Books by Ankam Ravi Kumar
Server-Computer.com, 2018
Amazon Web Services Practice Lab Guide. Absolute beginners can try this lab practice guide.
Topi... more Amazon Web Services Practice Lab Guide. Absolute beginners can try this lab practice guide.
Topics Covered in this Lab Guide are below
Table of Contents | Page Number
About Author 5
Services we provide to our customers 6
Cloud Computing Models 7
Infrastructure as a Service (IaaS): 7
Platform as a Service (PaaS): 7
Software as a Service (SaaS): 7
Amazon Free Tier Account Creation 8
Enabling Multi-Factor Authentication to Secure Your Access 12
Creating First Linux Instance 16
Creating Amazon Machine Image (AMI) 21
Create your First EC2 windows instance 23
Assigning Elastic IP Addresses to Instance (Static IP Address) 27
Launching RDS Instance 28
Accessing MySQL Instance Using Workbench 36
AWS S3 Bucket – (Object Storage) 41
AWS S3 Lifecycle Management 43
S3 Bucket Replication to Cross-Region 46
S3 Bucket Policies to control Access 47
VPC – Virtual Private Cloud (isolated Network) 48
Create subnets 51
Create Internet gateway and attach to VPC 52
Create Virtual Private Gateway and Attach to VPC 52
Create route tables and attach to subnets 53
AWS Elastic Load Balancer (ELB) 56
AWS CloudTrail – Enable Governance and Auditing 60
How to Create CloudTrail 60
Athena Analytics 61
AWS Services and abbreviations 67
Bookmarks Related papers MentionsView impact
Understand and use essential tools
Access a shell prompt and issue commands with correct ... more Understand and use essential tools
Access a shell prompt and issue commands with correct syntax
Use input-output redirection (>, >>, |, 2>, etc.)
Use grep and regular expressions to analyze text
Access remote systems using ssh
Log in and switch users in multiuser targets
Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
Create and edit text files
Create, delete, copy, and move files and directories
Create hard and soft links
List, set, and change standard ugo/rwx permissions
Locate, read, and use system documentation including man, info, and files in /usr/share/doc
Operate running systems
Boot, reboot, and shut down a system normally
Boot systems into different targets manually
Interrupt the boot process in order to gain access to a system
Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes
Locate and interpret system log files and journals
Access a virtual machine's console
Start and stop virtual machines
Start, stop, and check the status of network services
Securely transfer files between systems
Configure local storage
List, create, delete partitions on MBR and GPT disks
Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes
Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
Add new partitions and logical volumes, and swap to a system non-destructively
Create and configure file systems
Create, mount, unmount, and use vfat, ext4, and xfs file systems
Mount and unmount CIFS and NFS network file systems
Extend existing logical volumes
Create and configure set-GID directories for collaboration
Create and manage Access Control Lists (ACLs)
Diagnose and correct file permission problems
Deploy, configure, and maintain systems
Configure networking and hostname resolution statically or dynamically
Schedule tasks using at and cron
Start and stop services and configure services to start automatically at boot
Configure systems to boot into a specific target automatically
Install Red Hat Enterprise Linux systems as virtual guests
Configure systems to launch virtual machines at boot
Configure network services to start automatically at boot
Configure a system to use time services
Install and update software packages from Red Hat Network, a remote repository, or from the local file system
Update the kernel package appropriately to ensure a bootable system
Modify the system bootloader
Manage users and groups
Create, delete, and modify local user accounts
Change passwords and adjust password aging for local user accounts
Create, delete, and modify local groups and group memberships
Configure a system to use an existing authentication service for user and group information
Manage security
Configure firewall settings using firewall-config, firewall-cmd, or iptables
Configure key-based authentication for SSH
Set enforcing and permissive modes for SELinux
List and identify SELinux file and process context
Restore default file contexts
Use boolean settings to modify system SELinux settings
Diagnose and address routine SELinux policy violations
Bookmarks Related papers MentionsView impact
RHCSA Red Hat Certified System Administrator - Linux Certification Video Tutorial from scratch wh... more RHCSA Red Hat Certified System Administrator - Linux Certification Video Tutorial from scratch who are looking forward to learn and earn Linux certification they can simply follow this video tutorial and do practice along with videos so that you can earn Linux Certification. This Video Course made keeping illiterate Or who does not know about Linux can start learning from this video series. Red Hat Enterprise Linux 7 and Centos 7 is used in this course videos. Linux has revolutionized the way computers work, from chips to phones to desktops, there isn't anything that Linux has not powered. It can be found in your phones, cars, computers and even refrigerators. Remember Android Phone as Well, Android is based on the Linux OS, and designed using Linux. Let's Start Learning Linux froms scratch have bright future a ahead.
Bookmarks Related papers MentionsView impact
This document will guide you to know about Redhat enterprise Linux and its features. It will guid... more This document will guide you to know about Redhat enterprise Linux and its features. It will guide you to install and configure the Server.
Bookmarks Related papers MentionsView impact
Papers by Ankam Ravi Kumar
RHCSA Objectives Understand and use essential tools for handling files, directories, command-li... more RHCSA Objectives Understand and use essential tools for handling files, directories, command-line environments, and documentation Operate running systems, including booting into different run levels, identifying processes, starting and stopping virtual machines, and controlling services Configure local storage using partitions and logical volumes Create and configure file systems and file system attributes, such as permissions, encryption, access control lists, and network file systems Deploy, configure, and maintain systems, including software installation, update, and core services Manage users and groups, including use of a centralized directory for authentication Manage security, including basic firewall and SELinux configuration
Bookmarks Related papers MentionsView impact
Q1) What is AWS?
AWS stands for Amazon Web Services. AWS is a platform that provides on-demand r... more Q1) What is AWS?
AWS stands for Amazon Web Services. AWS is a platform that provides on-demand resources for hosting web services, storage, networking, databases and other resources over the internet with a pay-as-you-go pricing.
Q2) What are the components of AWS?
EC2 – Elastic Compute Cloud, S3 – Simple Storage Service, Route53, EBS – Elastic Block Store, Cloudwatch, Key-Paris are few of the components of AWS.
Q3) What are key-pairs?
Key-pairs are secure login information for your instances/virtual machines. To connect to the instances we use key-pairs that contain a public-key and private-key.
Q4) What is S3?
S3 stands for Simple Storage Service. It is a storage service that provides an interface that you can use to store any amount of data, at any time, from anywhere in the world. With S3 you pay only for what you use and the payment model is pay-as-you-go.
Bookmarks Related papers MentionsView impact
Intelligent Knowledge-Based Systems, 2005
Markets are dynamic environments where competing firms are engaging in a continuous struggle to m... more Markets are dynamic environments where competing firms are engaging in a continuous struggle to maintain their market position. Often, firms that have established their presence in the market, are forced to confront new firms attempting to enter the market. In addition, firms have to deal with new products offered by existing competitors. Consider for example the case of the computer
Bookmarks Related papers MentionsView impact
Educational Quest- An International Journal of Education and Applied Social Sciences, 2014
ABSTRACT
Bookmarks Related papers MentionsView impact
Journal of Thrombosis and Thrombolysis, 2017
Resistance to APC (APCR) is a very important cause of thrombophilia and most frequently caused by... more Resistance to APC (APCR) is a very important cause of thrombophilia and most frequently caused by the Leiden mutation. APCR is also seen in the absence of FV Leiden and associated with elevated levels of factor V (FV), factor VIII (FVIII) and antiphospholipid antibodies (APLAs). The aim of this prospective case control study was to find out the frequency and role of FV, FVIII and APLAs in the pathogenesis of APCR in FV Leiden negative deep vein thrombosis (DVT) patients in India. A total 30 APCR positive and FV Leiden negative patients with DVT and similar number of age and sex matched healthy controls were recruited. Significantly higher mean FVIII levels were observed in patients as compared to controls [patients: 132.3 ± 30.7 IU/ml, controls: 117.5 ± 17.7 IU/ml, p = 0.025]. A significant negative correlation was also observed between FVIII and APC ratio (Pearson correlation = 0.368, p = <0.001). Mean FV levels in patients [107.1 ± 13.1 IU/ml] and controls [102 ± 11.9 IU/ml] were not statistically significant (p = 0.119). Anti β2 glycoprotein I (Anti-β2-GPI, IgG) showed significant association with APCR phenotype (p = 0.050), unlike other factors such as protein C, protein S, lupus anticoagulant and anticardiolipin antibodies. The strong association of FVIII and anti-β2 GPI (IgG) antibodies with APCR phenotype is suggestive of incorporation of these factors in APCR positive DVT patients in the absence of FV Leiden mutation in India. However more studies in large sample size are required for setting up the proper investigation protocol in these patients.
Bookmarks Related papers MentionsView impact
Proceedings of the 11th IEEE International Conference on Networking, Sensing and Control, 2014
ABSTRACT We study the problem of sensor node localization for a hybrid wireless sensor network de... more ABSTRACT We study the problem of sensor node localization for a hybrid wireless sensor network deployed in a precision agriculture farm, with nodes located both underground and above-ground. We consider received signal strength measurements from unmodulated signals transmitted between neighboring sensor nodes and between satellite nodes and sensor nodes for ranging purposes. While this paper studies the network based localization of sensors, placed in multiple media, based on the measurements of received signal strengths, in a companion paper we study the same problem based on the time of arrival measurements. The localization problem is formulated with the goal of parameter estimation of the joint distribution of the ranging measurements. First, we arrive at power fading models for the two communication scenarios in our network to model the received signal strength in terms of propagation distance and hence, the participating nodes' location coordinates. We account for various signal degradation effects such as fading, reflection, transmission, and signal interference. Then, we formulate maximum likelihood optimization problems to estimate the nodes' location coordinates using the derived statistical models. We also present a sensitivity analysis of the estimates with respect to the soil complex permittivity and magnetic permeability.
Bookmarks Related papers MentionsView impact
International Orthopaedics, Jun 1, 2009
Bookmarks Related papers MentionsView impact
Industrial Engineering Chemistry Research, 1989
An adiabatic equilibrium model to simulate the blowdown step of a pressure swing adsorption proce... more An adiabatic equilibrium model to simulate the blowdown step of a pressure swing adsorption process is presented. The partial differential equations describing the mass and heat balances for the desorption of a bulk binary gas mixture are reduced to simple first-...
Bookmarks Related papers MentionsView impact
We obtain static gauge field configurations for SU(2) Yang-Mills gauge theory in the absence of c... more We obtain static gauge field configurations for SU(2) Yang-Mills gauge theory in the absence of chromo-magnetic field. We also present a systematic way to obtain such configurations for SU(3) and SU(4) YM gauge theories by realizing their Lie algebras in terms of SU(2). Generalization of our method to SU(N) gauge theory with N>2 is straight forward. The gauge fields thus obtained are complex. We investigated the issue of uniform as well as real chromo-electric field with these configurations. Furthermore, we investigated the possible class of vacuum solutions for the gauge fields and found that they are gauge inequivalent to the usual vacuum configuration $A^a_{\mu}=0$.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Genetica, Jul 1, 2011
NCU04379 gene encodes a conserved Ca(2+) and/or calmodulin binding protein that possesses a conse... more NCU04379 gene encodes a conserved Ca(2+) and/or calmodulin binding protein that possesses a consensus signal for N-terminal myristoylation and four EF-hands, characteristics of Neuronal Calcium Sensor-1proteins. The NCU04379.2 knockout mutant shows slow growth rate, increased sensitivity to calcium and ultraviolet (UV) irradiation, and a wild-type fragment carrying NCU04379 gene complements the mutant. Therefore, NCU04379 gene has a role in growth, calcium stress tolerance, and UV survival. Crosses homozygous for ΔNCU04379.2 mutant strains were fully fertile; however, we found evidence for involvement of Ca(2+)/calmodulin-dependent protein kinase encoding genes NCU02283 and NCU09123 in sexual development.
Bookmarks Related papers MentionsView impact
Proceedings of the 15th Acm Sigkdd International Conference on Knowledge Discovery and Data Mining, Jun 28, 2009
Abstract Web logs record the primary interaction of users with web pages in general and search en... more Abstract Web logs record the primary interaction of users with web pages in general and search engines in particular. There are two sources for such logs: user trails obtained from toolbars and query/click information obtained from search engines. In this talk we will address the task of mining this rich data to improve user experience on the web. We will illustrate a few applications, together with the modeling and algorithmic challenges that stem from these applications. We will also discuss the privacy issues that arise in this context.
Bookmarks Related papers MentionsView impact
Chem Mater, 1993
... 251 Carbon Monoxide Promoted Chemical Vapor Deposition of Copper' Ravi Kumar and Andrew ... more ... 251 Carbon Monoxide Promoted Chemical Vapor Deposition of Copper' Ravi Kumar and Andrew W. Maverick' Department of Chemistry, Louisiana State University Baton Rouge, Louisiana 70803 ... Chem. SOC. 1988,110,4221. Macomber, DW; Rausch, MDJ Am. Chem. SOC. ...
Bookmarks Related papers MentionsView impact
International Journal of Marketing and Management Research, 2011
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
They, therefore, start buying such shares, ultimately raising the stock prices. In another panora... more They, therefore, start buying such shares, ultimately raising the stock prices. In another panorama, a company unveils some major deal, which is being seen as value addition to the company, and eventually to the shareholders' wealth. Such deals may be any mega ...
Bookmarks Related papers MentionsView impact
Uploads
Books by Ankam Ravi Kumar
Topics Covered in this Lab Guide are below
Table of Contents | Page Number
About Author 5
Services we provide to our customers 6
Cloud Computing Models 7
Infrastructure as a Service (IaaS): 7
Platform as a Service (PaaS): 7
Software as a Service (SaaS): 7
Amazon Free Tier Account Creation 8
Enabling Multi-Factor Authentication to Secure Your Access 12
Creating First Linux Instance 16
Creating Amazon Machine Image (AMI) 21
Create your First EC2 windows instance 23
Assigning Elastic IP Addresses to Instance (Static IP Address) 27
Launching RDS Instance 28
Accessing MySQL Instance Using Workbench 36
AWS S3 Bucket – (Object Storage) 41
AWS S3 Lifecycle Management 43
S3 Bucket Replication to Cross-Region 46
S3 Bucket Policies to control Access 47
VPC – Virtual Private Cloud (isolated Network) 48
Create subnets 51
Create Internet gateway and attach to VPC 52
Create Virtual Private Gateway and Attach to VPC 52
Create route tables and attach to subnets 53
AWS Elastic Load Balancer (ELB) 56
AWS CloudTrail – Enable Governance and Auditing 60
How to Create CloudTrail 60
Athena Analytics 61
AWS Services and abbreviations 67
Access a shell prompt and issue commands with correct syntax
Use input-output redirection (>, >>, |, 2>, etc.)
Use grep and regular expressions to analyze text
Access remote systems using ssh
Log in and switch users in multiuser targets
Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
Create and edit text files
Create, delete, copy, and move files and directories
Create hard and soft links
List, set, and change standard ugo/rwx permissions
Locate, read, and use system documentation including man, info, and files in /usr/share/doc
Operate running systems
Boot, reboot, and shut down a system normally
Boot systems into different targets manually
Interrupt the boot process in order to gain access to a system
Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes
Locate and interpret system log files and journals
Access a virtual machine's console
Start and stop virtual machines
Start, stop, and check the status of network services
Securely transfer files between systems
Configure local storage
List, create, delete partitions on MBR and GPT disks
Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes
Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
Add new partitions and logical volumes, and swap to a system non-destructively
Create and configure file systems
Create, mount, unmount, and use vfat, ext4, and xfs file systems
Mount and unmount CIFS and NFS network file systems
Extend existing logical volumes
Create and configure set-GID directories for collaboration
Create and manage Access Control Lists (ACLs)
Diagnose and correct file permission problems
Deploy, configure, and maintain systems
Configure networking and hostname resolution statically or dynamically
Schedule tasks using at and cron
Start and stop services and configure services to start automatically at boot
Configure systems to boot into a specific target automatically
Install Red Hat Enterprise Linux systems as virtual guests
Configure systems to launch virtual machines at boot
Configure network services to start automatically at boot
Configure a system to use time services
Install and update software packages from Red Hat Network, a remote repository, or from the local file system
Update the kernel package appropriately to ensure a bootable system
Modify the system bootloader
Manage users and groups
Create, delete, and modify local user accounts
Change passwords and adjust password aging for local user accounts
Create, delete, and modify local groups and group memberships
Configure a system to use an existing authentication service for user and group information
Manage security
Configure firewall settings using firewall-config, firewall-cmd, or iptables
Configure key-based authentication for SSH
Set enforcing and permissive modes for SELinux
List and identify SELinux file and process context
Restore default file contexts
Use boolean settings to modify system SELinux settings
Diagnose and address routine SELinux policy violations
Papers by Ankam Ravi Kumar
AWS stands for Amazon Web Services. AWS is a platform that provides on-demand resources for hosting web services, storage, networking, databases and other resources over the internet with a pay-as-you-go pricing.
Q2) What are the components of AWS?
EC2 – Elastic Compute Cloud, S3 – Simple Storage Service, Route53, EBS – Elastic Block Store, Cloudwatch, Key-Paris are few of the components of AWS.
Q3) What are key-pairs?
Key-pairs are secure login information for your instances/virtual machines. To connect to the instances we use key-pairs that contain a public-key and private-key.
Q4) What is S3?
S3 stands for Simple Storage Service. It is a storage service that provides an interface that you can use to store any amount of data, at any time, from anywhere in the world. With S3 you pay only for what you use and the payment model is pay-as-you-go.
Topics Covered in this Lab Guide are below
Table of Contents | Page Number
About Author 5
Services we provide to our customers 6
Cloud Computing Models 7
Infrastructure as a Service (IaaS): 7
Platform as a Service (PaaS): 7
Software as a Service (SaaS): 7
Amazon Free Tier Account Creation 8
Enabling Multi-Factor Authentication to Secure Your Access 12
Creating First Linux Instance 16
Creating Amazon Machine Image (AMI) 21
Create your First EC2 windows instance 23
Assigning Elastic IP Addresses to Instance (Static IP Address) 27
Launching RDS Instance 28
Accessing MySQL Instance Using Workbench 36
AWS S3 Bucket – (Object Storage) 41
AWS S3 Lifecycle Management 43
S3 Bucket Replication to Cross-Region 46
S3 Bucket Policies to control Access 47
VPC – Virtual Private Cloud (isolated Network) 48
Create subnets 51
Create Internet gateway and attach to VPC 52
Create Virtual Private Gateway and Attach to VPC 52
Create route tables and attach to subnets 53
AWS Elastic Load Balancer (ELB) 56
AWS CloudTrail – Enable Governance and Auditing 60
How to Create CloudTrail 60
Athena Analytics 61
AWS Services and abbreviations 67
Access a shell prompt and issue commands with correct syntax
Use input-output redirection (>, >>, |, 2>, etc.)
Use grep and regular expressions to analyze text
Access remote systems using ssh
Log in and switch users in multiuser targets
Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
Create and edit text files
Create, delete, copy, and move files and directories
Create hard and soft links
List, set, and change standard ugo/rwx permissions
Locate, read, and use system documentation including man, info, and files in /usr/share/doc
Operate running systems
Boot, reboot, and shut down a system normally
Boot systems into different targets manually
Interrupt the boot process in order to gain access to a system
Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes
Locate and interpret system log files and journals
Access a virtual machine's console
Start and stop virtual machines
Start, stop, and check the status of network services
Securely transfer files between systems
Configure local storage
List, create, delete partitions on MBR and GPT disks
Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes
Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
Add new partitions and logical volumes, and swap to a system non-destructively
Create and configure file systems
Create, mount, unmount, and use vfat, ext4, and xfs file systems
Mount and unmount CIFS and NFS network file systems
Extend existing logical volumes
Create and configure set-GID directories for collaboration
Create and manage Access Control Lists (ACLs)
Diagnose and correct file permission problems
Deploy, configure, and maintain systems
Configure networking and hostname resolution statically or dynamically
Schedule tasks using at and cron
Start and stop services and configure services to start automatically at boot
Configure systems to boot into a specific target automatically
Install Red Hat Enterprise Linux systems as virtual guests
Configure systems to launch virtual machines at boot
Configure network services to start automatically at boot
Configure a system to use time services
Install and update software packages from Red Hat Network, a remote repository, or from the local file system
Update the kernel package appropriately to ensure a bootable system
Modify the system bootloader
Manage users and groups
Create, delete, and modify local user accounts
Change passwords and adjust password aging for local user accounts
Create, delete, and modify local groups and group memberships
Configure a system to use an existing authentication service for user and group information
Manage security
Configure firewall settings using firewall-config, firewall-cmd, or iptables
Configure key-based authentication for SSH
Set enforcing and permissive modes for SELinux
List and identify SELinux file and process context
Restore default file contexts
Use boolean settings to modify system SELinux settings
Diagnose and address routine SELinux policy violations
AWS stands for Amazon Web Services. AWS is a platform that provides on-demand resources for hosting web services, storage, networking, databases and other resources over the internet with a pay-as-you-go pricing.
Q2) What are the components of AWS?
EC2 – Elastic Compute Cloud, S3 – Simple Storage Service, Route53, EBS – Elastic Block Store, Cloudwatch, Key-Paris are few of the components of AWS.
Q3) What are key-pairs?
Key-pairs are secure login information for your instances/virtual machines. To connect to the instances we use key-pairs that contain a public-key and private-key.
Q4) What is S3?
S3 stands for Simple Storage Service. It is a storage service that provides an interface that you can use to store any amount of data, at any time, from anywhere in the world. With S3 you pay only for what you use and the payment model is pay-as-you-go.