Only allow the apps to access the required stuff on your phone. Use two-factor authentication for all your account. Kill the unnecessary background processes.

 

As we are putting everything on social media nowadays and a single mistake will be enough to destroy our life. So be careful while browsing, sharing, and downloading anything from the internet.

 

Stay protected!

Processing Photo RIP Photo Rubbish Cleaner Horoscope Daily App Lock Manager App Lock Keep Facebook Credentials Hack
A
@ 08/07/2021

Artificial Intelligence

In the ancient time, computers were just dumped machines which were doing a similar task as instructed by the programmer. Computers had no power to do anything good or bad from themselves. The instructions (software/code) provided by the human were to be followed exactly in the same manner that was given. Once the code executed the computer has no capacity to remember the input (code/instruction) as well as the output.

 

As we see development in technology and science, scientists start thinking to make the computers/machines behave just like humans as humans can decide, remember, learn from past experience, etc.  Thus we can say that Artificial intelligence refers to the simulation of human being’s intelligence.

 

Humans can learn from the people surrounding them, where they live and grow up, from observing nature, from past experience, and lots of many different ways. To behave like humans, machines/computers have to be trained first. Here we use the subset and crucial part of Artificial Intelligence called 'Machine Learning or ML'.

 

Machine Learning means training a machine with predefined data. To build intelligence algorithms that can experience from the provided data. Let’s take a simple example to train a machine. Suppose we have a computer/robot and we want our computer to identify the cat where we have pictures of dog, hen, cat, sheep.

 

To do the above we have to train our machine first by providing it as much data as we can about the cat. Please note that the number of rich data (lots of data) means the chances of correct/better results. We will provide different pictures of different types of cats, sizes, shapes, colors, structures, and many more. When we provide all the necessary data to recognize the cat, the computer will be able to identify the cat from the given pictures by comparing the cat’s model with the training data. This is just a high-level explanation of ML. To train the machine there are many strategies exist.

 

AI does more complex tasks by analyzing the existing data. Big data helps to improve the predictions of the AI, based on previous experience.

 

There two main categories of Artificial Intelligence.

1.  Weak Artificial Intelligence: 
These are designed to do a particular task.


2. Strong Artificial Intelligence:
A strong type of AI means a machine can work very closely with humans. Behave just like humans. These are able to perform complex tasks as well.

Artificial has become very popular and in the future, we will be no longer existing without AI.

AI is playing a great role to perform home chores, critical business decisions, health care sectors, education, industrial, etc. Almost every type of work that was being performed by the human, is possible to perform by the machines today. No doubt, in the future, we will be more dependent on AI than today.

AI artificial intelligence technology machine learning ml weak artificial intelligence strong artificial intelligence
A
@ 26/06/2021

How to get multiple total counts in a single query with different condition in Laravel

Suppose we have an “Orders” table with three different status of the order like Cancelled, Accepted, Pending etc. If we want to count the total of each type of order, there may be different possibilities, but let’s find out the most efficient one. Otherwise, if data is huge, our query will not be executed or will take a huge time. Let’s assume we have a Flag field for the status with a possible value of [1, 2, 3] Cancelled, Accepted, and Pending orders respectively.

The first possibility comes to our mind is to run the query for each status with count function like:

$totalOrders = Orders::count();
$cancelledOrders = Orders::where(‘Flag’ 1)->count();


And so on for the rest of the conditions.

 

The above approach is the simplest one and we can achieve the desired output. Although it’s simple and easy but not an efficient way to deal with conditions like this.  We have to execute four queries (in the above case) just for the sake of counting. If conditions increase the no of queries will also increase. Let’s try another approach.

$orders = Orders::all();
$totalOrders = $orders->count();
$cancelledOrders = $orders->where(Flag, 1)->count();


The same goes for the others conditions as well.

Although we run a single database query here, trust me, this is not a good idea, tons of memory will be used and also will take a significant amount of time to process the data, especially if you are dealing with large data please this is totally not a recommended way. This approach is even worst than the first one.
 

Thanks to the aggregate functions of SQL, these make our life much easier. We can use a simple and single query to get the desired work done in a much efficient way.

 

Let’s use the conditions with the aggregate functions in the following manner:

$countOrders = DB::table('orders')
     ->selectRaw(“count(*) as totalOrders”)
     ->selectRaw(" count(case when Flag = 1 then 1 end) as cancelledOrders")
     ->selectRaw(" count(case when Flag = 2 then 1 end) as acceptedOrders")
     ->selectRaw(" count(case when Flag = 3 then 1 end) as pendingOrders")
     ->first();

This single query will return the counts of all the conditions, also we can add more conditions to the above query easily. This is an efficient way to get the counts of multiple statuses in a single query.

 

Now we can print each counts in our Laravel blade file as:
{{ acceptedOrders }}, {{ cancelledOrders }}, {{ pendingOrders }}.

counts in larave query laravel count with multiple condition
A
@ 24/06/2021

How to convert angular app to android app

Convert your angular website into a hybrid mobile application (Android, iOS and Windows) without writing a single line of code in JAVA, Swift, C#, etc.  I'm not wasting time here by explaining the pros and cons of the angular or any other framework or programming languages, every framework and programing language has both benefits and drawbacks. It is a Universal truth that angular is a famous frontend technology, I'm also using this amazing technology for many years. I have build many applications using angular. It is supper easy as compared to VueJs and even ReactJs as it isolates the HTML, CSS, and JavaScript of each component. I think it's enough we talked about the angular in this post as the agenda of this post is not the Angular. So, let's start the actual work here to convert the existing angular application into an Android app (Hybrid) within a few simple steps.

 

1. Install Cordova
If it's new for you, then you can simply run this command to install Cordova: 'npm install -g cordova'

 

2. Intall Android Studio
Android studio help us to run the app in the emulator provided by Android Studio 

 

3.  Create an empty Cordova project as below:
'cordova create my-app com.my-app.hello MyApp'

 

4. Build your angular project
Now make a production build of your existing angular application, if you don't have already a project you can create an angular app.

 

5. Add the Android platform to your Cordova app
You need to add the required platforms like Android, iOS, Windows, etc in the newly created Cordova project. The following command can be used to add a platform:
"cordova platform add android | ios | windows". Whatever platform you want to add, just write that with add platform command.


6. Merge Cordova and Angular files
We need to merge both the apps file (Angular and Cordova). Except, node_modules, package.lock, package-lock.json files copy all the other files and past them into Angular project directory.

Merge cordova's package.json with angular's package.json file.

 

7. Update index file base URL tag as below:
Change
<base href=”/”> 


to:
<base href=”./”> 
just add a dot(.) before the '/' in the index.html page.

 

8. Update the Angular.json file.
in Angular.json file we have the output path is set to 'dist' change this to www as :
outputPath = www.

Run the following commands carefully:

"ng build --prod --aot"
"cordova build android"


Your Hybrid mobile application is ready to run in the emulator as well as on real devices. To test in the emulator, run this command: "cordova emulate android"

Please note that the command "cordova build android" will generate an app for debugging/testing purposes only. For the production build, you need to generate a released and signed version application by configuring the app certificate/signature.

Generate Released Version
Run this command to generate the released version of your application: "cordova build --release android".
The generate released version of APK will be saved in the following path:
"platforms/android/app/build/outputs/apk/release."

Keystore
You can generate the Keystore  to make your app signed with the following command:
"keytool -genkey -v -keystore mymobileapplicatoin.keystore -alias androidmobileApp -keyalg RSA -keysize 2048 -validity 10000"

 

The above command will ask you to enter a few basic information like password, organization info, etc. Just enter your info and hit enter. Please note down all the information you entered here to generate the Keystore file. These will be needed while uploading your app in the play store. 

There are multiple ways to make your app signed from the unsigned version, even you can directly generate a signed version from the build command by providing the necessary (Keystore information)

That is it. All done. We have a Mobile App without writing a single line of Java for android. The same goes for the others platforms as well.

angular programing languages framework android app hybrid Hybrid cordova app converting website into mobile app apk
A
@ 22/06/2021

What is Node.js

node.js javascript latest technology fullstack backend api
A
@ 11/05/2021

مریخ پہ کالونی بنانے کا خواب

پچھلے کچھ سالوں سے ، جیف بیزوس اپنی بیوی کو طلاق  دے کر میں اپنی دولت کا ایک بڑا حصہ اسے دینےکے بعد بھی دنیا کے سب سے امیر شخص رہے ہیں مگر کجھ عرصے پہلے ٹیسلا نامی کمپنی جوکہ بجلی سے چلنے والی گاڑی بناتی ہے اپنی مالک ایلوں مسک کے اساسے میں اضافہ کرکےایلوں کو دنیا کا سب سے بڑا امیر آدمی بنایا۔ ایلون مسک اس کے علاوہ بھی بہت سارے غیر معولی کام سر انجام دے کر دنیا میں شہرت کے بلندیوں کو چھونےمیں کامیاب ہو چکے ہے۔

دنیا کے یہ امیر شخص ہرروز کچھ نا کچھ نیاکرنے کا سوچ رہا ہے۔ ۲۰۱۸ سے وہ مریخ میں کالونی بنانے کا سوچ رہا ہے، اس کا کہنا ہے کہ وہ لوگوں کونجی جہاز کے ذریعے مریخ پر لےجایگا، اوراسے ممکن بنانے ک لیے وہ کافی حد تک کامیاب ہوچکے ہے۔ 


اس کی کامیابی کی سب سے بڑی سبوت یہ ہے ک ناسا (آین - اے ۔  ایس - اے) نے بھی اپنے خلابازوں کے لیے ایلون مسک کا جہاز استعمال کرنا فیصلہ کر لیا ہے۔

مریخ پے گھر بسانا یا اس کے بارے میں خیال کرنا ہی ایک عام انسان کےلیے صرف ایک خواب ہے مگرسائینس اور ٹیکنالوجی اس قدر ترقی کر چکی ہے کہ بہت جلد یہ خواب بھی حقیقت میں بدل جائےگا۔ اس خواب کو پورا کرنے ک لیے سب سے زیادہ جلدی دنیا ک کامیاب ترین، امیرترین اور بہت ساری ایجادات کے مالک مسٹر الیون مسک کو ہے۔ 

ایک عام آدمی اپنے باپ دادا کے زمین میں کچن بنانے میں اپنی ساری عمر لگا دیتا ہے لہزا مریخ پر کالونی بنانے میں ضرور کچھ وقت درکار ہوگا اور اس میشن کی کامیابی کی لیے ہماری نیک خواہشات الیون کے ساتھ ہے۔ 

mars elon musk technology colony on mars
A
@ 02/05/2021

No such file or directory error in Laravel and mysql database

Laravel no such file or directory unix_socket db_socket MySql
A
@ 20/12/2020

Cloud Computing & Virtualization

Paravirtualization and Full Virtualization

Paravirtualization is a technique in which the guest operating system is modified to work in cooperation with the VMM to optimize performance and efficiency.

In full virtualization, guests will issue hardware calls but in paravirtualization, guests will directly communicate with the host (hypervisor) using the drivers.

The guest OS comes closer to native performance than a fully virtualized guest.

Paravirtualization also allows for an interface to the virtual machine that can differ somewhat from that of the underlying hardware.

Paravirtualization doesn’t need to simulate the hardware for the virtual machines. The hypervisor is installed on a physical server which is called the host and a guest Operating System is installed into the environment. Virtual guests are aware that it has been virtualized, unlike the full virtualization (where the guest doesn’t know that it has been virtualized) to take advantage of the functions. In this virtualization method, guest source codes will be modified with sensitive information to communicate with the host. Guest Operating systems require extensions to make API calls to the hypervisor.

In full virtualization, privileged instructions can be executed in kernel mode. If they attempted to be executed in user mode, they cause a trap and so executed in kernel mode.

When privileged instructions tried to be executed in user mode, it generates an error and causes a trap. Then VMM gains control, analyzes the error, executes the instruction (operation) on behalf of the guest, and returns the control to the guest in user mode. This process is called trap-and-emulate.

Emulation is a technique we use when we want to run an application on a platform for which the application was not written. Suppose if we want to use an android application on our windows machine we can use the emulator to run the android app. It's basically an extra layer on top of the system where we want to run a totally different program.

It really is significant in real life and we often use this type of service. The best example of an emulator is the android app emulator which is commonly used in app development. The application can be tested in a different virtual device called (emulators).  We installed this and integrate it with our IDE (Android studio) and this exactly works like a real device.

 

Following are the main points that make the VDI more efficient than traditional desktop:

•       Centralized environment

•       More efficient client environment that is easier to maintain

•       Less requirement of Desktop support

•       Portability

•       Cost-efficient as “Thin Client” are cheaper and require no high-end hardware and software configuration

•       Scalability

In terms of cost and scalability, the VDI can be a better choice than a traditional desktop.

Cost:
Since processing is done on the server, the hardware requirements for end devices are much lower. Users can access their virtual desktops from older devices, thin clients, or even tablets, reducing the need for IT to purchase new and expensive hardware. 

Scalability:
When an organization expands temporarily, such as seasonal call center agent contractors, it can quickly expand the VDI environment. By enabling these workers to access an enterprise virtual desktop workload and its respective apps, these contractors can be fully functional within minutes, compared with days or weeks to procure endpoint devices and configure apps.

Virtualization to use office 365 in a small organization
In my opinion, to introduce Microsoft Office 365 in his company, the SaaS server provider should be contacted. SaaS is best suited for this kind of requirement.

I believe that companies that provide SaaS, IaaS, PaaS, etc, are very secure nowadays, as they are trying their level best to gain the trust of their clients about the security so there is no need to worry about the security risk. The service providers companies investing a huge amount only for the protection of the data.

SaaS applications are sometimes called Web-based software, on-demand software, or hosted software. Whatever the name, SaaS applications run on a SaaS provider’s servers. The provider manages access to the application, including security, availability, and performance.

In the software on-demand SaaS model, the provider gives customers network-based access to a single copy of an application that the provider created specifically for SaaS distribution. The application’s source code is the same for all customers and when new features or functionalities are rolled out, they are rolled out to all customers.

Depending upon the service level agreement (SLA), the customer’s data for each model may be stored locally, in the cloud, or both locally and in the cloud.

Organizations can integrate SaaS applications with other software using application programming interfaces (APIs). For example, a business can write its own software tools and use the SaaS provider's APIs to integrate those tools with the SaaS offering.

Scalable usage
Cloud services like SaaS offer high vertical scalability, which gives customers the option to access more, or fewer, services or features on-demand.

Automatic updates
Rather than purchasing new software, customers can rely on a SaaS provider to automatically perform updates and patch management. This further reduces the burden on in-house IT staff.

Accessibility and persistence
Since SaaS applications are delivered over the Internet, users can access them from any Internet-enabled device and location.

Elasticity and Multi-Tenancy in Cloud Computing
Elastic multitenancy refers to the idea that a system can accommodate multiple client storage resources together "multitenant" and offer on-demand changes within the system "elastic".

The term is commonly used in modern cloud computing and network virtualization.

Elasticity In Cloud Computing
Elasticity is a core feature of distributed computing. Basically, resources are scaled out or in [horizontal scaling], depending on demand [vertical scaling refers to resiliency and failure, scaling up or down physical resources depending on failover logic]. Elasticity deals with variations in data load in the network by adding resources into the network at the time of higher load and decreasing the number of resources by removing them when the load diminishes. This helps to maintain the operating costs of the system while ensuring the overall performance of the system.

Multi-Tenancy In Cloud Computing
Multi-tenancy is a very innovative and important architectural style in cloud computing. It allows the service provider to serve the clients from various tenants simultaneously from a single application located on the cloud. Multi-tenancy allows the clouds to give a rich experience to the users who use the applications on the cloud similar to the on-premise software applications.

Multi-tenancy simply divides both the hardware and software among the operational tenants, thus reducing the operational costs drastically. It also simplifies the maintenance process of the cloud. The 'virtual machine' on the server, will handle multiple 'tenants' or users of the resource. The modeling of multi-tenancy is inherently more difficult and vital than server-side models of data usage with a typical client-server system.

1.              Capabilities can be elastically provisioned and released, in some cases

2.              automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the

3.              capabilities available for provisioning often appear to be unlimited and can be appropriated in any

 

Multi-tenancy helps a lot in terms of the better usage of the resources and minimizing the cost.

 

Templating
For the creating of many virtual machines with the same configuration, at a time, Templating Method can be used. Templating helps to create an OS + application VM, provide it to customers, use it to create multiple instances of that combination

 

Snapshots
Before installing a new application installation the user needs to save the current state of the machine in the running condition.

Snapshots allow an almost instantaneous copy of a dataset to be taken in a live environment. This copy can then be made available for recovery, but also to other systems, often as a clone copy. For testing and development.

Snapshots are standard in most enterprise storage systems and are often seamlessly integrated with technology such as Windows VSS to ensure we get rapid and consistent data copies.

 

Switches -- Physical Switches vs Virtual Switches
Virtual switches work in the same way as physical switches work, but there are few differences and the V-Swathes have also some extra benefits as compared to physical switches.

Physical Switches

 

  • Piece of hardware
  • Connected with physical devices
  • Hard to configure
  • Within the same host, traffic can flow from one switch to another switch
  • Not intelligent
  • Hard to extend if needed, sometimes it is necessary to replace it to get the required feature.

 

Virtual Switches

  • Works like a software
  • Connected with VMs
  • Easy to configure
  • It’s not feasible for the network traffic to flow from one v-switch to another v-switch in the same host
  • More intelligent than Physical Switches
  • Can easily be extended.

 

Virtual Network Communications
Virtual networks allow the virtual machine to communicate with the rest of your network, the host machine, and other virtual machines. With the Virtual Network Manager (VNM), the following network can be created:

Private network:
Allows a virtual machine to communicate only with another virtual machine on the host.

Internal network:
Sets up communication between the host system and the virtual machines on it.

External network:
Connects virtual machines and the host physical network. This allows the virtual machine to communicate on the same network as the host, operating as any other node on the network

Internal Communication VMs use shared memory and for the external communication traditional TCP/IP can be used.

Some VMs can communicate with each other using some socket API.

 

Cloud Computing Basic Architecture       

There are 3 main layers of The Cloud Computing System

Infrastructure Layer.

This the core component/layer on which any system exists. This contains the hardware like Machine, Hard disk, RAM, Cards, and another physical component of the system.

Platform:
The platform is the Layer sitting on the Infrastructure Layer. This directly communicates with the infrastructure (Hardware) as well. This is the middleware between the user application layer and the infrastructure layer. It uses the hardware to execute the user command/instruction. The basic tasks of Platform (Operating System) are file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

Application Layer.
The end-user interacts with the application layer. This layer contains all the applications like Ms.Excel, Ms.Word, Photoshop, Notepad, etc. The user interacts with this layer and this layer connects with the underline running OS. Like when the user clicks on a word file or runs the word application, it loads the application for the user.

Suppose we want to set up a cloud base call center for the company XYZ.

Then we need to know the OS on the selected hardware like either we want to use Windows, Mac, or Linux.

We then install our applications on the decided OS. The user will be accessing this layer through a given GUI or command prompt

cloud computing & virtualization service provider switch virtual machine
A
@ 03/12/2020

ایلون مسک مارک زکربرگ کو پیچھے چھوڑ کر دنیا کے تیسرے امیر ترین شخص بن گئے۔

ایلون مسک نے مارک زکربرگ کو پیچھے چھوڑ کر دنیا کے تیسرے امیر ترین شخص بن گئے۔

ایلون مسک ، الیکٹرک کار کمپنی ٹیلسا کے چیف ایگزیکٹو آفیسر نے فیس بک کے مارک زکربرگ کو پیچھے چھوڑ کردنیا کا تیسرا امیر ترین شخص بن گیا ہے اور مارک زکربرگ چھوتھے نمبر پہ سر فہرست ہے۔

امریکہ کی معروف کمپنیوں کے ایس اینڈ پی ۵۰۰انڈیکس میں شامل ہونے کے انتخاب کی خبر کی اطلاع کے بعد تلسا کے حصص میں۱۳ فیصد اضافے کے بعد ٹیک موگول کی خوش قسمتی ایک ہی ہفتے میں ۱۵ بلین ڈالر سے زیادہ ہوگئی ہے۔

مسک ، جو ٹیسلا کے ۲۰فیصد شیرز(حصص) کا مالک ہے اور راکٹ کمپنی اسپیس ایکس کی بنیاد رکھی ہے ، اس سال اس نے اب تک اپنی خوش قسمتی میں تقریبا ۹۰ بلین ڈالر کا اضافہ دیکھا ہے۔

ذرئع کے مطابق، ٹیسلا کی دنیا میں کسی بھی کار کمپنی کی سب سے زیادہ مارکیٹ ویلیو ہے- گاڑیوں کی تعداد کا صرف ایک حصہ بنانے کے باوجود بھی ٹویوٹا، ووکس ویگن اور جنرل موٹرز سے آگےہے - 

تاہم ، اس ہفتے واقعات کی سیریز میں یہ خبریں تلخیص تھیں ، جہاں ایلون نے ٹویٹر پر جانے کے لئے یہ اعلان کیا کہ اس نے کورونا وائرس کے لئے اس ہفتے ۴ ٹیسٹ لیا ہے۔

تاہم، اس ہفتے کے اہم خبروں کی سیریز میں یہ ایک یہ خبر بھی کافی گردش کرتی رہے ک الون مسک نے اپنے ٹیوٹر پیغام میں لکھا تھا کہ:

"کچھ انتہائی جعل سازی جاری ہے۔ کوویڈ کے لئے آج چار بار ٹیسٹ کیا گیا۔ دو ٹیسٹ منفی آئے ، دو مثبت آئے۔ ایک ہی مشین، وہی ٹیسٹ، ایک ہی نرس، بی ڈی سے ریپڈ اینٹیجن ٹیسٹ"

بحرحال ہم کویڈأ اور اس کے ٹیسٹ سے متعلق مسک صاحب کے بیاں پر کچھ نہیں کہہ سکتے، مگر یہ ضرور کہہ سکتے ہیں کہ ابھی الون مسک سے زیادہ دولت صرف دو لوگوں کے پاس ہے، ایک ایمیزون کےبانی جیف بیزوس ہے جس کی کُل مالت ۱۸۴بیلین ڈالر تک جا پہنچی ہے۔ دوسرے نمبر پر مائکروفاسٹ کے بانی بِل گیٹس کا نام آتا ہے جس کی مالیت  ۱۲۹ بیلین ڈالرہے۔
 

richest person world richest person elon musk mark zuckerberg second-richest person telsa
A
@ 22/11/2020

Object-Oriented Programming (OPP) concept in a simple way

Object-oriented programming ‘OOP’ is a fundamental programming paradigm that relies on the concept of Classes and Objects, used by almost every developer at some point in their development career. OOP is considered the most popular programming paradigm and known as the standard way of coding, taught by most IT-related educational institutes.  OOP helps us to write cleaner, reusable, scalable, modular, and maintainable code.

The concept of OOP in each programming language is almost the same with a little difference in syntax. We will be using PHP in this article but you can use any language as you wish.

The following are the basic and important building blocks of Object-oriented Programming (OOP).

1.     Polymorphism
2.     Inheritance
3.     Abstraction
4.     Encapsulation

Polymorphism
Polymorphism is a Greek word and means "many forms" a naming convention that helps to write code which is much more easy and manageable to use for the developers. There is a simple logic behind this word Polymorphism) that is: Functions in separate classes in an application/software that perform similar actions should have the same name.

In real life, if we have a look at the vehicle model we will be able to understand this. If we have to make a model for the vehicle then we can have many different shapes of vehicles like car, bicycle, tractor, van, etc. For each kind of vehicle, we have to write different classes. For the sake of simplicity let’s suppose that we want to print the number of wheels of each type. In this case, the Polymorphism principle says that methods/functions name that use to print the number of wheels should be the same regardless of the type of vehicle.

Let assume we call that method countWheels() which will be kept in an abstract class called Vehicle. For this let's make an interface for the vehicle as below:

Interface Vehicle {

   public function countWheels(){

   }

}

Now our concrete classes will be inheriting from this Vehicle (base) class.

Lets create a class for Car, Bicycle, Truck. We are not doing any complex calculation/operation for the sake of simplicity. Simple classes are as below:

class Car implements Vehicle() {
   private $wheels;
    __constructor($wheelQty){
         return $this->wheels = $wheelQty;
       }  

 public function countWheels(){
   echo “Car has”. $this->wheels. “wheels”;
  }

}

 

class Truck implements Vehicle(){

            private $wheels;

            __constructor($wheelQty){

        return $this->wheels = $wheelQty;

}

public function countWheels(){
  echo “Truck has”. $this->wheels. “wheels”;

  }

}

 

 

class Cycle implements Vehicle(){

            private $wheels;

            __constructor($wheelQty){

return $this->wheels = $wheelQty;

}

 

public function countWheels(){

echo “Cycle has”. $this->wheels. “wheels”;

}

}

 

Now let’s create objects for the above classes.

1.      $myCar = new Car(4);

2.     $myCycle = new Cycle(2);

3.     $myTruck = new Truck(8);

 

To print the number of wheels in $myCar, $myCycle, and $myTruck we simply call the countWheels() function which is common in all the class.

echo $myCar-> countWheels();

outlet will be : Car has  4 wheels;

 

echo $ myCycle-> countWheels();

outlet will be : Cycle has  2 wheels;

echo $ myTruck-> countWheels();

outlet will be : Trcuk has  8 wheels;

 

Inheritance

Inheritance is a relationship between two (Parent/child) class, where the child class inherits some or all the features of the base (parent class).

Let’s assume we have classes for Human and Teacher.

Class Human {

     public function eat($human){
          echo $human. “ is eating”;
   }

public function run($human){

         echo $human. “ is running”;

   }

}

Here we have created two methods inside of human class. Now let’s create a class for the teacher.

Class Teacher extends Human{

            public function teach($teacher){

            echo $teacher .“ is Teaching in a school”;

   }

}

We can see that we didn’t make any method as run and eat in the Teacher class instead we just extended this with Human class where we already have these two methods available. We can easily use these methods. We are creating an object of the Teacher class.

$ahmed = new Teacher();

echo  $ahmed->run(‘Ahmed’);

echo  $ahmed->eat(‘Ahmed’); 

We saw that inheritance help us to re-use the existing code very efficiently. In complex and large applications we can avoid code duplication by using Inheritance. We are always allowed to write whatever other methods in the child class, as we have one in the given example the teach() method is specific to the Teacher so we put this inside Teacher class instead of Human. If we have other classes like Driver, Student, Mother, Son, Actor, etc. than we put all the common method inside of our Human class and extends these class with this. All the Human methods will be available to each class.

 

ABSTRACTION

Abstraction is the concept of object-oriented programming that shows only essential attributes and "hides" unnecessary information. The main purpose of abstraction is to hide the unnecessary details from the users. Abstraction is selecting data from a larger pool to show only relevant details of the object to the user. It helps in reducing programming complexity and efforts.

To show all the essential and hide the unnecessary information is called Abstraction in Object-Oriented Programming. The goal of Abstraction is to hide the insufficient information from the user.  

In real life let’s assume the coffee machine to demonstrate the concept of Abstraction. If we have to make a cup of coffee, the thing we don’t need to know is how the coffee machine is working internally to brew a cup of coffee. You don’t need to know the ideal temperature of the water or the amount of ground coffee you need to use. All these details have been taken care of and made the coffee machine to use. Now as a user it’s not your concern to know the actual internal complexity of the coffee machine.

Abstract class can’t be instantiated directly as it has no implementation. We must provide the implementation in our concrete class. Look at the example below:

abstract class MyBaseClass {

    abstract function showData();

}

class Derived extends MyBaseClass {

    function showData() {

        echo "Derived class";

    }

}

        

$b1 = new Derived;

$b1->showData();

The output will be as below: “Derived class”

 

ENCAPSULATION

Encapsulation is the mechanism that binds together code and the data it manipulates and keeps both safes from outside interference and misuse. The wrapping up of data and methods into a single unit, which is called Class, is known as encapsulation. The benefit of encapsulating is that it performs the task inside without making you worry.

Suppose if your friends/guest comes to your house and ask for some money. You will not let them go to pick the money from the location where you have kept them but you will go and take the required no of money and give it to your friend/guest.

 

Another example if someone wants to know your name he/she can’t directly pick that up from your brain/mind. He/she must have to ask you to tell your name. Thus everything works through a proper channel in this way. Actually, in encapsulation, you are exposing an interface to get or manipulate the data in a way that is secure and desirable for you. The outside world doesn’t have access to your information and they can only through the exposed channel/method. Look into the following example to understand.

class Student {

    private $fullname;

        public function getFullName() {

        return $this->fullname;

    }

    public function setFullName($fullname) {

        $this->fullname = $fullname;  

    }

}

   

$student = new Student();

$student->setFullName('Saleem Jafar');

$student->getFullName();

In the above Student Class, we have only the setter and getter method to access the Student Name. This concept is called Encapsulation in Object-Oriented Programming.

 

Tipps to remember the Basic elements of OOP:

Polymorphism: We use the implements keyword while implementing the Polymorphism.
Encapsulation: We use setter and getter (Set and Get) in capsulation to read/write data.
Inheritance: The word extends is being used in Inheritance
Abstract: While defining Abstract class we use the keyword abstract before the class

oop php abstract polymorphism encapsulation object-oriented programing
A
@ 13/11/2020

Cloud Computing

We use the term Cloud and Cloud Computing in our daily lives nowadays. More and more companies claim that their products and services on the cloud they have cloud-based. Let’s try to understand what actually the Cloud Computing is.

The term Cloud means to access something remotely using the internet. Suppose we have a data center kept in the USA and we are in some other part of the world and can access our data using the internet.

The general definition of cloud computing is as below:

“It is the on-demand availability of the system resources and computing power without directly purchasing the system or resources. This usually means having data center remotely and any user can access through the internet.”

“Cloud computing relies on sharing of resources to achieve coherence and economies of scale.

We all know about Hotmail, Gmail, yahoo mail, etc. and these are not new to us. We have been using these for many years. We have our email on the third parties' server e.g. Google, Microsoft, and Yahoo have their own servers. Our emails are saved on their machines, but we can access them anytime and from everywhere. This basically forms a cloud-based service.

In ancient times companies were using their on-premises server as the internet was not so common. Companies were storing their data on their own machine which they were usually placed at their office. These were only accessible only to the company premises where the server is placed. We can’t say this a Cloud base service.

Let suppose you have a data center at your office located in Karachi, if you want to move your office somewhere else like Islamabad, Lahore, etc. you will be carrying your entire data center with you. Other than this there are lots of other issues with having Own Data Center/Servers (On-Premises), like equipment purchasing and maintenance cost, electricity, location to set up, hardware, software, security, accessibility, remote access, and many more. These issues made the people think to have their data somewhere else instead of On-Prim and here we got the Cloud base service.

In cloud services are on-demand, you have to pay for what you used. This means you have only to pay for the actual consumption, if your consumption is low you will pay less and vice versa. When you need more resources on the cloud you don’t’ need to purchase anything, cloud Service providers will just let you use as much as you want, it's similar to an Electricity bill. It’s up to you to have 1, 2, or 3 AC at your home. Electricity providers will never forbid you and the bill will be charged as per your usage/consumption.

Cloud Computing System Architecture Deployment Models

It has the following three main section:

1.     User Software Application/API

2.     OS, Middleware

3.     Hardware

Cloud computing is a complex set of services, called Services Models. These are SaaS (Software as a Service), IaaS (Infrastructure as a Service), and PaaS (Platform as a Service).

1.     Software as a Service (SaaS): Software applications that can be used on-demand or pay-as-you-go through a provided license. Microsoft 365 is a good example of SaaS.

2.     Infrastructure as a Service (IaaS): This method provides a complete system like Applications, OS (Operating System) as well as Storage (Hardware). IBM Cloud and Microsoft Azure are examples of IaaS.

3.      Platform-as-a-Service (PaaS): It’s a complex model as compared to SaaS and IaaS. It provides a platform to create software to be delivered through the Internet. Examples are: salesforce.com, Heroku.  

One of the major drawbacks of Cloud Computing is that you have to store all the information on a third-party system. There are still methods like encryption etc. to make the data unreadable even for the owner of the Cloud Service provider.

Nowadays many organization including the following are offering the Cloud Computing Service:

v Amazon Web Services (AWS)

v Google Cloud (GC)

v Microsoft Azure

v IBM Cloud

v Ali Baba Cloud

Conclusion
Cloud Computing is an internet bases service where you can store and use your data/applications/files at any time and from everywhere. You can make your products and services fully or partially (Hybrid, means sensitive information can be store in On-Prim server and other applications, etc. can be deployed on Cloud) Cloud base. It’s very economical as compared to purchase and maintain all the systems by yourself.

Cloud Computing Storage AWS Google Cloud
A
@ 24/10/2020

Top Interview Questions for Web Developers

1.      Write a MySQL query to find out the Second Highest salary:

ANS:

SELECT DealCode FROM (Select DealCode from deals order by DealCode Desc LIMIT 2as SAL Where 1 Order By DealCode ASC LIMIT 1

The above is the simplest form to select the second largest/highest value (salary) from the table. You can select the 3rd, 4th, and so on the highest value in the same way by just changing the limit value of the inner select.

 

2.      What is Dimond Problem?

ANS:
Suppose we have 4 classes namely class A, class B, class C and class D. We have inherited classes B and C with class A. Class D is inherited with both A and B.

Class A = Super Class

Class B = Child of A

Class C = Child of A

Class D = Child of A and B (Inherited from both B and C)

Suppose we have a function sayHello() in our super class.

We will be accessing this in Class B and C easily but, what happens when we try to access this function from class D as D is inherited from both B and C? Will it access the sayHello() function through B or C?

The above ambiguity is called Dimond Problem. Different programming languages tackle this in different ways and some are not even providing the multiple inheritances only due to the diamond problem.

 

3.      What is the difference between Cache, Cookies, and Session?

ANS:

Session:
Session stores the current web browser information, which hit the server, on the server like ( in the database, in the file storage system, etc).

Cookies:
Cookies are small files stored on the client browser sent by the server in Http header response. This is because Http is stateless and whenever the client requests to the server, the server gets the cookies from the client’s request header to identify the user.

Cache:
The cache is a storage system on the client computer used to store text files, images, HTML files, etc. Static resources are usually stored in caches to improve the load time of the application. It doesn’t need to re-fetch again the resources from the server every time if they already exist in the cache. This helps a lot to improve the performance as well as decrease the unnecessary load on the server.

 

4.     What are the building blocks of OOPs

Ans:

  • Encapsulation
  • Abstraction
  • Inheritance
  • Polymorphism

 

5.     What is the difference between sessionStorage and localStorage

ANS

Both sessionStorage and localStorage are browser-based and domain-specific storage system. Setting and getting the data in both the option is the same, the only difference is that sessionStorage will be deleted when you closed the browser and the localStorage will always be there until you manually delete this.

 

6.     Explain Services in Angular?

Angular services are singleton objects that get instantiated only once during the lifetime of an application. Data does not get refreshed and is available all the time. Organize and share the business logic, models,  data and functions with different components of an app is the core objective of the services in angular application.

 

7.     What is a trait in PHP?
Ans: Laravel 5.4 introduced a mechanism to overcome the single inheritance which enables developers to reuse the set of methods in several independent classes living in different class hierarchies. That method is called a trait.

interview question developer website php
A
@ 03/10/2020

What is Freelancing?

A temporary or contract base job someone does for any company or individual on the base of predefined terms and conditions is called Freelancing. Freelancing jobs are extremely task-oriented; means a freelancer will be hired to perform a specific task within the given timeline and budget. As a freelancer, you are a temporary worker rather than a permanent employee.  Usually, these types of jobs are for a short time only.

 

The term ‘Freelancing’ is very popular nowadays and everyone is aware of form it. People are switching their jobs to freelancing. Because in freelancing you can earn many times more money than a permanent employee. Thousands of people are doing freelancing with their permanent job as well.

 

Freelancing is almost purely happening over the internet and requires nothing except your portfolio/expertise in any field. It’s just a sort of making money online. Your education, location, cast, timing doesn’t matter. You can eat, sleep and wake up whenever you want, you can spend lots of time with your friend and family, you can travel and does everything which is completely next to impossible with the permanent employment.

 

If you are extraordinary in your field, trust me this is your time to make your life, it doesn’t matter in what position you are right now and how big are small is your employer, just get rid of it and start converting your dreams into reality. Even if you can’t take the risk to kick off your job at the moment, it's ok and you can even start this with your current job as well. Just need to manage a few hours daily, but must give it a try.

 

According to a survey, the number of freelancers in America was 3.7 million in 2014 and increased to 57.6 million in 2018. You can see the huge conversion and this is because of its flexibility in timing, money, and freedom. During the COVID-19 the freelancer jobs were 100% secure as compared to full-time employees because freelancers don’t have to wake up early in the morning for the sake of office and don’t need to spend time in the traffic to reach the office. They are doing everything whenever and from wherever they want. They enjoy their social life and spend only a few hours whenever it is possible for them.

 

How to start your career as a freelancer?

As I mentioned earlier freelancer doesn’t need any prerequisite to dive into it. If you are good in any field you can start your dream job. Either you are a good writer, developer, designer, income tax and finance specialist or you are a good QA engineer, data analyst, recruiter or anything else you can start it. You can write an article, make a logo/brusher, help companies to recruit the right person to look into someone’s application as a QA engineer, etc. 

 

There are hundreds of platforms available online to start the freelancing, some of these are as under:

      I.         Upwork

    II.         99designs

   III.         PeoplePerHour

   IV.         Freelancer.com

    V.         Guru

   VI.         LinkedIn Profinder

 VII.         Fiverr, etc.

 

The nature of all the above sites are almost the same. You just need an account on the freelancing website and make your portfolio. Basically, you are making yourself available to perform some tasks according to your skills. The companies who are looking for freelancers are registering themselves on the same websites too. Actually, you, the seller (sell your services) and the companies, the buyer (buy your services) are on the same page. Companies post their job with their requirements for which if you think you can do within the given timeline and budget, apply. The companies will contact you if your portfolio satisfies them for the given job.

 

How I will get paid?

You need to have a bank account and the freelancer companies will charge the amount from the service buyer companies, will get their service commission and submit the remaining into your Bank account. The service charge of the freelancers websites are not too high. Don’t worry about it. You can start your freelancing job with the companies located in China, Germany, London and anywhere else in the world.

 

If you need help regarding Freelancing or want to add something in this article, please feel free to drop a line for me in the comment box. I’ll be happy to hear from you.

 

All the best and Happy Freelancing!

freelancing make money online how to get paid
A
@ 26/09/2020

حکومت پاکستان کی جانب سے اعلٰی تعلیم (پی ایچ ڈی) کے لئے فل اسکا لرشپ پے برونِ ملک بھجئے گئے 132 افراد میں سے 80 افراد بگوڑے نکلے۔

ہم پاکستانی لوگ خواہ تعلیم یافتہ ہو یا ان پڑھ ،غریب ہویا آمیر ہرکوئی اپنے حیثیت کے  حصاب سے جہاں موقع ملتا ہے اپنی بیمانی اور بے ضمیری میں اپنی مثال اپ رکھتے ہئیں۔ اپنی گربان میں جھانکنے کے بجائے ہرخاص وعام سیاسی لوگوں کو جی بھر کربرا بھلا کہتے ہئیں۔ پاکستانی سیاست تو ہے ہی غلیض لیکن بدقسمتی ملک کے کسی بھی شعبے پے بھروسہ نہیں کیا جا سکتا ہے۔ یوں لگ رہا ہے کہ گویا پاکستان کو چور، ڈاکو، رشوت خور اور بدمعاش نسل کی پیداوری کے لیے بنایا گیا ہو۔ 

حال ہی میں جو وقعات مملکتِ خدادات میں ہو رہے ہیئں وہ یقیناََ ہر باشعور انسان کے لے کسی المیے سے کم نہیں۔ بہر حال وہ ہم سب اچھی طرح جانتے ہیں جو کچھ لاہور موٹر وے میں اورنامو نہاد مدرسے میں ۱۳ سالہ لڑکے کے ساتھ جو ہوا س کی تفصیل میں جانے کی ضرورت نہیں ہیں۔ جب تک ہمارے فرسودہ نظام انصاف ایسا ہی چالتا رہے گا تب تک یہ سب ہمارے لئے کوئی حیران کن بات نہیں  ہیں۔

کہا جاتا ہے کہ تعلیم انسان میں شعور، اچھے برے میں فرق، حلیمی اور سخاوت پیدا کرتا ہے اور ہمارا مذہب اسلام بھی تعلیم کوہر فرد پر فرض قراردیکر اسے عبادت جتنا افضل مقام عطا کیا ہے  مگر اسی فرض کی تکمیل کے نام سے کیسے ہر سال اسلامی حکومت پاکستان کے خزانے کو لوٹا جا رہا ہے اور کہا جا رہا ہے کہ پی ایچ ڈی کے لئے برونِ ملک جانے والے 132 افراد میں سے 80 افراد پاکستان واپس ہی نہیں آئے۔ اور یہ لوگ پاکستان کے خزانے سے فل اسکالرشپ پے باہر پڑھنے گئے ہوئے تھے اور ہر اے بندے پے جو خرچہ اتا ہے ہو ہم سوچ بھی نہئں سکتے۔ اس سکالرشپ میں جو بھی جاتا ہے وہ حکومت سے معاہدہ کر کے جاتا ہے کہ وہ واپس آ کر کم از کم دو سال تک ملک کی خدمت کرے گا۔ لیکن ہمارے وہ پاکستانی جو اپنا مطلب نکال کر پاکستان کو رہنے کے لئے قابل ہی نہی سمجتے ہیں۔ یہی نہی بلکہ ہر سال درجنوں افراد جو پی ایچ ڈی کے لئے بروں ملک ہمارا اتنا سارا پیسے لے کر جاتا ہیں وہ وہاں اپنا مضامین ہی پاس نہئں کر سکتے ہیئں اور یہ ان کی سلیکٹر پر بھی سوالیہ نشاں ہے۔ 

یورپ ممالک جوچاند پرقدم جمایا، سائنس اور ٹیکنالوجی میں انتہاکو پنچا، انسانیت کی خدمت کے لئے نت نئے ایجادات کیئے وہاں اج بھی اس بے بسی کی زنداگی گزارنے پر مجبور  ہئیں جہاں نا جاں ومال محفوض ہے نا عزت، نا بجلی ہے نا گیس، پانی اور سڑکوں کا نظام کا تو پوچھو ہی نہیں۔ حکمران ہمیں یہ تسلیاں دےتے رہتے ہیں کہ اج سب ٹھیک ہوگا، کل ہوگا مگر یہ سارے صورت حال دیکھ کرایسا لگ رہا ہے کہ :


 اِک زندگی عمل کےلئے بھی نصیب ہو
 یہ زندگی تونیک ارادوں میں کٹ گئ۔  

 

PhD Scholarship USA Scholarship
A
@ 23/09/2020

What is the Dark Web

The Dark Web is also the World Wide Web (www) and uses the internet just like the normal Web but needs specific kinds of software, authorization, or some sort of configurations to access. Dark Web is not indexed by search engines like Google Chrome, Firefox, Safari, etc.

 

Special kinds of browsers like The Onion Routing project(Tor) and Invisible Internet Project (I2P) are used to access the dark web.

 

In the Dark Web, users are not able to get the information about the website host and the host is also not able to trace the user location and IP address due to the high level of encryption. This high encryption make the communication of the dark web users, hosts confidentially.

 

The purpose of the Dark Web is almost for criminal activity, where people can buy drugs, guns, credit card numbers, stolen credentials, etc. Hackers are also there to hake someone’s machine/computer for you.

 

The Dark webs also contain legal content as well. Not every dark web is for criminal activity. Any kind of Club and sport or event can be joined or building social networking through can be done through the Dark Web.

 

Dark Web and Deep Web are not the same. The dark web is just a small part of the Deep Web. The website that due to some reason do not index themselves in the search engine is called Deep Web. This means when we type some queries in the search bar of any browser the Deep Web will not be shown even if the best result can be found on the particular website. But unlike Dark Web, these websites are accessible using a normal browser. No special kind of software and configuration is required for this kind of Website content.

dark web deed web internet
A
@ 16/09/2020

Hacker (Netwalker Ransomware) Hacked K Electric System & Demanding $3.8 Million Ransom

KE- (Karachi Electric), the power supply company’s IT system has been hacked by the hacker called Netwalker Ransomware on Monday 7th September 2020 and remains hacked on the fourth day as well. Online customer service accounts and distributing billing systems remain inaccessible for a long time. The company said in a statement that: “The KE teams have initiated consultation with international information security experts and are also collaborating with local authorities in this regard.”

On Wednesday the company issued another statement telling customers to expect disruption to some online services but didn’t mention the actual hacking in detail. Said the company: “All critical customer services including bill payment solutions and 118 call-center are operational and fully functional, to ensure the integrity of our systems, as a precautionary measure, we have isolated few non-critical services. As such customers may experience some disruption in accessing duplicate bills from the KE website.”

As the company official has acknowledged the Hacking of their system. ‘BleepingComputer’ an Information security and technology news publication agency published this story with the headline “Pakistan’s largest private electricity provider, K-Electric, hit by Netwalker ransomware.”

The term Ransomware is relatively new in the world of Hacking and a new way to get access to the targeted system by injecting malicious code and encrypts all the data in the system. Once when the data encrypts the files become unreadable and ask key to decrypts. The decryption needs key and the hackers demand huge money in return to provide the decryption key. The payment is usually done via an online payment platform.

The Netwalker is demanding $3.8 million ransom from KE (Karachi Electric) to pay before 15th September 2020 and if KE is unable to pay than this demand will be $7 million ransom.  

KE didn’t share the detail of the attempted hack. The main concern for the customer remains on whether any data was leaked, and if leaked whether that data was encrypted or not?

KE has access to the customer’s address, CNIC, NTN and also printed on the bill as well, if you pay online, lots of other information are also accessible to the KE system.

“Financial data is linked to your CNIC (including with bank accounts, credit card). Many consumers pay their bills online. This is sensitive information. NIC details can reveal the date of birth, your mother’s name (in records) and place of birth. This makes you more vulnerable. If any point hackers [in any data breach] are not given ransom, they can sell this to the dark web and this can have repercussions.” Said Shahzad Ahmed, director Bytes For All (NGO that works on technology and human rights.)

Netwalker Ransomware Ransom K Electric Hacking
A
@ 11/09/2020

Blockchain

Blockchains, an innovative approach that comes from incorporating old technology in new ways is to recognize the fifth revolution in computing. Blockchain is an immutable, Distributed Ledger or you can say it a distrusted database that a group of individuals controls and that store and share information.

To understand the scenario and conditions where Blockchain is useful and unique from already existing approaches, lets’ try to have a look at the problems which is eliminated in the world of Blockchain.

Usually, we are using an approach called the ‘Client-Server Approach’ where all the information (data) is stored in a central location called Server. Just like Facebook, Google, Yahoo, etc. Clients request information and Server returns. Any client if somehow is able to change the information then all the other clients will receive the changed/updated data instead of the original one. Also, the server owner(s) can do the same. Besides these, the data can also tamper while traveling from the networks. Thus we can see that this approach can’t be trusted and can’t be used for sensitive applications.

To eliminate the single ownership of the data and centralization of the storage Blockchain came into existence. It has its own unique way to store and change the information. Instead of storing data in a central location, it puts a copy of the database in all clients network and this is almost next to impossible to delete or change the data in Blockchain.

A Blockchain is a peer-to-peer network that has no central authority to manage the data flow. Having a large distributed networks of independent users where networks are in more than one location is also a way to remove the central control while maintaining data integrity.  Each participant in the network cooperates in keeping a full and unaltered history of each transaction or entry that is made within the database which they share.  These networks are known as nodes.

Adding entry in the Blockchain is called also transaction. Users in the network who have validation control verify the new adding transaction. Every Blockchain has a different spin on how this work and who can validate a transaction, like in some Blockchains it is done via Proof-of-work (POF) and some use Proof-of-stack (POS) and so on.

 

There are three types of Blockchains:

1.     Public Blockchains: These are open for everyone to participate at any level and their code is open source code maintained by their community, e.g. Bitcoin.  Tempering data is almost impossible in this network. This is the strongest Blockchain type in terms of security but efficiency in terms of use of the resource is lower as compared to the private and consortium blockchains.

 

2.     Permission-Based or Consortium Blockchains: Such as Ripple, control roles that individuals can play within the network. The Code of this type of Blockchains may or may not be open source.

 

3.     Private Blockchains: Also known as Distributed Ledger Technology (DLT).  These are small in size and do not utilize a token or cryptocurrency and their membership is also closely controlled. Consortiums that have trusted members are in favor of these types of Blockchains, this is good for the trade of confidential information.

 

All the above types of Blockchains use cryptography to allow participants on any network to manage the ledger in a trusted way.

There are three main elements of a Blockchain and these are as follows:

a.     Block

b.     Chain

c.     Network

Block:
Block is a list of transactions recorded into a digital ledger in a given time. The transaction can be think as adding a record to the ledger, and timestamp, etc just like this happens in a financial ledger.

Chain:
The hash is the most complex concept in the world of Blockchain and also can be considered the brain of Blockchain. Every Blockchain on the network has a unique address called a hash. The current hash of a block is the previous hash of the next block and so on. The hash links one block with another mathematically chaining/linking them together. In fact, this chaining logic builds the mathematical trust between the blocks.

Hash is a mathematical function that takes an input and generates one output in the form of a string in a fixed bit length. Hashing is a one-way function that can’t be decrypted/re-versed. In Blockchain data of the current block is given as an input to the hash function and generates a unique hash for the block. Which will be previous hash for the next hash.

Network:
The full nodes in the blockchain are known as network. These are the computers running an algorithm this is securing the network. Each network has a complete record of the activities or transactions that were recorded in that Blockchain.

The identity of the participants are not disclosed in the blockchain. Instead of the name, address, etc Blockchain uses the hash for communication. Hash is unique in the entire Blockchain network.

Bitcoin Blockchain uses Proof-of-work  (POS) and Ethereum Blockchain to use Proof-of-stack (POS) machinimas. These blockchains are generally considered to be fully decentralized. For both Proof-of-work and proof-of-stack, a substantial amount of computational power is required.

A working example of Blockchain for a simple transaction can be demonstrated as below:

      i.         Mr. A wants to send money to Mr. B.

    ii.         The Transaction is represented as Block.

   iii.         The Block is broadcasted to every node in the network.

   iv.         Sufficient miners approve the transaction.

     v.         The Transaction is added to Blockchain.

   vi.          Mr. B receives the money.

 

Mining in Blockchain:

Mining is of the major concept in Blockchain. This means to validate the new Block before making this to the part of Blockchain. There can be many minors who have the right to validate the new block. The working method of Different blockchains is slightly different from each other. In some Blockchain when new Block is adding, all the minors try to validate the new block with the use of Proof-of-work (POS). The first validator minor will be the winner, and there is a commission/reword for the wining minor for that Block. This block will be the part of the blockchain and the effort of all other minors will be discarded. This is very drawback in terms of computation as this required huge resources.

Blockchain Bitcoin Mining Cryptocurrency Ledger
A
@ 29/08/2020

How to store Internet data and use it later?

How to store the internet data for later use when you don’t have access to your WiFi or you are out of the internet coverage area?

There are lots of places here in Pakistan and some other parts of the world where the Internet is not available yet. People use to go many kilometers away just for the sack of checking their emails or WhatsApp messages. This even happens to me when I’m in my village, I literally have to travel about 250 km away from my house and have to stay in a hotel for many days just to stay connected with the internet. Students are facing the same in some villages and especially in this Pandemic era when almost 90% of classes are taken online.

This really made me think about the strategy that how to Back Up the Internet when we have access to it and use it when we don’t have access. I google it and found that some people are suggesting some sort of apps to store the Internet. Storing the Internet for later use and downloading Internet materials/resources like images, articles, books, etc. is completely different from each other. These apps just download the resources but not backs up the Internet. You can always access the downloaded articles, images, etc. but can’t stay connected with this stuff.

Let’s understand that what actually the Internet is, how does it works, and is it possible or not to store the Internet for later use.

Internet is the collection of Inter-connected devices. It is called network of networks. Type of networks can be but not limited to Public, Private, Government-owned or Business, Sales, Academic in nature. These networks use the protocol to communicate with each other called the TCP/IP protocol. The Internet operates without a central governing body as it is not someone’s only property. The IETF (Internet Engineering Task Force) is a non-profit organization that standardizes the core protocols IPv4 and IPv6. A collection of hardware devices and many layers of software make the Internet possible for us to communicate with the different networks. Shortly the Internet is a Global System of Trillions of interconnected networks.

Thus to access any network we must have rights (routes to reach) to communicate that network in real-time. Just Imagine this in a way that when we use WiFi or data packages, the Internet Provider companies agrees to build a road/path between our device and the Global System of networks and we use that bridge to send and receive data to and from the networks called Internet only if they have roads in your area. 

According to the above imagination we concluded that if your area doesn’t have roads/paths which lead to the networks then neither you can’t buy the right to reach the network nor your providers can build the path for you.

So saving/storing the path/road for future use is NOT POSSIBLE yet. Maybe this can be possible in the near future but as for now, we can say that Storing the Internet for later use is just a dream. May this dream come true.

storing internet wifi internet internet for later use
A
@ 22/08/2020

The Kalash Valley

The beautiful Kalash valley surrounded by mountains is located in District Chitral in near Pak-Afghan border. The valley is very famous in all around the world due to their unique life style, colourful dress, lots of different unique cultural actives and customs. Tons of tourist from almost all over the world visit this valley every year. In fact the Kalash valley is the hub of tourist in Pakistan.

The Kalash people also called Kalasha are very famous for their hospitality, and one of the amazing tradition is that when you go any Kalasha’s house they will ask you for Vine instead of tea or water, because Vine is the most important part of their custom/traditional activities. The Vine is therefore easily available in every Kalasha’s house.

Kalasha’s (Kalash People) are consider the most minor community in the world. Their existence is very important in term of tourism. Government of Pakistan is doing its best for the protection and facilitation of these people. They are indeed an asset for Pakistan as thousands of people visit Pakistan and Chitral.

Three main festivals celebrated in this areas are as below:

i.    Chilam Joshi
ii.    Uchau
iii.    Choimus
The people of Kalash Valley believes in a number of Gods and Goddesses e.g. Yama Raja (also called Dezau), Khodai, Balumain, Destak, Munjem, Dezalik and many more.

The different Gods and Goddesses have shrines and altars all over the Kalash valley, where goat sacrifices are offered usually.  Crows are considered to be their ancestors are frequently fed with their left hand at different places like tombs.

Moreover, the people of Kalash do not bury their dead bodies under the ground rather their coffins are left out in the open. They believe that the soul was excited to leave the human body and reunite with the already departed souls. That is why they celebrate the funeral of a dead person by singing and dancing rather than mourning over their bodies.

Many first class restaurants and hotels are there in Kalash valley in every affordable price. The beautiful Kalash valley is self-sufficient with many different fruits, beautiful rivers, mountains etc. They valley is a great gift from the God to the people of the area and Pakistan.

Those who visits Kalash valley should respect the culture and customs of the people. They are the most precious people and this existence in our country is a blessing of God. The Kalashas are the most peaceful people in the world.
 

Kalash Kalasha Kalash Valley Tourist Kalash People Kalash Culture
A
@ 08/08/2020

Hardwork or luck? What is important for success?

The price of success is hardwork, dedication to the job at hand and the determination that whether we win or lose we have applied the best of ourselves to the task" Hall of fame Coach, Vince Lombardi puts his thoughts this manner. Success and hardwork are intertwined entities as you cannot succeed unless you have displayed the best of hardwork. Those who aspire to achieve most of the world without burning the midnight oil are living in sheer ignorance. Today, as the world is progressing at an immense pace and to keep up with the world you must leave your comfort zone.

Moreover, hardwork is also substituted with smart work, nowadays, but there is not and should not be a short cut to success. As Robert John says"there is no alternative for hardwork, 23 or 24 hours a day.Short cut only leads to mayhem, division and destruction.

Hardwork is the only path which one can follow to attain distant dreams.For example, few days back a news went viral on social media in which daughter of a rickshaw driver successfully passed the Central Superior Service (CSS) . In the clip the girl was orating the difficulties which she went through to reach the position. As Andrew Çarniage , business magnate and philanthropist, quote is quite consistent with the above encounter "it is the fuel that allows common people to achieve uncommon goals.

Luck is relative and is linked with our every deed but luck is beyond the control of human. Our luck is not consistent with our wishes but hardwork is.We can change the fate by only having belief in our hardwork.

In addition, we cannot be completely reliant on our luck as it could change. The future which seemed gloomy could be brighter provided you have much of your belief in hardwork instead of luck.

Nesta Jojoe Erskin beautifully puts his views" You don't get lucky sitting in a sofa with your arms crossed doing nothing. You can be lucky only if you are prepared.

In conclusion, we cannot negate luck's involvement in the affairs of people but we should be more focused on hardwork instead of luck.

hardwork luck success believe
A
@ 29/07/2020

How to make money online

You must know a person around you talking about earning online through the internet. We are getting more and more dependent on the internet day by day and most of the time we are spending lots of time over there very unproductively. Everybody wants and loves money. If you are able to know the right way of earning money online, I’m sure that would be a game-changing moment for you. If you are thinking to switch your job or want to earn extra money other than your salary or if your income is not enough to complete all the expenses of your daily life, trust me Earning Online will be a great chance for you. I will be telling you a few easy ways of earning money from the internet / online without any investment.

1.     Freelancing

When you hire someone to perform some particular task without a regular salary basis. Freelancers charge for the specific project or service or for the specific amount of time he/she spent on the task to be done. Freelancers can work with different companies on a project/service basis. A person who works as a performer, writer, developer, designer, etc., or sells his/her service on a contract basis for different organizations instead of working for a single company is called Freelancer.

Freelancing is the major source of income in the world and the internet has made this possible to work from anywhere, anytime, and for everyone. You can offer your services to as many companies as you want if you are good in some field. There are tons of companies that are preferring freelancers instead of full-time employees. There are thousands of freelancing sites like Upwork, PeoplePerHour, Designhill, and Freelancer from where you can start your career.

 

2.     Writing Blog

Blogger is a person who writes an article for a blog.  If you are a good writer, you can start a blog and earn enough money. A blog can be about anything, like politics, sports, education, etc. The thing which matters is the quality and uniqueness of your content.

 

3.     Selling Products Online

If you are good at some sort of product development/production you can have your own online store. You just need to have a website or Facebook page or even you can start your online store through WhatsApp. For example, you are a good graphic designer or software engineer then you can easily start your designs or software through any online channel as mentioned earlier (Website, Facebook, WhatsApp).

 

4.     Selling Products On Amazon

Billions of products are sold on Amazon every month and this makes an incredible opportunity to make money online.

There are three main types of selling products on Amazon

  • Becoming an Amazon Seller
  • Buying wholesales
  • Shipping your inventory to Amazon fulfilment centre.

Amazon will deliver your products to the customer for you. Fulfillment By Amazon (FBA) is the best way to sell products (your products as well as thousands of other vendors) at scale.

You will also be able to make money if you are able to sell products at a higher price than you pay amazon for them (products).

 

5.     Create YouTube Videos or Channel

We all are well aware of advertisements on YouTube videos. It is not necessary for your videos to be technical one, any type of video which attracts people can be a big source of income for you. Videos can be tutorials, funny, informative, musical, or any other which you think of getting viral. Ads are shown while playing videos and these ads are the real source of making money online.

 

6.     Affiliate Marketing

Affiliate Marketing is the way to earn money for doing nothing. When you refer to someone for a specific service or product and the person/company which is reefing is paying you some predefined commission is called Affiliate Marketing. For example, if someone is on your website page and interested in the best Pizzas in the town, you refer the person to one of your aligned/pre-decided Pizza brands and the person who goes to them with your reference is forming an affiliate marketing. The brand which you are referring to is making money from your referral and pays you a commission for that.

Example: https://saljaf.com  is the best website for online learners.

 

7.     Online Paid Surveys

There are companies that are paying you just for feedback about their products. Usually, these companies provide their product for free just for the sake of getting your feedback/review about the particular product.

 

8.     Virtual Assistant

One way of earning online is to Assistant companies virtually, sitting at home or anywhere in the world. As the number of small businesses are increasing every day, thus you can offer your service as a virtual assistant, it’s just like the personal assistant job, but can be done online.

The job of a virtual assistant can be (but not limited to):

i.               Research work

ii.              Replying to emails

iii.             Writing content

iv.             Moderating comments and social media

 

Conclusion

There are tons of opportunities and options to earn money online, you have to search and select the one which is best for you. You must have to try some options but I recommend to choose only one option/opportunity at a time and spend some time to promote it. Diving into many methods at one time can make the chance next to impossible for you.

Select some methods, think about all the pros and cons of each and select the one which you think you are the best to do. Keep consistency in your work!

Drop me a line below in the comment box if you have any queries.

Good Luck!

Make Money Online Blogging Sales Products on Amazon Freelancing Online Earning
A
@ 25/07/2020

How to lose belly fat

Belly fat not only affects your self-esteem but also is a major risk factor for two types of diabetes and heart disease. Although it is very tough to get rid of this; but the following tips will help you a lot if you are willing to reduce your stomach fat.

 

1.     Eat Breakfast

As breakfast is considered the most important meal of the day and we know that eating breakfast has many benefits as it improves energy levels, improves metabolism, boosts fiber and calcium intake, helps in stabilizing your blood sugar levels.

Besides all the above benefits it also helps to reduce the belly fat. It keeps you energetic throughout the whole day and prevents you from overeating junk foods. To have protein-rich breakfast food is one of the best way to fill yourself up and make you feel satisfied throughout the day. Protein helps kick-start your metabolism, reduce weight, and belly fat dramatically. Use as much protein diet as you can in the morning. Oatmeal, Eggs, Moong dal chilla, Poha, Daliya are recommended foods in the breakfast to reduce belly fat and helps you in weight loss.  

 

2.     Wake up early in the morning and go to bed early in the evening.

A new study shows that when you choose to go to bed and wake up can make a big difference if you want to reduce your weight. Who wake up early and go to bed at a decent hour are more likely to have a balanced diet than those who stay and wake up later. For a healthier lifestyle waking up early in the morning is very important.

A greater number of calories and fat is burned with a greater number of hours rest, as opposed to getting a fewer number of hours to sleep. So go to bed early and sleep well.

 

3.     Chew food longer

Chewing food well will help to burn the greater no of calories. There is a correlation between the number of chewing and the production of hormones that your brain produces, this indicates when to stop eating more food.

 

4.     Eating boiled egg.

Eggs are full of protein but fat and calories are found in very low quantity. The amino acid also found in the egg which helps burning extra fat as well.

 

5.     Exercise

Exercise like biking, running, sports, etc. will increase heart rates that will be helpful to milt the fat faster.

 

Conclusion:

Fat belly can’t be made flat in a week or so, this need continues struggles. Eat well, sleep well and timely, exercise daily. 1-2 KG fat per week can be reduced in a week. Avoid using medicines which are promised to finished all the fat in a week or so. These medicines have also lots of side effects.

belly fat weight loss fat
A
@ 16/07/2020

Elon Musk

Elon Musk and His Achievements

Born to a South African father and Canadian mother, Elon Musk opens his eyes first time in the city of South Africa called Pretoria. He studied there until he is 17 years old. At the age of 17th, he moved to Canada to attend Queen’s University. In 1995 he went to California to begin a Ph.D. in applied physics and material sciences at Stanford University, but he decided to choose a business career instead of enrolling in the above course.

 

When Elon Musk was 25 years old, he and his younger brother Kimbal founded a company called Zip2. It was a software similar to the google map. They sold this company only 4 years later to Compaq computer in 1999 for $307 million.

 

The second company of Elon Musk after Zip2 was an Online Banking Company X.com. Although this company didn’t much better due to the non-secureness of internet for banking like a business where the money is directly involved, it merged with Confinity in 2000 and formed a new entity called PayPal nowadays.

 

Mr. Musk decided to go to Mars and for this, he started working to build a rocket. We all know the result of his this dream in the form of SpaceX, yes he is the founder of SpaceX as well. It is the first private company that successfully launch, orbit, and recover a spacecraft. SpaceX is currently working with NASA to take humans to the moon and a strong desire to make people settle there on the Moon.

 

 He joined Telsa and become it‘s  CEO in 2004 and helped to make the second-largest solar provider system in the US. To make solar energy competitive with traditional forms of electricity SolarCity is working with Telsa.

 

In 2015 a nonprofit research company OpenAI was co-founded by this gentleman. The purpose of OpenAI was to promote friendly artificial intelligence.

 

After only one year Elon Musk also found another company called Neuralink in 2016. The purpose of this was the integration between the human brain and neuro-technology. The company works to invent devices to treat serious brain disease. Neuralink also tries to control wireless devices with the power of human thoughts and capture brain activity.

Elon Musk SpaceX OpenAI Zip2 Telsa
A
@ 28/06/2020

What is SEO (Search Engine Optimization)

SEO (Search Engine Optimization) is a process which helps to improve the organic (non paid) search of a website and increase the traffic. It brings more and more visitors to a site if correctly followed the procedures and rules. It helps search engines to get the best available content based on the user’s search.

“The Ranking Factors actually matters in SEO (Search Engine Optimization)”.

Let's try to understand the SEO and SEO related elements. Why the ranking of websites is important? How Search engines work and how SEO helps the search engines to show the most valid content/information to the user.

 

Search Engines

Consider Search Engines like a library for Digital books. They know the information in all the books. Search engines are digital Librarians of digital books/websites. They keep on the information into their index for the quick search.

 

When we type something in the search engine (Google, Bing, Yahoo, etc), it looks into the index and tries to find out the most relevant result. A huge calculation called ‘Algorithm’ involves performing this action. Algorithms are nothing but just computer programs.

According to Google, search algorithms look at lots of factors to give the best result. Some factors are as below:

1.     Words of your query.

2.     Relevance & Usability of pages.

3.     Expertise of Source

4.     Your Location

5.     Settings

Search Algorithms calculates the weights based on the above and many other factors. The highest weighted information/web pages will be displayed on top.  The top listed websites on search engines are considered as highly ranked websites. Every Search Engine has a crawler that searches and gathers all the information about the content they find on the internet and build an index for fast and better search.

How Does SEO Work

The goal of SEO and Search Engine is almost the same and that is to show the best and most relevant result to the end-user.

Every Search Engine has its own Search Algorithm, for video view we need to work and follow the rules of the YouTube algorithm and for the website, we need to follow Google Algorithm for the best organic search result.

One important thing to remember is that Google ranks web pages, not the website.

There are thousands of ranking factors but we will discuss a few of them.

 

a.     Crawling Webpages Content

Although Google has many ways to discover new content, but the primary method is crawling. For this google use a computer program called the spider. Spider search links and adds them in their index if not already there.  Google Crawler can be blocked in the following condition

1.     Poor Internal linking

2.     Nofollowed Internal links (nofollow tag)

3.     NoIndexed pages (noindex meta tag)

4.     Blocks in robots.txt (can be mentioned in robots.text file to crawl or not crawl the links/pages)

 

b.     Mobile Friendly

Almost 65% of traffic comes from mobile devices and this number is also increasing day by day. For better ranking your website must be mobile-friendly, all the content must be optimized for the mobile users as well.

 

c.     Page Speed

The loading speed of your website is very important. For the satisfaction of the user, Google wants the page to load as soon as possible. It considers the fast loading page for ranking first.

 

d.     Internet Search for Keywords

You need to search for keywords on the internet that best suit your content. There are keyword planners website’s on the internet from where we can find SEO friendly keywords.

SEO Keywords Ranking Crawling Spider Algorithm Organic Search
A
@ 27/06/2020

Covid-19 and Blessing of Allah upon Chitral test

Today we all know about the destruction of Covid-19. With no cure and no vaccine, the Covid-19 has killed tens of thousands of people all around the world. Many people are there in the hospital and fighting for their lives. People are keeping themselves isolated at their home. Everyone is afraid and only struggling to survive nothing else. Off course the only surviving is the great achievement in the current situation. Everybody is asking mercy from Allah. Business is down, no traffic on the road, no Hustle and bustle in the market, shopping malls, mills, offices, prayer hoses, and factories are close. Even victims’ bodies are not to be handing over to families for last rites. O my God too much is going in everywhere. No religion, cast, state, class are free from this. This grape everyone in everywhere. Doesn’t differentiate between poor and rich. People are running away from each other even from their loved one.

Thousands of people lost their job and thousand closed their businesses. It is hard to imagine the stress that came about as a result of this Covid-19.

 

In this worst situation Almighty Allah is continuously showing His blessing upon Chitral (Chitral is the capital of the Chitral District, situated on the Chitral River in northern Khyber Pakhtunkhwa, Pakistan. Chitral also served as the capital of the princely state of Chitral until 1947) and Chitralies. May be this is because of someone’s good deed. The cases of Covid-19 is ZERO (0) here in Chitral. People are doing their daily works without any fear. Hotels, Shops, Transport is as normal.  Although there is no proper medical facilities as compare to the other places in the world, but we so lucky to be free of covid-19 so far. Our immigrants, incomers, and students brother & sisters are coming to us as per routine to celebrate their holidays. When they come to us we live altogether instead of keeping them isolated. We are so lucky to have this amazing and blessing life and pray to the Almighty Allah to take away this pandemic as soon as possible and show His greatest blessing upon those who are fallen in this disease.

Covid-19 Pandemic Chitral
A
@ 26/06/2020

Top Technologies of 21st Century

Today we are livening in the age of Technology. Everything happening around us are depending directly or indirectly, fully or partially on modern technology. Technology is no more essential for Computer related students or people but for all of us.  We are not only dependent on the existing technology but also completely depending on the upcoming innovation and revolution information technology. People need to make themselves up-to-date to make their future secure. More and more businesses are making themselves devitalize nowadays. Let’s discuss a few technologies which are super important for us to learn today in this technology-oriented age.

 

1.     AI (Artificial Intelligence), IoT and Machine Learning.

Although AI, IoT, and Machine Learning are completely different from each other but for the sake of simplicity I would like to merge these three. You can get more detail about this online. The Important point is that we shouldn’t underestimate the impact of these technologies. These are going to completely change the world where we are living. The robots are doing human's jobs more accurately even without taking rest for a second. We can see a driverless car and delivery drones doing more and more profitable job rather than traditional human work.

Predictive maintenance, sensors, drones, automatic traffic signals modern hospital’s equipment and lots of different things around us are enough to make us think about the revolution of technology.

 

2.     Blockchain Technology

We all are well aware of the traditional banking system. Let’s try to understand for a moment what happens when we do a transaction in any bank. Suppose you have to send Rs.1000 to your friend who is in Lahore. Certainly, you will go to your nearest bank and fill out the slip. The filled slip has to be submitted in the bank along with the mentioned amount on the slip. Bank agents will process this and after two or three days the process will be completed and the bank will charge their fees as well. This is just for the transaction within the country. If you have to send money to another country then it’s 10 times more worst than this one. This will take a huge time as well as lots of bank charges will also be charged. Currency discrepancy, up and down status of the currency, etc. are other headaches.

 

To solve the above-mentioned problem Blockchain came into existence. This doesn’t care about the currency discrepancy, location, timing and middleware charges. You can do transactions any from anywhere and at any time. The transaction will be completed within a few minutes even a few seconds. No need to go to the bank and filling the slip out. No need to wait and pay extra charges for the transaction to be placed. This is what blockchain does for us. This is the future and if I say that Blockchain is a great risk for Banks it won’t be wrong.

 

3.     Edge and Cloud Computing

As we know more and more companies are making themselves digitalize like Amazon, Google, Microsoft and this becomes the adoption of cloud computing. Lots of companies are migrating to the cloud-based solution.

Data in the cloud are continuously increasing and thus we felt the issue of shortcomings of cloud computing in some situations. Edge Computing came into being to solve this problem by bypassing the latency and getting data to the data center. Edge computing can be used to process time-sensitive data with minimum connectivity or with absolutely no connectivity to the centralized data center. Edge computing is very useful for IoT Devices. It’s expected that the global Edge Computing market will reach 6.72 billion Dollars by 2022. This will open many doors for Software Engineers.

 

Besides the above-mentioned technologies, there are many other that can change the living style of the people shortly. I would recommend you to consider AR (Augmented Reality), VR (Virtual Reality), Cybersecurity, Automation and Cryptocurrency etc.

Blockchain IoT Top Technology Edge Computing Cloud
A
@ 25/06/2020
© All right reserved 2026