Thursday, 5 January 2023

Connect Direct

One point to note below is node_id is for the Unix/Linux server file irrespective of whether it is at source or destination, for Mainframe or windows it is s_node

#CD_PUT_WIN.TXT

&SUBPROC process s_node=&CONDIR #CONDIR = CONDIR_NAME # SUBPROC = SUBPROC_NAME

XFR01

copy from (file = &SRCFILE

node_id

)

ckpt = 2M

compress = extended

to (file = &OUTFILE

s_node

disp = rpl

)

pend

================================================

#CD_GET_MF.TXT

SUBPROC process s_node=ndm.ndm1 s_nodeid=(&MFUSERID,&MFPWD)

XFR01

copy from (file = &SRCFILE

s_node

)

ckpt = 2M

compress = extended

to (file = &OUTFILE

node_id

disp = rpl

)

pend

Unix/Linux Commands

These are some random Unix/Linux commands that we have come across and thought will be useful for tech enthusiasts,

#1 While writing a shell script if you would like to log the output of each and every command execution it is a good idea to have the script started with exec statement so that the total script output can be logged,

exec > /path/logfile.log 2>&1 

Here , File descriptor 1 is the standard output  

File descriptor 2 is the standard error

#2 typeset variable type

typeset is variable type that is used to hold a value pulled from a text file or a command output. Basically we are not pulling/assigning a value directly but it is being the result of a command or set of commands

For ex : Let's assume there is a txt file as below with three rows

check.txt 

----------------------------------

LX1 T LICENSE Test1

LX2 M LICENSE Test2

LX3 P LICENSE Test4

I would like to pull the 2nd and 4th column values from row 2 that has Test2 and then assign those values to col1 variable then here it is , 

typeset col1=`grep 'Test2' /check.txt | awk '{ print $2 , $4}'`

If the row has to be separated by field separator before printing the values then we use 'FS'

typeset col2=`grep 'Test2' /check.txt | awk 'BEGIN {FS = " "} { print $2 }'`

If at all we want a substring of a value

typeset col3=`grep 'Test2' /check.txt | awk '{ print substr($3, 3, 5) }'`

As per need the typeset variables can be echo'ed.

echo ++ col1 is ${col1}

Below is another way to use typeset variable,

typeset col4= `echo check.txt | awk 'BEGIN {FS = "/" } { print $4  }'`

#3 AWK commands

we have seen a couple awk commands in the above examples, here are some other,

date | awk ' BEGIN { print "Today date is " } OFS="/" {print $2,$3,$NF }'

who | awk '$1 == "owner" {print "Owner Name is " $1 , $2 }' 


#4 While loop

Using while loop to read lines of a file and apply various operations on them

Let's say there is a file with name check.txt

           IN_FILE=check.txt

while read LINE

do

    typeset CHECK_VAR=`echo ${LINE} | awk '{FS=","} {print            substr($1,1,4)}' `   #2016

    typeset CHECK_VAR_YEAR=`echo ${LINE} | awk '{FS=","} {print     substr($1,3,2)}' `

done < ${IN_FILE}

 

Essbase Certification Installation

 

Here are the steps to generate a certificate and install it with Essbase

Step 1: Stop Essbase

    Go to the Essbase bin path and execute stop.sh in most cases it is the below path

/essbase/config/essbase_domain/esstools/bin/stop.sh

Step 2 : Generate the certificate using openssl, here adserver will be your Active Directory server

openssl s_client -showcerts -connect adserver:port </dev/null     2>/dev/null|openssl x509 -outform PEM>/test/cert.pem

Step 3: If you think there is already an AD certificate in the java key store, take a backup of it 

cp /essbase/config/essbase_domain/config/fmwconfig/ovd/default/keystores/adapters.jks /../adapters.jks_$(date +%Y%m%d-%H%M%S)

Step 4: Now delete the certificate from keystore inorder not to add the same certificate again

 keytool -delete -alias adserver -keystore /../adapters.jks -storepass ${keystore_password} #keystore_password   

# Reference : https://docs.oracle.com/javase/6/docs/technotes/tools/solaris/keytool.html

Step 5 : Now add the certificate to the java key store

keytool -import -noprompt -keystore /.../adapter.jks -alias adserver -file /.../cert.pem -storepass         ${keystore_password}

Step 6 : Verify the added certificate using key tool

keytool -list -v -keystore /.../adapters.jks

Step 7 : Start Essbase

essbase/config/essbase_domain/esstools/bin/start.sh

Monday, 19 April 2021

AWS

 1. What are the main considerations that influence which AWS Regions to use ? 

Answers : 

Latency reduction for end users

Compliance with laws and regulations


2. What are the main considerations that influence which Availability Zone to use ? 

Answers : 

Protection against localized natural disasters

Application resiliency during system failures


3. What is the best definition of Cloud Architecture ?

Answer : 

Applying cloud characteristics to a solution that uses cloud services and features to meet technical and business requirements. 

4. Which use cases indicate that a non-relational database might be a better solution than a relational database ? 

Answers : 

Horizontal scaling for massive data volume

Data with unpredictable attributes

5. Which statement that compares a database service that Amazon Web Services (AWS) manages with a database on an Amazon EC2 instance is true ? 

Answer : 

AWS manages DB patches for a database on a managed datbase service


6.Which examples are good use cases for Amazon Relational Database Service ( Amazon RDS ) ?

Answer : 

An application that requires the database to enforce syntax rules

An application that requires complex joins of data

Runnng a Microsoft SQL Server in AWS


7. A small company is deciding which service to use for an enrollment system for their online training website. Choices are MySQL on Amazon EC2, MySQL in Amazon RDS and Amazon DynamoDB. Which combination of use cases suggests using Amazon RDS ? 

Answer : 

The data is highly structured

Student , course , and regirstration data are stored in many different tables

The company doesn't want to manage database patches


8.Which scenarios are good use cases for Amazon DynamoDB ?

Answer : 

Database for serverless architectures

Applications that require ACID transactions

Document database for JavaScript Object Notation (JSON)-based documents


9. A small game company is designing an online game, where thousands of players can cretae their own in-game objects. The current design uses a MySQL database in Amazon RDS to store data for player- cretaed objects. Which use cases suggest that DynamoDB might be a better solution ?

Answer : 

Unpredictable attributes for player-created objects

Large number of player-created objects, each with different attributes


10. Which attributes are reasons to choose Amazon EC2 ? 

Answers : 

Complete control of computing resources

Ability to run any type of workload

Complete control of computing resources


11. What are the benefits using AMI ? 

Answers : 

B, D and E - Launching instances with the same configuration


12. A workload requires high read/write access to large local datasets. Which instance types would perform best for this workload ?

Answers : 

Memory Optimized 

Storate Optimized


13. Use the user data of each instance to access the MAC address through the instance metadata


14. Provisioned IOPS SSD EBS volumes are optimized for I/O-intensive workloads


15. Which features does Amazon FSx for Windows File Server Provide ?

Answers : 

Fully managed windows file servers


16. Spread




Tuesday, 15 December 2020

Design Thinking

·         To understand Customer Experience, you have to understand the four components of a good Customer Experience (CX).

o    Archetypes

o    Activities

o    Interactions

o    Principles 

·         Archetypes

o    Archetypes describe patterns of behaviors, attitudes, and motivations shared between people towards a brand or product. 

·         Activities

o    Activities capture the actions and goals of a customer across their end-to-end experience, from their perspective. 

·         What is the most important skill of a Design Thinking Leader?

o    Empathizing

·         Which of the following best describes prototyping?

o    Experiencing concepts in real life

·         Which of these is a component of a good Customer Experience?

      • Archetypes

·         UX and UI are the same.

      • False

·         Prototyping should be done slowly to cover all the ideas.

      • False

·         What are the two methods suggested by Edward De Bono for thinking out of the box?

      • Lateral Thinking, Six thinking hats

·         Which tool is used to measure the customer relationship?

      • Relationship Framework

·         Concepting in Design Thinking is the ________

      • Idea to solve a user-centered problem

·         What are the three key points in a Relationship Framework?

      • breath, depth, consistency

·         _______ is a methodology in which each prototype is built in quick iterations by learning from the previous failure.

      • fail fast

·         What are the two prototyping techniques using data intelligence? 

      • Data prototyping, Data driven prototyping

·         For the design thinking process to evolve, Interaction designers should deepen their knowledge on Human Interactions with _______.

      • Machines

·         Which type of prototypes has user interactions?

      • High-Fidelity Prototyping

·         Design thinking is a linear process.

      • False

·         What are the two things that the teams generally forget during idea generation? 

      • Socializing Delivery

·         Design thinking is a mindset.

      • TRUE

·         Which technique is used in prototyping to build successful prototypes?

      • fail fast

·         The following are stages in the design thinking process, except _________.

      • Production

·         Design Thinking is a _______ centered way of solving a problem.

      • Human

·         Design thinking is a linear and traditional method of Problem Solving.

      • False

·         Trust and Empathy within the team are built by the _______ activity.

      • Team leap

·         The following are qualities of a good Design Thinking Leader, except ________

      • Sticking to a single idea

·         Which is the technique used to align the team on a common goal quickly?

      • Mission Count Down

·         Which of the following best describes prototyping?

      • Experiencing concepts in real life

·         Which of these is a component of a good Customer Experience?

      • Archetypes

·         UX and UI are the same.

      • False

·         Prototyping should be done slowly to cover all the ideas.

      • False

·         What are the two methods suggested by Edward De Bono for thinking out of the box?

      • Lateral Thinking, Six thinking hats

·         Which tool is used to measure the customer relationship?

      • Relationship Framework

·         Concepting in Design Thinking is the ________ Idea to solve a user

      • centered problem

·         What are the three key points in a Relationship Framework?

      • breath, depth, consistency

·         Breadth, depth, and consistency are the key points of measurement in ________

      • Relationship Framework

·         Knowing the needs of the team members is the responsibility of the ________

      • Team Leader

 


Sunday, 29 November 2020

Internet of Things

 1. Arduino board can withstand a maximum voltage of _________ - 20v

2. Photo diode is a/an ____________ electronic component.- Passive

3. ____________ is a standardized method to establish communication between interconnected devices. - Protocol

4. Implementing Edge/Fog computing helps to reduce network bandwidth- True

5.____________ is a suite of applications used to prepare and present data in a meaningful way - IoT Platform

6. The unique identifier of an IoT device helps - 

7. MQTT is an open OASIS and ISO standard lightweight, publish-subscribe network protocol that transports messages between devices

8.Raspberry Pi is a low-cost general-purpose computer.- True

9. Arduino Uno is pre-programmed with - boot loader

10. IoT infrastructure should support - anytime anywhere

11. Which of the following is a/are characteristic(s) of an IoT application? - Connectable and Scalable

12. WAN is not an IoT protocols 

13. Edge computing helps to reduce the latency time of processing information - TRUE

14. Arduino board can read sensor values through the analog I/O pins. - TRUE

15. Arduino is a microcontroller.  - False

16. The following are IoT platforms, except _________ Zoho Connect

17. 'Denial of Service' is a attack using interconnected PC or devices. - TRUE

18. Edge computing is - Processing the data near the device

19. ___________ is a specialized web transfer protocol for use with constrained nodes and networks in IoT. - CoAP

20. Identify the non-IoT device from the given options.- Microsoft Surface Laptop

21. Internet of Things is a system of interconnected computing devices. - True

22. Sensors and Actuators are also known as ___________ - Transducers



Deep Learning

1.       What is the method to overcome the Decay of Information through time in RNN known as?

·          Gating

2.       The measure of Difference between two probability distributions is know as  

·         KL Divergence

3.       Recurrent Network can input Sequence of Data Points and Produce a Sequence of Output

·         True

4.       Prediction Accuracy of a Neural Network depends on _______________ and ______________

·          Weight & Bias

5.       Process of improving the accuracy of a Neural Network is called –

·         Training

6.       The rate at which cost changes with respect to weight or bias is called __________________

·         Gradient

7.       A _______________ matches or surpasses the output of an individual neuron to a visual stimuli. –

·         Convolution

8.       Autoencoders cannot be used for Dimensionality Reduction.

·         FALSE

9.       Data Collected from Survey results is an example of _ -

·         Structured Data

10.   Recurrent Networks work best for Speech Recognition. –

·         True

11.   How do RNTS interpret words?

·          Vector representation

12.   De-noising and Contractive are examples of

·         Autoencoders

13.   Gradient at a given layer is the product of all gradients at the previous layers.

·         True

14.   A Deep Belief Network is a stack of Restricted Boltzmann Machines.

·         True

15.   What are the two layers of a Restricted Boltzmann Machine called ?

·         Visible and Hidden

16.   All the Visible Layers in a Restricted Boltzmann Machine are connected to each other.

·         False

17.   Name the component of a Neural Network where the true value of the input is not observed.

·         Hidden Layer

18.   What is the difference between the actual output and generated output known as?

·         Cost

19.   In a Neural Network, all the edges and nodes have the same Weight and Bias values.

·         False

20.   What does LSTM stand for?

·         Long Short Term memory

21.   RELU stands for _______________

·         Rectified Linear Unit

22.   A Shallow Neural Network has only one hidden layer between Input and Output layers.

·         True

23.   Restricted Boltzmann Machine expect the data to be labeled for Training.

·         False

24.   Support Vector Machines, Naive Bayes and Logistic Regression are used for solving _______________________ problems.

·         Classification

25.   _____________ is a recommended Model for Pattern Recognition in Unlabeled Data.

·         Autoencoders

26.   Recurrent Neural Networks are best suited for Text Processing.

·         True



Connect Direct

One point to note below is node_id is for the Unix/Linux server file irrespective of whether it is at source or destination, for Mainframe o...