Advanced Search
Search Results
42 total results found
New Page
EW0-0002-E-commerce
User Requirement Document (Version 1.0.0) Revision History Date Version Description Author Reviewer Nov 27, 2023 1.0 Initial Version. Krishnaa Mar 25, 2024 2.0 Updated Figma l...
SHELF
STEP 1
Installation of Nginx on Ubuntu
Introduction Nginx is one of the most popular web servers in the world and is responsible for hosting some ofthe largest and highest-traffic sites on the internet. It is more resource-friendly than Apache inmost cases and can be used as a web server or revers...
Nginx with Let's Encrypt
Introduction In this tutorial we will discuss about installing certbot on ubuntu to install Let's Encrypt SSL on to your ubuntu server. Prerequisites Before we start you need to make sure you have followings: Your own domain for example ( www.example.com...
Flask Docker Image
Introduction Please note use lowercase for all the folder names. In my case I have created a folder "DOCKER" on my folder where all my docker images will be created. Go to /home/snk/dockers/ Create a directory with the application name for example allclai...
Reverse Proxy For Window Server
To do reserve proxy for window server we need to do the following steps. Create a website, in our case it is STAGE, with in the stage we created Application called Jaya-stage. Please note that this application name is very important we need to create rever...
Jenkins
Introduction On this method we have created a Node on the stage or production server where we need our code to get deployed (Windows). This is basically to avoid using FTP or SFTP for code deployment as it might take more time and also we need credentials and...
FluentD v1.0
Introduction FluentD is the centralized Log collector and format that in to standard format and send it to elastic search & kibana for visualization. Video URL for introduction https://www.youtube.com/watch?v=5ofsNyHZwWE Installation ( EFK stack using Do...
FluentD v2.0
Installation Procedure Code FluentD.zip docker compose up -d Reference https://www.digitalocean.com/community/tutorials/how-to-set-up-an-elasticsearch-fluentd-and-kibana-efk-logging-stack-on-kubernetes pip install fluent-logger from fluent import ...
Solr Installation and make it as Window service
Check Solr Status E:\Solr\solr-8.8.2>bin\solr.cmd status Start Solr E:\Solr\solr-8.8.2>bin\solr.cmd start Import Data From CSV E:\Solr\solr-8.8.2>java -jar -Dc=barcode -Dauto example\exampledocs\post.jar example\exampledocs\product1.csv ***************...
Solr Installation in Linux
Application URL : http://192.168.1.208:8983/solr User Name : administrator Installing process. cd ~/ wget https://downloads.apache.org/lucene/solr/8.9.0/solr-8.9.0.tgz wget https://downloads.apache.org/lucene/solr/8.9.0/solr-8.9.0.tgz.asc wget https://do...
Create Chat Bot For An Application.
In the tbl_application we need to update Telegram chatbot Token ID. To create a Chat bot Step 1 : Add the BotFather to your chat account Follow the instruction to create a bot. Use this token ID and update the tbl_application table in SSO on the ...
Update Member Chat ID and Company Chat ID
To update member chat ID in the member table of the application. Click below link to get the member chat ID and update update the number in member table of the respective application thru screen or database update. https://telegram.me/cid_bot To start r...
Lesson Plan
Creating a lesson plan for training Solution Architects using TOGAF (The Open Group Architecture Framework) standards involves introducing learners to the essential principles, methods, and deliverables within the framework. Here’s a comprehensive lesson plan ...
RoadMap Based on 2017
1. Awareness and Training Objective: educate all stakeholders about web security risks. Actions: Conduct training sessions for developers, testers, and management on the OWASP Top 10. Create awareness programs to highlight the importance of secure codi...
Introduction
CISSP (certified information System Security Professional) Vision: Inspire a safe and secure cyber world. Mission: Provide industry & networking standard information to members. (ISC2) International standards for information security.
NFC
The **ACS ACR1552U NFC USB-C Reader** supports a wide range of NFC cards and tags adhering to specific standards. To ensure compatibility, consider the following specifications and card types when choosing an NFC card: ### Supported NFC Standards:1. **ISO 144...
Introduction
Core Concept Definition of Enterprise Architect. Architecture Domain, or BDAT. Architecture Development Method or ADM. Deliverables, Artifacts and Building Blocks. Enterprise architecture (EA) is a strategic discipline that defines the structure an...
Artifacts & Building Blocks
Artifacts in TOGAF Artifacts are specific documents, diagrams, or models that describe various aspects of the architecture. They are outputs from the architecture development process and are used to represent information in a structured and actionable manner....