Posted in My POVs

My BootCamp Journey

I’m penning down everything because I felt it to write down everything maybe someday someone or I come down to read this post again and remember the gone days! So this is not about any ‘promotional content sharing’. These are my own stories originally wrote by my conscious mind!
Go ahead and read it!
And give me your thoughts on my thoughts!
Thanks! ūüėÄ

Continue reading “My BootCamp Journey”

Posted in My POVs

Living a Commuter Life

There was a time when I was like, “Why No one is giving me opportunities?”. And Now, Here I’m enrolling in more than 450 online courses, with 4 on-going college projects and responsibilities of working as a significant person in NGO.
Sometimes when I feel like it’s a lot to take in, I pause/quit everything and sleep straight for hours. But that’s bad, right?
I mean you cannot escape from reality and jump into a black hole where no one can reach you. On the other side, working like a computer having no life inside is also not a great idea to think about.

Continue reading “Living a Commuter Life”

Posted in Movies

Spiderman Homecoming 2017 Dual Audio 720p BRRIp HEVC

Genre: Action, Adventure, Sci-Fi 
Size: 700Mb

Language: English¬†‚Äď Hindi¬†
QUALITY: 720p BRRip x265 HEVC

Director: Jon Watts 
Stars: Tom Holland, Michael Keaton, Robert Downey Jr.

Story‚Ķ.Thrilled by his experience with the Avengers, Peter returns home, where he lives with his Aunt May, under the watchful eye of his new mentor Tony Stark, Peter tries to fall back into his normal daily routine ‚Äď distracted by thoughts of proving himself to be more than just your friendly neighborhood Spider-Man ‚Äď but when the Vulture emerges as a new villain, everything that Peter holds most important will be threatened.

Download Link:
Click here to Download the file [Screenshots are in the link]

Posted in Daily Gyan

Ghost Imaging


Ghost imaging often called cloning, is a software-driven data backup process that copies the contents of a computer hard disk in a single compressed file or set of files, referred to as an image. The ghost image copies the entire contents to another server or hard disk for storage, including configuration information and applications. The software also converts a ghost image back to its original form when needed. On personal computers (PCs), ghost imaging is used to back up everything on the hard disk, often while reinstalling an operating system (OS).

The purpose of the ghost image is to allow the cloning of the system onto other systems or to enable a quick restore of a system. Ghost imaging is often used to quickly set up blocks of notebooks, tablets or servers. It enables migration from one disk or PC to another, for example, to transfer from a hard disk to a solid-state drive.

How ghost imaging works

Ghost imaging usually creates a disk image of the software on a computer, including systems settings and details. That image allows quick installation of a new copy. The ghost image is often compressed to save space and speed up transfers to the target system, and it may be encrypted for security. A typical cloning setup has a number of alternative images in a library.

Ghost imaging tools can make hundreds of PCs as exact copies. A master machine is built, and its hard disk is imaged to a file. Then, all the other machines have that image applied, followed by a customization process that gives the installed OS its own identity.

Pros and cons of ghost imaging

Ghost imaging is much faster than installing each machine separately, especially if it involves installing many applications.

There are different types of ghost images, depending on use case. For example, a data center supporting many mobile devices and desktops will need a tool focused on updating mobiles in batches, as well as individual restores. A cloud cluster will likely only use the imaging tools that are part of the cloud software stack. High-performance computing setups use ghosting to create images across hundreds or thousands of servers.

Ghosting can save hours of setup time compared with loading programs from scratch, and it reduces errors in the process.

However, updates are not incremental. When the new image replaces the OS on the destination, local user data or customization is lost.

Images are tied tightly to one hardware platform. If an organization has many different target-system types, creating and managing images is difficult.

Support can also be a challenge. For example, Microsoft does not support image-based cloning of installed Windows systems.

History of ghost imaging

New Zealand entrepreneur Murray Haszard developed “ghost,” an acronym for “general hardware-oriented system transfer,” in the mid-1990s. Symantec Corp. acquired the backup and disk cloning technology in 1998 and integrated it into its Norton product line, now called the Symantec Ghost Solution Suite.

At the time, Ghost was the only easily available product that could take an image of an entire hard drive. Ghost could either save the image as a file on another drive or transfer the image to another hard drive, making the new drive an exact copy of the old drive.

Examples of ghost imaging software and alternatives

Symantec Ghost Solution Suite 3.2, released in 2017, includes disk image capture and deployment; Windows, Apple and Linux support; a streamlined, no-cost database option for small environments; and XFS file system support.

Alternatives to Symantec Ghost imaging software include:

  • Acronis True Image, targeting the Windows market;
  • Open source¬†tools such as¬†Clonezilla, dd, and Partimage;
  • EaseUS Todo Backup;
  • StorageCraft drive imaging tools; and
  • NetApp for rapid image distribution.

In addition,¬†OpenStack¬†cloud software and major¬†cloud service providers¬†maintain image cloning tools and libraries. Cloud imaging tools fulfill a similar function within a cloud’s cluster but are limited to the specific cloud type.

Microsoft and Apple provide tools for creating clones that are a mixture of an image manager and a ghosting tool.

SmartDeploy takes a different approach, cloning to a virtual machine it creates on the target system, which allows a platform-independent ghosting process.

Ghost imaging and disaster recovery

Having a loadable image for all or part of the data involved makes disaster recovery easier. For example, recovering a crashed desktop to a new PC typically involves loading an image containing the OS, with settings, followed by an image containing user applications. The same is true at the server level, except that settings for networking and security will be added.

The gear is restored to a point in time, with the ghosting utility determining how frequently data is added to the clone image. Proper use of networked storage as a replica point for current data can limit data loss to virtually nothing.

Ghost imaging vs. disk cloning

Disk cloning¬†is the act of copying the contents of a computer’s hard drive. The contents are typically saved as a disk image file and transferred to a storage medium, such as another computer’s hard drive.

Disk cloning is used for system recovery, as a public computer’s¬†reboot¬†and refreshing, and for recreating a system configuration on a new computer. The term can be used interchangeably with ghost imaging.


Posted in Daily Gyan

Intelligent Electronic Device (IED)

An intelligent electronic device (IED) is a device that is added to industrial control systems (ICS) to enable advanced power automation.

There are many types of IEDs made by manufacturers and used for a host of purposes in power monitoring, metering, control and communications.

Found everywhere industrial control systems such as such as supervisory control and data acquisition (SCADA) or distributed control systems (DCS) are used, IEDs are part of the systems used in several processes, including:

  • Agrochemical and fertilizer
  • Automobile manufacturing
  • Boiler controls and power plant
  • Chemical plants
  • Environmental control
  • Food and food processing
  • Metal and mines
  • Metallurgical process plants
  • Power plants
  • Petrochemical (oil) and refineries
  • Pharmaceutical manufacturing
  • Pulp and Paper Mills
  • Quality control
  • Sewage treatment plants
  • Sugar refining plants
  • Water management
  • Water treatment plants

IEDs are a part of the power regulation used in many industrial processes like control circuit breakers, capacitor bank switches, and voltage regulators. These settings are controlled by way of a settings file. The creation and testing of the file are part of the largest tasks involved in IEDs.

Utilities that operate power transmission stations were some of the first to use IEDs. This early adoption was implemented not only to meet compliance requirements but also to save money. One instance of this implementation is the IEDs for power fault reporting in the event of failures. The use of IEDs here meant that a highly paid skilled technician would not have to drive to a potentially remote power transmission station to retrieve the diagnostic data.

Although IEDs and the resulting automation can save money, it is important to consider that they may have maintenance costs such as firmware updates and secure configuration. Cost-benefit analysis should be undertaken to ensure that the costs are not outweighed by the savings. Operations on over a thousand devices, with costs ranging into $100 an hour, are where automation starts to be more cost-efficient.


Posted in Daily Gyan


What does it mean?

Skunkworks refers to advanced development projects that are sometimes top-secret (such as black projects) in technology, business, and aerospace engineering.

Skunkworks teams develop tasks efficiently with nominal management limitations. With a direct focus on revolutionized business and technology changes, skunkworks is independent, highly secretive, innovative and well-funded.

Detailed Version.

A skunkworks team often begins a project for future conventional development. Teams have few members for communication overhead reduction.

Skunkworks team objectives include:

  • Produce fast results and commercially sustainable and top-quality projects
  • Empower teams and project managers beyond standard expectations
  • Create the finest multi-disciplinary teams
  • Efficiently produce or advance prototypes with marginal external assistance or knowledge

Lockheed Martin Corporation refers to its skunkworks projects as “Skunk Works” and, formally, as Advanced Development Programs (ADP). Because the general skunkworks term originated from Alfred Gerald Caplin‚Äôs (Al Capp) Li’l Abner comic strip, Lockheed’s ADP group and logo are trademarked as Skunk Works.

Lockheed’s original use of the skunkworks term remains a mystery, but there is a consensus that the term was first introduced during World War II by Lockheed engineers charged with the construction of a U.S. government fighter jet.