Random

National Initiative for Artificial Intelligence & Security (NIAIS)

National Initiative for Artificial Intelligence & Security (NIAIS)

NIAIS Mission The mission of NIAIS is to reshape and contribute in Pakistan's technology, education and industry sector for skill development, business opportunities and economic growth by adopting to new era of 4th Industrial Revolution and emerging technologies. Its aim is to make Pakistan a Global IT hub and to export its products & services related to emerging technologies for socio-technical and economic growth. It is contributing in this revolution by its initiative of developing modern technology oriented work force , developing job market and developing entrepreneurial ecosystem in emerging technologies. This skilled human resource will ultimately participate in making digital and…
Read More
Riyadh to invest $20bn in AI

Riyadh to invest $20bn in AI

Saudi Arabia announced on Thursday Nov 19, 2020, It will invest $20 billion in artificial intelligence projects by 2030, as the oil-rich country seeks to diversify its economy amid slumping crude prices. The kingdom, the Arab world’s biggest economy, launched an artificial intelligence strategy last month to attract investors as part of Crown Prince Mohammed bin Salman’s ambitious "Vision 2030" plan to wean the kingdom off oil. "Saudi Arabia will invest $20 billion from now until 2030," said Abdullah al-Ghamdi, head of the Data and Artificial Intelligence Authority, which was established in 2019. "We aspire to have artificial intelligence as…
Read More
Solaris OK Prompt Commands

Solaris OK Prompt Commands

A list of Solaris OK prompt commands is handy to get the most out of OK prompt during initial install of Solaris Systems or troubleshooting issues. What is Solaris OK Prompt? Most of the time, when you start the server with Solaris OS installed, it boots at run level 2 or run level 3, which are multi-user states with access to full system and network resources. Occasionally, you might operate the system at run level 1, which is a single-user administrative state. The lowest operational state is run level 0. At this state, it is safe to turn off power…
Read More
Top 15 MCSE Interview Questions & Answers for System Administrators

Top 15 MCSE Interview Questions & Answers for System Administrators

We have compiled a comprehensive list of frequently asked MCSE Interview Questions with Answers.  You must know that the MCSE is a continuously varying field which needs the students as well as professionals to upgrade their skills with the new features and knowledge, to get fit for the jobs associated with MCSE. Many vacancies are available for the MCSE Certified resources. We are hopeful, our well researched list of MCSE Question and Answers will help you to crack the interview and standout among all your competitors. MCSE Interview Questions Below is the list of common MCSE Interview Questions with Answers…
Read More

ionic does not appear to be a git repository

While working with ionic appflow setup. if you are getting this kind of error git push ionic master Fatal error: 'ionic' does not appear to be a git repository you have linked app correctly using ionic link setup ssh key pair correctly but even then you are getting this error then please check one thing. run command git remote -v if you get . or _ in username or repository name, please remove it, it will fix this issue. for repository name, you have to change app name and for username, you may change it from settings page on ionic…
Read More

Useful Exim Commands with Examples

Exim is a message transfer agent (MTA) developed at the University of Cambridge for use on Unix/Linux systems connected to the Internet. It is freely available under the terms of the GNU General Public Licence. Exim is used for locating the spam activity on the servers. There is a great deal of flexibility in the way mail can be routed, and there are extensive facilities for checking incoming mail. Exim can be installed in place of Sendmail, although the configuration of Exim is quite different. Usage of Exim command is very easy to manage. It is easy to identify the…
Read More

The difference between fork(), vfork(), exec() and clone()

Fork: The fork call basically makes a duplicate of the current process, identical in almost every way (not everything is copied over, for example, resource limits in some implementations but the idea is to create as close a copy as possible). The new process (child) gets a different process ID (PID) and has the the PID of the old process (parent) as its parent PID (PPID). Because the two processes are now running exactly the same code, they can tell which is which by the return code of fork - the child gets 0, the parent gets the PID of…
Read More

CISSP – Questions and Answers

Q: FIPS-140 is a standard for the security of which of the following? a) Cryptographic service providers b) Smartcards c) Hardware and software cryptographic modules d) Hardware security modules Ans: c
Read More
US RQ-4 Global Hawk & MQ-4C Triton Surveillance Drone

US RQ-4 Global Hawk & MQ-4C Triton Surveillance Drone

Iran Shoots down US Navy's Drone Iran said in a Thursday, June 20, 2019 statement that it had shot down a United States Navy's biggest unmanned surveillance drone US RQ-4 Global Hawk while it was carrying out an Intelligence gathering mission and violated its airspace near the strategic Strait of Hormuz, with the U.S. military saying the RQ-4 Global Hawk was more than 20 miles from the Iranian coast. Fox News reporter Lucas Tomlinson cited an unnamed U.S. official as saying the drone was a U.S. Navy MQ-4C Triton high-altitude drone, and that it was shot down by Iranian surface-to-air missile…
Read More