Flex Layout in Angular featured image

Implementing Flex Layout in Angular: A How-To Guide

Introduction CSS Flex Layout is used to create flexible fluid layouts. However, when using Angular there are scenarios when we need more dynamic control over the layouts. Further, using CSS Flexbox requires complicated styling which can be hard for many developers. Flex Layout is a component engine that aims to solve this problem. It provides a set of directives that …

Angular Router featured image

Navigation with RouterLink, Navigate, and NavigateByUrl in Angular Router

Introduction Angular applications are very common these days. They are built with the concept of Single Page Applications (SPA). In such applications, routing across the web pages is different from traditional websites since components are used. In Angular, you need to use RouterLink for navigation to route across the application. RouterLink is a directive, and it provides Router.navigate and Router.navigateByURL

Confifuring VNC featured image

Installing and Configuring Virtual Network Computing (VNC) on Ubuntu 20.04

Virtual Network Computing (VNC) is a screen-sharing system used to access graphical user interfaces remotely. It uses the remote frame buffer protocol allowing one server (user side) to connect with another side (client). VNC is safe, secure, and works on all operating systems. RealVNC, UltraVNC, Xfce, TightVNC, to name a few, are the most popular VNC clients used today. Among …

Redis Server post featured image

Setting Up a Redis Server as a Session Handler for PHP on Ubuntu 20.04

Redis is an open-source in-memory cache and storage system, also referred to as a data structure server. It offers advanced support for several data types, such as hashes, lists, sets, bitmaps, and many more. Because of its excellent performance, Redis finds its popularity in leading industries and top MNCs. Benefits of Redis When it comes to speed, there is no …

R on Ubuntu featured image

Installing R on Ubuntu 21.04: A Tutorial

R is a programming language that specializes in working with data. R is free software that supports an extensive catalog of statistical and graphical methods. The list includes various machine learning algorithms, time series, linear regression, and more. It’s used by industry giants like Google, Facebook, Airbnb, Uber, etc. As the description suggests, R is the go-to option when big …

JSON.parse() and JSON.stringify() featured image

A Tutorial on Working with JSON.parse() and JSON.stringify()

JSON stands for JavaScript Object Notation. It is used to describe JavaScript objects. It is a data-sharing format that specifies data values using key-value pairs. The JSON object is supported across all major browsers. This tutorial requires that you are familiar with JavaScript and working with the JSON object. To get familiar with JSON, you can take a look at …

Port Forwarding featured image

Forwarding Ports with Iptables in Linux: A How-To Guide

Port forwarding also referred to as port mapping, is a method for allowing remote devices to connect to a specific service within your private local-area network (LAN). As the name suggests, the process involves forwarding requests for a specific port to another port or network. It modifies the destination of the packet in-flight and is considered a type of network …

Kubernetes DNS service featured image

Kubernetes DNS Service: A Beginner’s Guide

Kubernetes, also known as K8s, is an open-source orchestration system for automating deployment, scaling, and managing containerized applications. Its portability, flexibility, and automatic scaling capabilities make it an extensively used system. Above all the standout features, the option to create DNS records for services and pods makes it unbeatable from other software systems. Kubernetes DNS service allows you to contact …

Generating SSH Key Pairs with PuTTY featured image

Generating SSH Key Pairs with PuTTY to Connect to a VPS

Security is a prime consideration for server admins, especially when there is a need to access servers remotely at regular intervals. Protection from cyber-attacks is of crucial importance to streamline workflows and to ensure business continuity. The standard practice of using a username and password is highly insecure, unsafe, and ineffective. You need a robust and advanced method like SSH …

Overview of DNS Terminologies, Components, and Concepts featured image

Overview of DNS Terminologies, Components, and Concepts

DNS (Domain Name System) is one of the crucial components driving the internet. Having a proper understanding of how DNS works can help diagnose problems with website configuration and broaden your understanding of what’s going on behind the scenes. In this guide, we’ll talk about some fundamental concepts of DNS to provide you with a solid ground while working with …

Functions in Python featured image

Defining Functions in Python 3: A Tutorial

In programming, a function is described as a block of instructions that can perform a certain action. A function is generally re-usable. Using functions makes the code more modular. It also opens up the opportunity of re-using the code over and over again in the future. Python is a robust programming language that supports functions. It already comes with a …

HTTP Error Codes featured image

Troubleshooting Common HTTP Error Codes

Any web server receiving an HTTP request is responded to with an HTTP status code. These codes are short notes from the server describing the situation. It doesn’t contain any actual site content. Instead, it’s a report of how things went after receiving the HTTP request. In many situations, these codes are important to diagnose various server/client issues. These codes …