What Is Legacy Deprecation?

What is legacy deprecation? Itā€™s a cost of technical debt. If youā€™re writing software, you will deprecate legacy software; itā€™s inevitable. First, Iā€™ll classify legacy deprecation, then help you avoid it. Legacy Deprecation The act of deprecating legacy software. Letā€™s define each word separately to clarify. Legacy denoting or relating to software or hardware that has been superseded but is difficult to replace because of its wide use: over half of respondents have cited integration with legacy systems as a problem. ...

What Is Legacy Deprecation?

Learning, Earning, and Growing

Sometimes my wife listens to me complain about work. We know I need a change as my complaints escalate. I ground myself by reflecting on reality. I ask why Iā€™m complaining if Iā€™m learning, earning, and growing. I consider alternatives approaches if my complaints are valid and my LEG needs work. Learning During my career, Iā€™ve experienced peaks & valleys of learning. Early in my career, finding learning opportunities was easy. Iā€™d become proficient at high-demand, high-value activities, but then came typecasting. As for actors, being typecast as a programmer isnā€™t fun. ...

Learning, Earning, and Growing

How Do I Scrape Data From a Web Page?

How do I scrape data from a web page? Facebook wants you to stay on its platform forever. They disallow sending a message to all your friends, so you need to get crafty to escape. How Do I Do It? If youā€™re using Google Chrome, itā€™s straightforward. There are many ways to scrape a web page, but Iā€™m explaining a quick and dirty solution. If you want to escape Facebook, welcome to the club! Try the same method on any web page where you need obfuscated data on a web page. ...

How Do I Use sqlite-utils?

How do I use sqlite-utils? Itā€™s time to learn how to manage an SQLite database. I wrote up a tldr PR for sqlite-utils command, and hereā€™s the usage with a person.db. sqlite-utils A command-line tool used to manage SQLite databases. More information: https://sqlite-utils.datasette.io/en/stable/cli.html Create a database sqlite-utils create-database person.db Create a table sqlite-utils create-table person.db people id integer name text height float photo blob --pk id Upsert a record echo '[ {"id": 1, "name": "Linus Torvalds"}, {"id": 2, "name": "Steve Wozniak"}, {"id": 3, "name": "Tony Hoare"} ]' | sqlite-utils upsert person.db people - --pk id Select records ...

A Blockchain Glossary

A blockchain glossary for programmers. Source: ISO 22739:2020 (en) Blockchain and distributed ledger technologies ā€” Vocabulary 0-9 A asset anything that has value to a stakeholder B block structured data comprisingĀ block dataĀ (3.3)Ā and aĀ block header block data structured data comprising zero or more transaction records or references to transaction records block header structured data that includes a cryptographic link to the previous block unless there is no previous block Note 1 to entry: A block header can also contain a timestamp, a nonce, and other DLT platform specific data, including a hash value of corresponding transaction records. block reward reward given to miners or validators after a block is confirmed in a blockchain system Note 1 to entry: A reward can be in the form of a token or cryptocurrency. blockchain organized in an append-only, sequential chain using cryptographic links Note 1 to entry: Blockchains are designed to be tamper resistant and to create final, definitive and immutable ledger records. blockchain system system that implements a blockchain Note 1 to entry: A blockchain system is a type of DLT system. C confirmed accepted by consensus for inclusion in a distributed ledger confirmed block block that has been confirmed confirmed transaction transaction that has been confirmed consensus agreement among DLT nodes that 1) a transaction is validated and 2) that the distributed ledger contains a consistent set and ordering of validated transactions Note 1 to entry: Consensus does not necessarily mean that all DLT nodes agree. Note 2 to entry: The details regarding consensus differ among DLT designs and this is a distinguishing characteristic between one design and another. consensus mechanism rules and procedures by which consensus is reached crypto-asset digital asset implemented using cryptographic techniques cryptocurrency crypto-asset designed to work as a medium of value exchange Note 1 to entry: Cryptocurrency involves the use of decentralized control and cryptography to secure transactions, control the creation of additional assets, and verify the transfer of assets. cryptographic hash function function mapping binary strings of arbitrary length to binary strings of fixed length, such that it is computationally costly to find for a given output an input that maps to the output, it is computationally infeasible to find for a given input a second input that maps to the same output, and it is computationally infeasible to find any two distinct inputs that map to the same output Note 1 to entry: Computational feasibility depends on the specific security requirements and environment. cryptographic link reference, constructed using a cryptographic hash function technique, that points to data Note 1 to entry: A cryptographic link is used in the block header to reference the previous block in order to create the append-only, sequential chain that forms a blockchain. cryptography discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification D decentralized application (DApp) application that runs on a decentralized system decentralized system distributed system wherein control is distributed among the persons or organizations participating in the operation of the system Note 1 to entry: In a decentralized system, the distribution of control among persons or organizations participating in the system is determined by the systemā€™s design. digital asset asset that exists only in digital form or which is the digital representation of another asset digital signature data which, when appended to a digital object, enable the user of the digital object to authenticate its origin and integrity distributed ledger ledger that is shared across a set of DLT nodes and synchronized between the DLT nodes using a consensus mechanism Note 1 to entry: A distributed ledger is designed to be tamper resistant, append-only and immutable containing confirmed and validated transactions. distributed ledger system system that implements a distributed ledger distributed ledger technology (DLT) technology that enables the operation and use of distributed ledgers distributed ledger technology account (DLT account) representation of an entity participating in a transaction Note 1 to entry: A smart contract, digital asset, or one or more private keys, for example, can be associated with a DLT account. distributed ledger technology address (DLT address) value that identifies a DLT account participating in a transaction distributed ledger technology network (DLT Network) network of DLT nodes which make up a DLT system distributed ledger technology node device or process that participates in a network and stores a complete or partial replica of the ledger records distributed ledger technology oracle (DLT oracle) service that updates a distributed ledger using data from outside of a DLT system Note 1 to entry: DLT oracles are useful for smart contracts that cannot access sources of data external to the DLT system. distributed ledger technology platform (DLT platform) set of processing, storage and communication entities which together provide the capabilities of the DLT system on each DLT node distributed ledger technology user (DLT User) entity that uses services provided by a DLT system distributed system system in which components located on networked computers communicate and coordinate their actions by interacting with each other double spending failure of a DLT platform where the control of a token or crypto-asset is incorrectly transferred more than once Note 1 to entry: Double-spending is most often associated with cryptocurrency. E entity item inside or outside an information and communication technology system, such as a person, an organization, a device, a subsystem, or a group of such items that has recognizably distinct existence F failure oss of ability to perform as required fault tolerance ability of a functional unit to continue to perform a required function in the presence of faults or errors G genesis block first block in a blockchain Note 1 to entry: A genesis block has no previous block and serves to initialize the blockchain. H hard fork change to a DLT platform in which new ledger records or blocks created by the DLT nodes using the new version of the DLT platform are not accepted as valid by DLT nodes using old versions of the DLT platform Note 1 to entry: If not adopted by all DLT nodes, a hard fork can result in a ledger split. Note 2 to entry: In some contexts, the terms "hard fork" and "fork" are sometimes used for a ledger split that results from a hard fork of a DLT platform. hash value string of bits which is the output of a cryptographic hash function I immutability property wherein ledger records cannot be modified or removed once added to a distributed ledger Note 1 to entry: Where appropriate, immutability also presumes keeping intact the order of ledger records and the links between the ledger records interoperability ability of two or more systems or applications to exchange information and to mutually use the information that has been exchanged J K L leaf node node that has no child nodes ledger information store that keeps records of transactions that are intended to be final, definitive and immutable ledger record record containing transaction records, hash values of transaction records, or references to transaction records recorded on a distributed ledger ledger split creation of two or more different versions of a distributed ledger originating from a common starting point with a single history M Merkle root root node of a Merkle tree Merkle tree tree data structure in which every leaf node is labelled with the hash value of a data element and every non-leaf node is labelled with the hash value of the labels of its child nodes miner DLT node which engages in mining mining activity, in some consensus mechanisms, that creates and validates blocks or validates ledger records Note 1 to entry: Participation in mining is often incentivized by block rewards and transaction fees. N node elementary component from which a data structure is built nonce number or bit string used once in a set of cryptographic operations Note 1 to entry: A nonce is often random or pseudo-random. It is commonly used to guard against replay attacks, where a message is captured and re-sent by a malicious actor. In some blockchain systems it is used to modulate mining during the generation of a new block and is stored in the block header O off-chain related to a blockchain system, but located, performed, or run outside that blockchain system on-ledger located, performed, or run inside a DLT system P peer-to-peer relating to, using, or being a network of equal peers that share information and resources with each other directly without relying on a central entity permissioned requiring authorization to perform a particular activity or activities permissioned distributed ledger system (permissioned DLT system) DLT system in which permissions are required permissionless not requiring authorization to perform any particular activity permissionless distributed ledger system (permissionless DLT system) DLT system that is permissionless private distributed ledger system (private DLT system) DLT system that is accessible for use only to a limited group of DLT users Note 1 to entry: Public and private categories apply to DLT users, and permissioned and permissionless categories apply to DLT users and those entities that administer or operate the DLT system. private key key of an entity's asymmetric key pair that is kept secret and which should only be used by that entity prune produce a smaller replica of a distributed ledger by removing all transaction records meeting specified criteria while ensuring that those transactions can be restored with integrity if needed public distributed ledger system (public DLT system) DLT system which is accessible to the public for use public key key of an entity's asymmetric key pair which can be made public public-key cryptography cryptography in which a public key and a corresponding private key are used for encryption and decryption, or are used for verifying digital signatures and digitally signing, respectively Q R record information created, received and maintained as evidence and as an asset by an organization or person, in pursuit of legal obligations or in the transaction of business Note 1 to entry: This term applies to information in any medium, form or format. reward system incentive mechanism method of offering reward for some activities concerned with the operation of a DLT system Note 1 to entry: An example of a reward is a block reward (3.5). root node node that has no parent node S shared ledger distributed ledger in which the content of ledger records is accessible by multiple entities sidechain blockchain system that interoperates with a separate associated blockchain system to perform a specific function in relation to the associated blockchain system Note 1 to entry: By convention the original chain is normally referred to as the "main chain", while any additional blockchains which allow DLT users to transact on the main chain are referred to as "sidechainsā€. smart contract computer program stored in a DLT system wherein the outcome of any execution of the program is recorded on the distributed ledger Note 1 to entry: A smart contract can represent terms in a contract in law and create a legally enforceable obligation under the legislation of an applicable jurisdiction. soft fork change to a DLT platform that is not a hard fork and in which some records or blocks created by the DLT nodes using the old version of the DLT platform are not accepted as valid by DLT nodes using new versions of the DLT platform subchain logically separate chain that can form part of a blockchain system Note 1 to entry: A subchain allows for data isolation and confidentiality. T timestamp time variant parameter which denotes a point in time with respect to a common time reference token digital asset that represents a collection of entitlements transaction smallest unit of a work process, which is one or more sequences of actions required to produce an outcome that complies with governing rules Note 1 to entry: Where appropriate, transaction is understood more narrowly, as the smallest unit of a work process related to interactions with blockchains or distributed ledgers. transaction fee fee paid to miners or validators for inclusion of a transaction in a distributed ledger transaction record record documenting a transaction of any type Note 1 to entry: Transaction records can be included in, or referred to, in a ledger record. Note 2 to entry: Transaction records can include the result of a transaction. trust degree to which a user or other stakeholder has confidence that a product or system will behave as expected by that user or other stakeholder U V validated status of an entity when its required integrity conditions have been checked Note 1 to entry: For example, in a DLT system, a transaction, ledger record, or block can be validated. validation function by which a transaction, ledger record, or block is validated validator entity in a DLT system that participates in validation Note 1 to entry: In some DLT systems the DLT node that has the role of validator can digitally sign a ledger record or block. W X Y Z

How Do I Install Rocky Linux?

How do I install Rocky Linux? Why? Rocky Linux is a community version of Enterprise Linux that tracks slightly ahead of the stable release. Itā€™s enterprise-ready and supported by a large community. Rocky Linux is an excellent choice. How? Download the ISO image, burn it to a CD, or copy it to a USB device. I burned the minimal ISO image to a CD and ran through the installation instructions. ...

How Do I Send Emails With Unix and Gmail?

How do I send emails with Unix and Gmail? Why? If your Unix-based operating system fails, youā€™ll never know if you donā€™t forward system emails. When your system is acting up, it will generate emails. However, a Unix system doesnā€™t send emails by default because spammers hate everyone. How? Install mailx (use a package manager) Edit your mail.rc vi /etc/mail.rc Paste it at the bottom of your mail.rc. set smtp=smtps://smtp.gmail.com:465 set smtp-auth=login set smtp-auth-user=USERNAME@gmail.com set smtp-auth-password=YOURPASSWORD set ssl-verify=ignore set nss-config-dir=/etc/pki/nssdb/ # You might need to adjust this depending on your Unix OS Test it out echo "My Test Message" | mail -v -s "My Test Subject" email@some.domain.tld If youā€™re lucky, youā€™ll see something like this and an email in your inbox. Resolving host smtp.gmail.com . . . done. Connecting to 74.125.199.108:465 . . . connected. 220 smtp.gmail.com ESMTP u12-20020a17090a890c00b001b8efcf8e48sm12327759pjn.14 - gsmtp >>> EHLO homelab.is-leet.com 250-smtp.gmail.com at your service, [50.126.101.7] 250-SIZE 35882577 250-8BITMIME 250-AUTH LOGIN PLAIN XOAUTH2 PLAIN-CLIENTTOKEN OAUTHBEARER XOAUTH 250-ENHANCEDSTATUSCODES 250-PIPELINING 250-CHUNKING 250 SMTPUTF8 >>> AUTH LOGIN 334 VXNlcm5hbWU6 >>> amVmZmFiYWlsZXlAZ21haWwuY29t 334 UGFzc3dvcmQ6 >>> eHZhdHNldXhzb3FvcGt3ZA== 235 2.7.0 Accepted >>> MAIL FROM:<jeff@homelab.is-leet.com> 250 2.1.0 OK u12-20020a17090a890c00b001b8efcf8e48sm12327759pjn.14 - gsmtp >>> RCPT TO:<jeffabailey@gmail.com> 250 2.1.5 OK u12-20020a17090a890c00b001b8efcf8e48sm12327759pjn.14 - gsmtp >>> DATA 354 Go ahead u12-20020a17090a890c00b001b8efcf8e48sm12327759pjn.14 - gsmtp >>> . 250 2.0.0 OK 1650153154 u12-20020a17090a890c00b001b8efcf8e48sm12327759pjn.14 - gsmtp >>> QUIT 221 2.0.0 closing connection u12-20020a17090a890c00b001b8efcf8e48sm12327759pjn.14 - gsmtp Have a great day! šŸ˜Ž ...

How Do I Use Replit?

How do I use replit? It depends. I have a few use cases, but the use cases are numerous. If you need to know what replit is, read this next section. What Is Replit? Replit is a web-based integrated development environment (IDE). In contrast to Replit, you could learn GitHub and use Visual Studio Code in a browser. Use Cases? Embed code on your website. Quick and easy code learning. Teaching Hosting Pair Programming How Do I Use Replit? I would start with the tutorials, but you can skip those and take a short tour. ...

Learn Java Coding Challenges

The Basics Part of your toolkit when interviewing is understanding common coding challenges. Quickly jumping through interview code challenge hoops will increase your chances of landing a job. This is a painful truth, but it is what it is. To help you succeed at your next interview, I have laid out some tips and code for you. Primary Use Cases Landing a job Improving your code Increasing your understanding Less Suitable Use Cases Actual code, on the job, in most cases When to Use Java Coding Challenges? Use Java coding challenges when youā€™re preparing for a job interview. Java coding challenges are a great way to practice your coding skills and improve your problem-solving abilities. ...

How Do I Use Google?

How do I use Google? Strap in, and letā€™s learn some google-fu. šŸ¤ŗ Double Quotes Wrap your keywords in double quotes like this. "google fu" Try it out: https://www.google.com/search?q=ā€œgoogle+fuā€ Google will only return pages with ā€œgoogle-fuā€ in the content. Exclude Keyword Building on the previous example. "google fu" -medium Iā€™m not fond of Medium, so Iā€™ll keep that out of my results. Try it out: https://www.google.com/search?q=ā€œgoogle+fuā€+-medium Search One Site I bet Urban Dictionary has something to say about google-fu. ...