Wednesday 22 August 2018

How to Remember all states of India

Its very easy to remember all the states of India. First follow the below short names for all 29 states of India. At the end the number indicates the number of states for each letter.

  1. AT - 3
  2. M - 5
  3. BPCROWNS - 1
  4. UKGHJ - 2

1. AT - 3: Starting with A & T has 3 states: 
  • Andra Pradesh
  • Arunachal Pradesh
  • Assam
  • Tamil Nadu
  • Tripura
  • Telangana

2.  M - 5:
  • Manipur
  • Meghalaya
  • Mizoram
  • Madhya Pradesh
  • Maharashtra

3. BP CROWNS - 1:
  • Bihar
  • Punjab
  • Chhattisgarh
  • Rajasthan
  • Odisha
  • West Bengal
  • Nagaland
  • Sikkim

4. UKGHJ - 2:
  • Uttar Pradesh
  • Uttarakhand
  • Karnataka
  • Kerala
  • Goa
  • Gujarat
  • Himachal Prasad
  • Haryana
  • Jammu & Kashmir
  • Jharkhand


How to remove pdf password without any software in Mac

There are many tools you will find over internet from which you will able to remove the password protection from the PDF files. Most of the users don't want to keep the password protection and forget the password to open the files. And to do this, you will try to download any freeware software or purchase the license.

But to remove the password from PDF files in Mac OS, you no need to download and install or buy any softwares if you follow the below steps. its very straight forward.


1. By default you can open and read the PDF files on your Mac. All you must know is password for first time and one time usage to open the file.
Open the pdf file and enter the password. Once you open file
Goto File --> Export as PDF as shown in the below screen shot.




2. Once you click on export as pdf, it will ask you location and filename to save.




 3. Click on save and then you will find a new PDF file with has no password protected.



Leave the comments if you have feedback and click on follow button at the end of page. Also subscribe to emails for new posts.



Friday 17 August 2018

How to find the Informatica service Processes


Below are some of the process names you should be knowing while working on Informatica issues or checks.

1. java
2. _Adminconsole
3. pmrepagent
4. pmserver
5. pmdtm

1. Java and Adminconsole:

java process is the main process in informatica powercenter which starts the node. If the node is configured as Gateway node, then it will spawn another process which will run admin console.

Apart from node process, there are other java processes also runs if you have configured multiple services such as Metadata Manager Service, Model Repository service, Web Service hub etc,.

2. pmrepagent:

If you want to search for power center repository service process, then search for pmrepagent. If there are multiple processes, you need to check the logs in admin console for the respective PID.

3. pmserver:

pmserver refers to the Integration service process. If the Integration service runs on grid, you will find the process on all the nodes in grid. If it is configured as primary and secondary nodes, then it will be available on only one node.

4. pmdtm:

pmdtm is the process spawned by the workflow which is also called the session task processs. When you see number of pmdtm jobs running on server then all the process are running different sessions.


If you want to get updates on new posts, click the follow button below.

Difference Between Unicode and ASCII

Introduction:

1.ASCII uses an 8-bit encoding while Unicode uses a variable bit encoding.
2.Unicode is standardized while ASCII isn’t.
3.Unicode represents most written languages in the world while ASCII does not.
4.ASCII has its equivalent within Unicode.


Unicode vs ASCII:

The first 128 Unicode code points are the same as ASCII. Then they have a 100,000 or so more. There are two common formats for Unicode, UTF-8 which uses 1-4 bytes for each value (so for the first 128 characters, UTF-8 is exactly the same as ASCII) and UTF-16, which uses 2 or 4 bytes.

ASCII and Unicode are two character encodings. Basically, they are standards on how to represent difference characters in binary so that they can be written, stored, transmitted, and read in digital media. The main difference between the two is in the way they encode the character and the number of bits that they use for each. ASCII originally used seven bits to encode each character. This was later increased to eight with Extended ASCII to address the apparent inadequacy of the original. In contrast, Unicode uses a variable bit encoding program where you can choose between 32, 16, and 8-bit encodings. Using more bits lets you use more characters at the expense of larger files while fewer bits give you a limited choice but you save a lot of space. Using fewer bits (i.e. UTF-8 or ASCII) would probably be best if you are encoding a large document in English.

One of the main reasons why Unicode was the problem arose from the many non-standard extended ASCII programs. Unless you are using the prevalent page, which is used by Microsoft and most other software companies, then you are likely to encounter problems with your characters appearing as boxes. Unicode virtually eliminates this problem as all the character code points were standardised.

Another major advantage of Unicode is that at its maximum it can accommodate a huge number of characters. Because of this, Unicode currently contains most written languages and still has room for even more. This includes typical left-to-right scripts like English and even right-to-left scripts like Arabic. Chinese, Japanese, and the many other variants are also represented within Unicode. So Unicode won’t be replaced anytime soon.

In order to maintain compatibility with the older ASCII, which was already in widespread use at the time, Unicode was designed in such a way that the first eight bits matched that of the most popular ASCII page. So if you open an ASCII encoded file with Unicode, you still get the correct characters encoded in the file. This facilitated the adoption of Unicode as it lessened the impact of adopting a new encoding standard for those who were already using ASCII.





Thursday 9 August 2018

Oracle Listener fails to start, error messages TNS-12555, TNS-12560, TNS-00525

Problem

When one tries to start the Oracle Listener by executing the command "lsnrctl start" as UNIX user oracle, the following error messages appear:

---------------------------------
$ lsnrctl start

LSNRCTL for Linux: Version 11.2.0.3.0 - Production on 08-AUG-2018 20:36:19

Copyright (c) 1991, 2011, Oracle. All rights reserved.

Starting /oracle/product/112/bin/tnslsnr: please wait...

TNSLSNR for Linux: Version 11.2.0.3.0 - Production
System parameter file is /oracle/product/112/network/admin/listener.ora
Log messages written to /oracle/diag/tnslsnr/<server_name>/listener/alert/log.xml
Listening on: (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=myhost)(PORT=1521)))
Error listening on: (DESCRIPTION=(ADDRESS=(PROTOCOL=IPC)(KEY=REGISTER)))
TNS-12555: TNS:permission denied
TNS-12560: TNS:protocol adapter error
TNS-00525: Insufficient privilege for operation
Linux Error: 1: Operation not permitted

Listener failed to start. See the error message(s) above...
---------------------------------

Cause
(1) In the directory /var/tmp/.oracle there exist some socket files which do not belong to UNIX user oracle and group dba, but to another user (e.g. daemon) and another group (e.g. root).

Example:

$ ls -l /var/tmp/.oracle
4259873 0 srwxrwxrwx 1 daemon root 0 Aug 22 09:53 /var/tmp/.oracle/s#10534.1
4259874 0 srwxrwxrwx 1 daemon root 0 Aug 22 09:53 /var/tmp/.oracle/s#10534.2
4259865 0 srwxrwxrwx 1 daemon root 0 Aug 22 09:53 /var/tmp/.oracle/sREGISTER


(2) When the Listener process starts, it tries to create the following socket files:

/var/tmp/.oracle/s#<pid>.1
/var/tmp/.oracle/s#<pid>.2
/var/tmp/.oracle/sREGISTER

where <pid> is the ID of the operating system process for the Listener.

As the file /var/tmp/.oracle/sREGISTER already exists and belongs to a UNIX user other than oracle, the Listener process (running with privileges of user oracle) cannot create a new socket file with that name. Therefore the Listener fails to start.

Resolution

(1) Delete all socket files from directory /var/tmp/.oracle as UNIX user root.

(2) Start the Listener by executing the command "lsnrctl start" as UNIX user oracle.


Thursday 2 August 2018

What are the checks to be performed before using pmrep deployment group?

The following are the commands to be run:

1. Login to Host1 and run the following:

cd $INFA_HOME/server/bin
./pmrep connect -r <rep_name> -d <domain_name> -n <username> -x <password> -sdn <Native/LDAP domain>

2. Login to Host2 and run  the following:

cd $INFA_HOME/server/bin
./pmrep connect -r <rep_name> -d <domain_name> -n <username> -x <password> -sdn <Native/LDAP domain> 

If the $INFA_HOME/server/bin is in PATH environment variables then you can the pmrep command from anywhere.

3. Check if the below objects are created if you are using dynamic deployment groups in source repository. 
  • Label
  • Query

4. Check if you are able to connect source repository from target host where you run the deployment or vice versa.

The username (and password) is the one that you use to connect to the repository through the power center clients (such as repository manager).
The sdn is the security domain which is either Native or the LDAP domain. (enter the same details as the one on the PowerCenter client).


The Connect command uses the following syntax:

pmrep help connect
-r <repository_name> {-d <domain_name> |
{-h <portal_host_name>
-o <portal_port_number>}}
[{ <user_name>
[-s <user_security_domain>] [-x <password> |
-X <password_environment_variable>]} |
-u <connect_without_user_in_kerberos_mode>] [-t <client_resilience>]

To use -X option configure INFA_DEFAULT_DOMAIN_PASSWORD on UNIX:
1. At the command line, type:
pmpasswd <password>
pmpasswd returns the encrypted password.
2. In a UNIX C shell environment, type:
setenv INFA_DEFAULT_DOMAIN_PASSWORD <encrypted password>
    In a UNIX Bourne shell environment, type:
export INFA_DEFAULT_DOMAIN_PASSWORD=<encrypted password> 

UNIX Command to sync files between 2 hosts - RSYNC

Rsync, which is also called Remote sync command is used when you want to sync the local files into remote server. 

Usage: rsync [OPTION]... SRC [SRC]... DEST
  or   rsync [OPTION]... SRC [SRC]... [USER@]HOST:DEST
  or   rsync [OPTION]... SRC [SRC]... [USER@]HOST::DEST
  or   rsync [OPTION]... SRC [SRC]... rsync://[USER@]HOST[:PORT]/DEST
  or   rsync [OPTION]... [USER@]HOST:SRC [DEST]
  or   rsync [OPTION]... [USER@]HOST::SRC [DEST]
  or   rsync [OPTION]... rsync://[USER@]HOST[:PORT]/SRC [DEST]
The ':' usages connect via remote shell, while '::' & 'rsync://' usages connect
to an rsync daemon, and require SRC or DEST to start with a module name.

Options
 -v, --verbose               increase verbosity
 -q, --quiet                 suppress non-error messages
     --no-motd               suppress daemon-mode MOTD (see manpage caveat)
 -c, --checksum              skip based on checksum, not mod-time & size
 -a, --archive               archive mode; same as -rlptgoD (no -H)
     --no-OPTION             turn off an implied OPTION (e.g. --no-D)
 -r, --recursive             recurse into directories
 -R, --relative              use relative path names
     --no-implied-dirs       don't send implied dirs with --relative
 -b, --backup                make backups (see --suffix & --backup-dir)
     --backup-dir=DIR        make backups into hierarchy based in DIR
     --suffix=SUFFIX         set backup suffix (default ~ w/o --backup-dir)
 -u, --update                skip files that are newer on the receiver
     --inplace               update destination files in-place (SEE MAN PAGE)
     --append                append data onto shorter files
 -d, --dirs                  transfer directories without recursing
 -l, --links                 copy symlinks as symlinks
 -L, --copy-links            transform symlink into referent file/dir
     --copy-unsafe-links     only "unsafe" symlinks are transformed
     --safe-links            ignore symlinks that point outside the source tree
 -k, --copy-dirlinks         transform symlink to a dir into referent dir
 -K, --keep-dirlinks         treat symlinked dir on receiver as dir
 -H, --hard-links            preserve hard links
 -p, --perms                 preserve permissions
     --executability         preserve the file's executability
     --chmod=CHMOD           affect file and/or directory permissions
 -o, --owner                 preserve owner (super-user only)
 -g, --group                 preserve group
     --devices               preserve device files (super-user only)
     --specials              preserve special files
 -D                          same as --devices --specials
 -t, --times                 preserve times
 -O, --omit-dir-times        omit directories when preserving times
     --super                 receiver attempts super-user activities
 -S, --sparse                handle sparse files efficiently
 -n, --dry-run               show what would have been transferred
 -W, --whole-file            copy files whole (without rsync algorithm)
 -x, --one-file-system       don't cross filesystem boundaries
 -B, --block-size=SIZE       force a fixed checksum block-size
 -e, --rsh=COMMAND           specify the remote shell to use
     --rsync-path=PROGRAM    specify the rsync to run on the remote machine
     --existing              skip creating new files on receiver
     --ignore-existing       skip updating files that already exist on receiver
     --remove-source-files   sender removes synchronized files (non-dirs)
     --del                   an alias for --delete-during
     --delete                delete extraneous files from destination dirs
     --delete-before         receiver deletes before transfer (default)
     --delete-during         receiver deletes during transfer, not before
     --delete-after          receiver deletes after transfer, not before
     --delete-excluded       also delete excluded files from destination dirs
     --ignore-errors         delete even if there are I/O errors
     --force                 force deletion of directories even if not empty
     --max-delete=NUM        don't delete more than NUM files
     --max-size=SIZE         don't transfer any file larger than SIZE
     --min-size=SIZE         don't transfer any file smaller than SIZE
     --partial               keep partially transferred files
     --partial-dir=DIR       put a partially transferred file into DIR
     --delay-updates         put all updated files into place at transfer's end
 -m, --prune-empty-dirs      prune empty directory chains from the file-list
     --numeric-ids           don't map uid/gid values by user/group name
     --timeout=TIME          set I/O timeout in seconds
 -I, --ignore-times          don't skip files that match in size and mod-time
     --size-only             skip files that match in size
     --modify-window=NUM     compare mod-times with reduced accuracy
 -T, --temp-dir=DIR          create temporary files in directory DIR
 -y, --fuzzy                 find similar file for basis if no dest file
     --compare-dest=DIR      also compare destination files relative to DIR
     --copy-dest=DIR         ... and include copies of unchanged files
     --link-dest=DIR         hardlink to files in DIR when unchanged
 -z, --compress              compress file data during the transfer
     --compress-level=NUM    explicitly set compression level
 -C, --cvs-exclude           auto-ignore files the same way CVS does
 -f, --filter=RULE           add a file-filtering RULE
 -F                          same as --filter='dir-merge /.rsync-filter'
                             repeated: --filter='- .rsync-filter'
     --exclude=PATTERN       exclude files matching PATTERN
     --exclude-from=FILE     read exclude patterns from FILE
     --include=PATTERN       don't exclude files matching PATTERN
     --include-from=FILE     read include patterns from FILE
     --files-from=FILE       read list of source-file names from FILE
 -0, --from0                 all *-from/filter files are delimited by 0s
     --address=ADDRESS       bind address for outgoing socket to daemon
     --port=PORT             specify double-colon alternate port number
     --sockopts=OPTIONS      specify custom TCP options
     --blocking-io           use blocking I/O for the remote shell
     --stats                 give some file-transfer stats
 -8, --8-bit-output          leave high-bit chars unescaped in output
 -h, --human-readable        output numbers in a human-readable format
     --progress              show progress during transfer
 -P                          same as --partial --progress
 -i, --itemize-changes       output a change-summary for all updates
     --out-format=FORMAT     output updates using the specified FORMAT
     --log-file=FILE         log what we're doing to the specified FILE
     --log-file-format=FMT   log updates using the specified FMT
     --password-file=FILE    read password from FILE
     --list-only             list the files instead of copying them
     --bwlimit=KBPS          limit I/O bandwidth; KBytes per second
     --write-batch=FILE      write a batched update to FILE
     --only-write-batch=FILE like --write-batch but w/o updating destination
     --read-batch=FILE       read a batched update from FILE
     --protocol=NUM          force an older protocol version to be used
 -E, --extended-attributes   copy extended attributes
     --cache                 disable fcntl(F_NOCACHE)
 -4, --ipv4                  prefer IPv4
 -6, --ipv6                  prefer IPv6
     --version               print version number

(-h) --help                  show this help (-h works with no other options)