+
Home
Cloud
Analytics
Mobile
Security
Social
How-To
Curious
4 tricky interview questions for all jobs
curious
internet
Sep 2, 2013
Interviews are not purely dependent on your technical skills, but also on the ability to speak with confidence and give diplomatically correct answers ...
Newer Post
Older Post
Home
Total Pageviews
Search This Blog
Popular Posts
How to convert a given XML snippet to an equivalent JSON format and vice-versa
In WEB based applications RESTful APIs are used to manipulate data between the browser and the server. User may enter some data which i...
Use Wand Tool by Pixlr for Free Hand Image Cropping
With Pixlr , Free Hand Cropping is very easy using the Wand Tool . Now Cut images as you want without any loss . Freehand cutting of ima...
Log tracing mechanisms for Shell scripts
Shell script is powerful, quick, easy to write and gets your work done. But the real problem is when you want to figure out the failure...
Efficient Logging Mechanism in Shell ( log4sh )
Shell script is powerful, quick, easy to write and gets your work done. But the real problem is when you want to figure out the failure ...
Free Online Photo Editing by Pixlr
Photo editing softwares are sometimes heavy on your Computer eating up your RAM.Try out Pixlr for some great Photo Editing. Pixlr is a Fr...
Best screen recording tool for Linux ( RHEL / CENTOS )
XVIDCAP is the best screen/video recording application for RHEL / CENTOS. I have tried installing apps like Openshot, Pitivi or Kdenlive b...
Frisby as a REST API Automation Framework
For writing your REST API automation test cases there are many tools available like Runscope, Fit Selenium, PyRestTest, REST-assured and...
How to read attributes of a XML tag using easy shell script - Part 1
Many times we need to read a particular attributes value from a XML formatted file. Java's JAXB library is pretty useful for getting...
How do Virtual Machine Snapshots work in VMware
When you read the word snapshot what is the first thing that comes to your mind is , "A Photograph which preserves the best momen...
Blockchain explained for non techies
Blockchain, is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typica...
Popular Posts
How to convert a given XML snippet to an equivalent JSON format and vice-versa
In WEB based applications RESTful APIs are used to manipulate data between the browser and the server. User may enter some data which i...
Use Wand Tool by Pixlr for Free Hand Image Cropping
With Pixlr , Free Hand Cropping is very easy using the Wand Tool . Now Cut images as you want without any loss . Freehand cutting of ima...
Log tracing mechanisms for Shell scripts
Shell script is powerful, quick, easy to write and gets your work done. But the real problem is when you want to figure out the failure...
Efficient Logging Mechanism in Shell ( log4sh )
Shell script is powerful, quick, easy to write and gets your work done. But the real problem is when you want to figure out the failure ...
Free Online Photo Editing by Pixlr
Photo editing softwares are sometimes heavy on your Computer eating up your RAM.Try out Pixlr for some great Photo Editing. Pixlr is a Fr...
Best screen recording tool for Linux ( RHEL / CENTOS )
XVIDCAP is the best screen/video recording application for RHEL / CENTOS. I have tried installing apps like Openshot, Pitivi or Kdenlive b...
Frisby as a REST API Automation Framework
For writing your REST API automation test cases there are many tools available like Runscope, Fit Selenium, PyRestTest, REST-assured and...
How to read attributes of a XML tag using easy shell script - Part 1
Many times we need to read a particular attributes value from a XML formatted file. Java's JAXB library is pretty useful for getting...
How do Virtual Machine Snapshots work in VMware
When you read the word snapshot what is the first thing that comes to your mind is , "A Photograph which preserves the best momen...
Blockchain explained for non techies
Blockchain, is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typica...
+