text allan

COMPUTER REPAIR,CCTV CAMERA Remote Configuration and Port Forwarding,WEBSITE DESIGN and INTERNET CAFE SET-UP call SUN +63 0932-1712155 or GLOBE +63-0917 8358251

Tuesday, August 30, 2016

Difference between a Storage Area Network and Network Attached Storage

If you are managing your own infrastructure in your own private data center, then you are bound to go through a selection of different storage offerings. Selecting a storage solution pretty much depends on your requirement. Before finalizing a particular storage option for your use case, a little bit of understanding about the technology is always helpful.

I was actually going to write an article about object storage (which is the current hottest storage option in the cloud). But before going and discussing that part of the storage arena, I thought its better to discuss the two main storage methods which co-exists together from a very long time, used by companies internally for their needs.

The decision of your storage type will depend on many factors like the below ones.

Type of data that you want to store
Usage pattern
Scaling concerns
Finally your budget

When you begin your career as a system administrator, you will often hear your colleagues talking about different storage methods like SAN, NAS, DAS etc. And without a little bit of digging, you are bound to get confused with different terms in storage. The confusion arises often because of the similarities between the different approaches in storage. The only hard and fast rule to stay up to date in technical terms, is to keep on reading stuffs (especially concepts behind a certain technology.)

Today we will be discussing two different methods that defines the structure of storage in your environment. Your choice of the two in your architecture should only depend on your use case, and type of data that you store.

By the end of this tutorial, I hope you will have a clear picture about the main two types of storage methods, and what to select for your need.

SAN (Storage Area Network) and NAS(Network Attached Storage)



The main things that differentiate each of these technologies are mentioned below.

The main things that differentiate each of these technologies are mentioned below.

How a storage is connected to a system. In short how the connection is made between the accessing system and the storage component (directly attached or network attached)
Type of cabling used to connect. In short this is the type of cabling done to connect a system to the storage component (eg. Ethernet & Fiber channel)
How are input and output requests done. In short this is the protocol used to conduct input and output requests (eg. SCSI, NFS, CIFS etc)

Related: How to monitor IO on linux

Let's discuss SAN first and then NAS, and at the end, let's compare each of these technologies to clear the differences between them.

SAN(Storage Area Network)

Today's applications are very much resource intensive, due to the kind of requests that needs to be processed simultaneously per second. Take example of an e-commerce website, where thousands of people are making orders per second, and all needs to be stored properly in the database for later retrieval. The storage technology used to store such high traffic data bases must be fast in request serving and response(in short it should be fast in Input and Output).

Related: Web server Performance test

In such cases(where you need high performance, and fast I/O ) we can use SAN.

SAN is nothing but a high speed network that makes connections between storage devices and servers.

Traditionally application servers used to have their own storage devices attached to them. Server's talk to these devices by a protocol known as SCSI(Small Computer System Interface). SCSI is nothing but a standard used to communicate between servers and storage devices. All normal hard disks, tape drives etc uses SCSI. In the beginning the storage needs of a server was fulfilled by a storage devices that was included inside the server(the server used to talk to those internal storage device, using SCSI. This is very much similar to how a normal desktop talks to its internal hard disk.).

Devices like Compact Disk drives are attached to the server(which are part of the server) using SCSI. The main advantage of SCSI for connecting devices to a server was its high throughput. Although this architecture is sufficient for low end requirements, there are few limitations like the below mentioned ones.

The server can only access data on the devices, which are directly attached to it.
If something happens to the server, access to data will fail (because the storage device is part of the server and is attached to it using SCSI)
There is a limit in the number of storage devices the server can access. In case the server needs more storage space, there will be no more space that can be attached, as the SCSI bus can accommodate only a finite number of devices.
Also the server using the SCSI storage has to be near the storage device(because parallel SCSI, which is the normal implementation in most computer's and servers, has some distance limitations. It can work up to 25 meters.)

Some of these limitations can be overcame using DAS (Directly Attached Storage). The media used to directly connect storage to the server can be any one of SCSI, Ethernet, Fiber channel etc.). Low complexity, Low investment, Simplicity in deployment caused DAS to be adopted by many for normal requirement's. The solution was good even performance wise, if used with faster mediums like fiber channel.

Even an external USB drive attached to a server is also a DAS(well conceptually its DAS, as its directly attached to the server's USB bus). But USB drives are normally not used due to the speed limitation of USB bus. Normally for heavy and large DAS storage solutions, the media used are SAS(Serially attached SCSI). Internally the storage device can use RAID(which normally is the case) or anything to provide storage volumes to servers. SAS storage options provide 6Gb/s speed these days.

An example of DAS storage device is Dell's MD1220

To the server, a DAS storage will appear very much similar to its own internal drive or an external drive that you plugged in.

Although DAS is good for normal needs and gives good performance, there are limitations like the number of servers that can access it. Storage device, or say DAS storage has to be near to the server (in the same rack or within the limits of the accepted distance of the medium used.).

It can be argued that, directly attached storage(DAS) is faster than any other storage methods. This is because it does not involve any overhead of data transfer over the network (all data transfer occurs on a dedicated connection between the server and the storage device. Mostly its Serially attached SCSI or SAS). However due to latest improvement's in fiber channel and other caching mechanism's, SAN also provides better speed's similar to DAS, and in some cases, it surpasses the speed provided by a DAS.

Before getting inside SAN, let's understand several media types and methods that are used to interconnect storage devices(when i say storage devices, please dont consider it as one single hard disk. Take it as an array of disk's, probably in some RAID level. Consider it as something like Dell's MD1200).

what is SAS(Serially Attached SCSI), FC(Fibre Channel), and iSCSI (Internet Small Computer System Interface)?


Traditionally the SCSI devices like the internal hard disk's are connected to a shared parallel SCSI bus. This means all devices attached, will be using the same bus to send/receive data.  But shared parallel connections are not good for high accuracy, and create issues during high speed transfers. However a serial connection between the device and the server can increase the overall throughput of the data transfer. SAS connections between storage devices and servers uses a dedicated 300 MB/Sec per disk. Think of SCSI bus that shares the same speed for all devices connected.



SAS uses the same SCSI commands to send and receive data from a device.  Also please do not think that SCSI is only used for internal storage. It is also used for external storage device to be connected to the server.



If data transfer performance and reliability is the choice, then using SAS is the best solution. In terms of reliability and error rate SAS disks are much better compared to the old SATA disks. SAS was designed by keeping performance in mind, due to which it is full-duplex. This means, data can be send and received simultaniously from a device using SAS. Also a single SAS host port can connect to multiple SAS drives using expanders. SAS uses point to point data transfer by using serial communication between devices (storage device, like disk drives & disk array's) and hosts.



The first generation of SAS provided around 3Gb/s of speed. The second generation of SAS improved this to 6Gb/s. And the third generation (which is currently used by many organization's for extremly high throughput) improved this to 12Gb/s.



Fiber Channel Protocol

Fiber Channel is a relatively new interconnection technology used for fast data transfer. The main purpose of its design is to enable transport of data at faster rates with a very less/negligible delay. It can be used to interconnect workstations, peripherals, storage array's etc.

The major factor that distinguishes fiber channel from other interconnecting method is that, it can manage both networking and I/O communication over a single channel using the same adapters.
ANSI (American National Standards Institute) standardized Fiber channel during 1988. When we say Fiber (in Fiber channel) do not think that it only supports optical fiber medium. Fiber is a term used for any medium used to interconnect in fiber channel protocol. You can even use copper wire for lower cost.

Please note the fact that fiber channel standard from ANSI supports networking, storage and data transfer. Fiber channel is not aware of the type of data that you transfer. It can send SCSI commands encapsulated inside a fiber channel frame(it does not have its own I/O commands to send and receive storage). The main advantage is that it can incorporate widely adopted protocols like SCSI and IP inside.


The components of making a fiber channel connection are mentioned below. The below requirement is very minimal to achieve a point to point connection. Typically this can be used for a direct connection between a storage array and a host.

An HBA (Host Bus Adapter) with Fiber channel port
Driver for the HBA card
Cables to interconnect devices in HBA fiber channel port

As mentioned earlier, SCSI protocol is encapsulated inside fiber channel. So normally SCSI data has to be modified to a different format that fiber channel can deliver to the destination. And when the destination receives the data it then retranslates it to SCSI.

You might be thinking that why do we need this mapping and re-mapping, why cant we directly use SCSI to deliver data. Its because SCSI cannot deliver data to greater distances to large number of devices (or large number of hosts).

Fiber cannel can be used to interconnect systems as far as 10KM (if used with optical fibers. You can increase this distance by having repeaters in between). And you can also transfer data to an extent of 30m using a copper wire for lower cost in fiber cannel.

With the emergence of fiber channel switches from variety of major vendors, connecting many large number of storage devices and servers have now become an easy task(provided you have the budget to invest). The networking ability of fiber channel led to the advanced adoption of SAN(Storage Area Networks) for faster, long distance, and reliable data access. Most of the high computing environment's(which requires fast and large volume data transfers) uses fiber channel SAN with optical fiber cables.

The current fiber channel standard (called as 16GFC) can transmit data  at the rate of 1600MB/s(dont forget the fact that this standard was released in 2011). The upcoming standards in the coming years are expected to provide  3200MB/s and 6400MB/s speed.

iSCSI(Internet Small Computer System Interface )



iSCSI is nothing but an IP based standard for interconnecting storage arrays and hosts. It is used to carry SCSI traffic over IP networks. This is the simplest and cheap solution(although not the best) to connect to a storage device.
This is a nice technology for location independent storage. Because it can establish connection to a storage device using local area networks, Wide area network. Its a Storage Area Network interconnection standard. It does not require special cabling and equipments like the case of a fiber channel network.
To the system using a storage array with iSCSI, the storage appears as a locally attached disk. This technology came after fiber channel and was widely adopted due to it low cost.

Its a networking protocol which is made on top of TCP/IP. You can guess that its not at all good performance wise, when compared with fiber channel(simply because everything is running over TCP with no special hardware and modifications to your architecture.)
iSCSI introduces a little bit of CPU load on the server, because the server has to do the extra processing for all storage requests over the network, with the regular TCP.

Related: Linux CPU performance Monitoring

iSCSI has the following disadvantages, compared to fiber channel



iSCSI introduces a little bit more latency compared to fiber channel, due to the overhead of IP headers
Database applications have small read and write operations, which when done on iSCSI will introduce more latency
iSCSI when done on the same LAN, which contains other normal traffic (other infrastructure traffic other than iSCSI), it will introduce a read/write lag or say low performance.
The maximum speed/bandwidth is limited to your ethernet and network speed. Even if you aggregate multiple links, it does not scal to the level of a fiber channel.
 NAS(Network Attached Storage)



The simplest definition of NAS is "Any server that shares its own storage with others on the network and acts as a file server is the simplest form NAS".

Please make a note of the fact that Network Attached Storage shares files over the network. Not storage device over the network.



NAS will be using an ethernet connection for sharing files over the network. The NAS device will have an IP address, and then will be accessible over the network through that IP address. When you access files on a file server on your windows system, its basically NAS.

The main difference is in how your computer or the server treats a particular storage. If the computer treats a storage as part of itself(similar to how you attach a DAS to your server), in other words, if the server's processor is responsible for managing the storage attached, it will be some sort of DAS. And if the computer/server treats the storage attached as another computer, which is sharing its data through the network, then its a NAS.



Directly attached storage(DAS) can be viewed as any other peripheral device like mouse keyboard etc. Because to the server/computer, its a directly attached storage device. However NAS is another server, or say an equipment having its own computing features that can share its own storage with others.



Even SAN storage can also be considered as an equipment that has its own processing/computing power. So the main difference between NAS, SAN and DAS is how the server/computer accessing it sees. A DAS storage device appears to the server as part of itself. The server sees it as its own physical part. Although the DAS storage device might not be inside the server(its normally another device with its own storage array), the server sees it as its own internal part(DAS storage appears to the server as its own internal storage)



When we talk about NAS, we need to call them shares rather than storage devices. Because NAS appears to a server as a shared folder instead of a shared device over the network. Please do not forget the fact that NAS devices are computers in themselves, who can share their storage space with others. When you share a folder with access control using SAMBA, its NAS.



Although NAS is a cheaper option for your storage needs. It really does not suit for an enterprise level high performance application. Never ever think of using a database storage (which needs to be high performing) with a NAS. The main downside of using NAS is its performance issue, and dependency on network(most of the times, the LAN which is used for normal traffic is also used for sharing storage with NAS, which makes it more congested)



Related: Linux Network Performance Tuning

Monday, August 29, 2016

Finally Discover The Function of the Human Appendix

For generations the appendix was thought to have no purpose. But now, researchers say they have discovered the true function of this organ, and it is anything but redundant.


Researchers now say that the appendix acts as a safe house for good bacteria. The body uses this to essentially “reboot” the digestive system when one suffers from a bout of dysentery or cholera.

Conventional wisdom used to claim that this small pouch protruding from the first part of the large intestine was simply redundant or an evolutionary shadow of a once useful organ. For years doctors advised people have their appendix removed and in spite of it’s now-apparent use, most seem none the worse for having it removed.

Duke University Medical Centre in North Carolina researchers say that following a severe bout of cholera or dysentery, which can purge the gut of bacteria essential for digestion, the appendix acts as a reserve for good bacteria to emerge.

In spite of the findings, Professor Bill Parker says that this does not mean we should cling onto our appendices at all costs.
“It’s very important for people to understand that if their appendix gets inflamed, just because it has a function it does not mean they should try to keep it in,” he explained.

“So it’s sort of a fun thing that we’ve found, but we don’t want it to cause any harm, we don’t want people to say, ‘oh, my appendix has a function’, so I’m not going to go to the doctor, I’m going to try to hang onto it.”

Nicholas Vardaxis, an associate professor in the Department of Medical Sciences at RMIT University, says that the theory put forward by the Duke University team makes a lot of sense.
“As an idea it’s an attractive one, that perhaps it would be a nice place for these little bacteria to localize in, a little cul-de-sac away from everything else,” he weighed in.
“The thing is that if we observe what’s been happening through evolution, the higher on the evolutionary scale we are and the more omnivorous animals become, then the smaller and less important the appendix becomes and humans are a good example of that.
“The actual normal flora bacteria within the appendix, as well within our gut, are the same, so we’ve lost all of those specialized bacteria.
“So it doesn’t have that safe house type of function anymore, I don’t think. 
“It’s a vestige of something that was there in previous incarnations, if you like.”
Scientists were led to the discovery by examining the appendices of koalas. Unlike the short human variety, the koala is famous for having an extremely long appendix.

This aids in their diet which is almost exclusively made up of eucalyptus leaves.

Professor Vardaxis says that in spite of the fact that the human appendix acts in a similar manner to that of koalas, it is unlikely that we will see a shrinking of the Australian marsupial’s organ any time soon.




“Unless of course we have a massive blight and we get the eucalypt on which the koala thrives dying, then we may find some mutant koalas out there perhaps that will start eating other things, and as they start to eat other things, then over generations and hundreds of thousands of years of time, then surely, yes, the koala’s appendix will shrink as well.”

Professor Vardaxis says that the human shrinkage of the appendix was due to changes in our diet that took place over many thousands of years. Still, it is possible that any species with a larger appendix now, could find themselves in a similar situation if their diet were to significantly change, and their appendix began to shrink. Koalas, Vardaxis explained, might be afflicted by appendicitis and have to have it taken out at times, just like humans.

Source: the collectiveint

If You Ever See Cracks In Your Watermelon

When You Cut It, Throw It Right Out. It Can Make You Sick



Bigger isn’t always better.
At least went it comes to watermelons, the summer treat that nearly everyone loves. The tasty fruit can be eaten in a variety of ways including: by the slice, as a smoothie addition and even as a way to sweeten up your salad. They are even used as a bowl for certain summery cocktail mixes where friend can gather around and soak up the sun while sipping through a straw. The growth of the fruit’s reputation has spiked, but in China, the growing fruit has had detrimental effects.
Unknown to China farmers, they had been using a fertilizer that contained a chemical called forchlorfenuron. The chemical has the power to expand the size of a watermelon by 20% at a more rapid pace, which ultimately leads to greater profits. At least that is what the fertilizer company thought.
When farmers had started to see their melons breaking in half and taking on a shape that was absent from their natural form, they were alerted. Even the taste and texture was altered from its original state. Farmers saw an abnormal amount of white seeds when the fruit normally contained mostly black seeds
The breaking in half of the watermelon was said to look like an explosion. While the chemical, which has been utilized since the early 1980s, is thought of as safe, Director of the Vegetable Research Institute at Qingdao Academy of Agricultural Science Cui Jian stated that it is best to veer away from plant hormone chemicals because watermelons are particularly sensitive to chemicals.
While the chemical used in the fertilizer seems to have the power to explode a watermelon, it has been confirmed that it is not harmful to health. The major downfall of the oversized fruit caused by the chemical is the watermelon may end up looking slightly abnormal and not many people have the room to store such a large food item that has a less-than-natural taste.
While Jian made his statement, the EPA (Environmental Protection Agency) countered it with an argument of their own. Also used in kiwis and grapes, the fertilizer is proven to be cytotoxic and can lead to acute dermal, oral and respiratory toxicity if ingested. While not carcinogenic, the substance contains toxins that can lead to bigger issues including increased fetal mortality and stomach lesions. Multiple tests have been completed on animals and proven to cause damage.
In addition to the toxin damage, the chemicals in the fertilizer can spread into the environment leading to damaging effects on our health that stem from the chemical blending with flora and fauna.
The Chinese government will continue to use its power to maintain an increase in food production, regardless of the poor effects on our health and the environment.
While the output of food is very important to the Chinese government, they offer a bit of hope in veering away from the toxin filled fertilizers and urge consumers to aim for organic fruit and vegetables.

WATCH : CHINA SINABING NABILI NA ANG ILANG BAHAGI NANG PINAS NUNG SI CORY PA ANG PANGULO

The South China Sea is a marginal sea that is part of the Pacific Ocean, encompassing an area from the Karimata and Malacca Straits to the Strait of Taiwan of around 3,500,000 square kilometresPresident Xi Jinping seems to agree with the Athenian general who, more than 2,000 years ago, warned the people of Melos that  the strong do what they wish and the weak do as they are compelled. His government insists that nearly all the South China Sea belongs to China—even islets and reefs close to the Philippines and five other littoral states but hundreds of miles from the Chinese mainland. Instead of raising China in harmony, Beijing’s policies point the world toward the brink of war. Intransigent, Beijing rejects the jurisdiction of the Permanent Court of Arbitration and its ruling that China has no historic rights to large swathes of the South China Sea and has wrongly abused not only fishing vessels from the Philippines but the coral riches beneath the water. 
Skeptics about international law say that China behaves no differently from other great powers. Few, if any, have bowed to international tribunals. When Nicaragua complained that the United States was mining its waters, the Reagan administrations simply discarded the U.S. commitment to accept compulsory jurisdiction of the International Court of Justice and rejected the court’s ruling in 1986 against the United States. In a similar vein,  the George W. Bush administration “un-signed” the statute creating the International Criminal Court and abrogated, with no legal justification, the Nixon administration’s treaty with Moscow limiting ballistic missile defense.While the UN Charter bans acts of aggression,  China’s seizure and militarization of islands and reefs in the South China Sea do not directly violate this standard. Still, China’s actions (along with Russia’s in the Caucasus and Ukraine) do breach the principle enunciated by the U.S. Secretary of State Henry Stimson  in 1932. Responding to Japan’s invasion of Manchuria, Stimson declared that the United States would not recognize any political or territorial changes accomplished by force. Though not a member of the League of Nations, a U.S. representative joined the League’s investigation of Japan’s puppet state “Manchukuo.” The League said it would not recognize the new state of Manchukuo on the grounds that its establishment violated the territorial integrity of China, and therefore the Nine-Power Treaty to which many prominent league members subscribed. Neither the Stimson Doctrine nor the League’s declaration stopped  Japan’s invasion of China. Still,  Stimson’s key principle had greater effect when the Soviet Union invaded and  absorbed Estonia, Latvia, and Lithuania in 1940. Even though Washington and its allies came to value Stalin as an ally against Hitler, none recognized Moscow’s annexation of the Baltic states.  Indeed, the three Baltic countries retained their embassies in Washington for five decades. Upholding the Stimson principle helped to delegitimize Soviet occupation and enable Estonians, Latvians, and Lithuanians to reestablish their independence in 1990-1991.Enjoying this article?Taking a leaf from Thucydides on the root cause of the Peloponnesian War, some analysts warn that China and the United States are destined to fight. Indeed, Michael Pillsbury argues that  China’s elites are engaged in a hundred-year marathon to displace the United States as global leader. China’s actions in the South China Sea and elsewhere seem to confirm the expectation that rising powers will challenge the existing order and its dominant power.

FLAKKA - New killer synthetic drugs



In the Philippines, the government under President Duterte has recently declared an all out war against drugs, however, in different countries around the world, drug manufacturers are even producing new synthetic drugs that could catch the attention of the consumers.

Now, most of us believe that zombies don't exist and that they only appear in movies and tv series, however, with the newest drug in the US, people have been witnessing how a human slowly acts like a zombie! 


The newest drug called 'Flakka Drug' is a synthetic street drug that makes a human act like a zombie. In 2014, the rug was reported to have these effects: bizarre behavior, agitation, paranoia, and delusions of superhuman strength.

There are already lots of reported cases involving this drug like a man runnng naked through a traffic, an addict who attemtped to do IT 

Sunday, August 14, 2016

Why OLIGARCHS Hate DUTERTE?

Ito ang KATOTOHANANG AYAW NILANG MALAMAN NIYO! bakit nga ba maraming gustong ipaligpit o patalsikin sa pwesto si President DUTERTE? Gusto niyo ulit ng real talk? Watch and Listen!



USING A 'POKEMON GO' BOT MAY GET YOU PERMANENTLY BANNED


Game maker Niantic, the developer behind mobile sensation Pokémon Go, is now issuing permanent bans to players who violate its terms of service. Though TOS violations vary, these bans appear to be directed at cheaters who rely on GPS spoofing, bots, and other software techniques that allow Pokémon Go to be played beyond the realm of Niantic's design parameters. For instance, GPS spoofing lets you trick a smartphone into thinking you're located in a different country, allowing you to catch pokémon that may be more easily located in that area or restricted to certain regions. Bots, on the other hand, let you automate portions of the game.
In a note posted to its website this week, Niantic outlines violations of its TOS that can result in a permanent ban. "This includes, but is not limited to: falsifying your location, using emulators, modified or unofficial software and/or accessing Pokémon Go clients or backends in an unauthorized manner including through the use of third party software," the note reads. "Our goal is to provide a fair, fun and legitimate game experience for everyone. We will continue to work with all of you to improve the quality of the gameplay, including ongoing optimization and fine tuning of our anti-cheat system." The company includes a link to an appeal form for trying to reverse a ban if it was issued by mistake.
USING A 'POKÉMON GO' BOT MAY GET YOU PERMANENTLY BANNED
It's still unclear how Niantic is going about detecting the use of GPS spoofing, emulators, bots, and other hacks. A number of threads on Reddit's Pokémon Go developer community, where much of the discussion around these techniques takes place, have popped up in the last two days. It seems users cannot seem to lock down what exactly results in a ban and how Niantic's internal systems may be seeking out cheating behavior.
It appears users have been receiving various levels of bans for quite some time. But this new permanent ban has the community advising its members not to use third-party application programming interfaces (APIs). Many of the makers of the game's most popular APIs have been sent cease and desist letters from The Pokémon Company over the course of the last two weeks as well. So it appears the company is increasing its efforts to crackdown on the kind of Pokémon Go playing it deems unsavory. A spokesperson for Niantic declined to comment on permanent bans and directed The Verge to the appeal process note on its website.


Sunday, August 7, 2016

How to Control Your Android Mobile on Your Computer with Vysor Chrome Extension

Control Your Android Phone And Mirror Your Android Mobile Screen To PC Control Your Android Device from Any OS Is Not So Easy. But Here We Showed You, How You Can Control Your Android Phone From Any PC Or Any OS. If You Are Running Google Chrome Browser In Your PC, This Is So Easy For You. We Control Android Mobile Devices from Vysor Chrome Extension. This Chrome Extension Is Totally Free And Available On Chrome Web Store. Vysor Is Really A Great Chrome Extension, With The Help Of This Extension You Can Mirror Your Android Mobile To PC Screen And Also Control Them From PC. Vysor Is The Fast, Easy And Most Reliable Tool For This Method. 

Vysor App Is Run In the Window, Linux, Chrome OS and Mac OS. This App Runs In Your Chrome Browser, So It Doesn’t Matter What OS Are You Running. Vysor App Is Made By Android Developer (Clockworkmod) Koushik Dutta.

Vysor Is One Of The Easiest Methods For Control Your Android Phone From PC. You Don’t Need To Root Your Android Phone For This Method.
- Compatible with Your Device
- A Window to Your Android
- Vysor Lets You View and Control Your Android on Your Computer. Easy Peasy.
- Vysor puts a fully controllable window of your Android on your desktop.
- Vysor gives you the integration and ease of an emulator on a physical device

[Vysor Puts A Fully Controllable Window Of Your Android On Your Desktop. An Easy Install Chrome App, Compatible with All Operating Systems.

Use Your Keyboard - Type A Hundred Words Per Minute On Your Phone Using Your Desktop Keyboard.
Point And Click - Point, Click, Scroll. You’re Mouse Works Too.

Developers

Ditch The Emulator - Are You An Android Developer? Vysor Gives You The Integration And Ease Of An Emulator On A Physical Device.

Vysor Share - Share Your Device, Across The Office, Or Across The Globe. Screen and ADB Access to Remote Devices. Simple as Sending a Link. ]

[Steps] Try These Steps In Your Android Phone And Mirror Your Android Mobile Screen To PC. [How to Mirror Android Mobile Screen to Windows PC]

Requirement Latest Version of Google Chrome Browser - Download Form Here

1. Make Sure You Enable The Developer Options And USB/Android Debugging In Your Android Mobile.

- Just Go To "About Phone" in the Phone Settings
- Click 7 Time on "Build Number" to Enable Developer Options

If You Don’t Know How To Open Developer Option In Android Mobile Then Download This App In Your Phone. This App Size Is Just 18k And This App Directly Open Your Developer Option In Android Mobile.

ownload Developer Options Android App from Google Play Store

Developer Options_1.1.6_net.selfip.unet.developer_options.apk    
Size: 18 KBDownload APK File


2. In The Developer Settings Enable/Allow USB Debugging In Your Phone. (What Is USB Debugging or Android Debugging - Usb Debugging Enable the Android Debug Bridge (ADB) Interface. Usb Debugging Is Intended For Development Purpose Inly. Use It to Copy Data between Your Computer and Your Devices, Install Apps on Your Device without Notification, And Read Log Data)


3. Connect Your Android Device To Your Computer Using A USB Cable. 

4. Open Google Chrome Browser On Your Computer And Open Vysor App Page On The Chrome Web 


Download Vysor (Beta) Chrome Extension from Chrome Web Store 

Download .Crx Extensionhttps://uploadex.com/9641na2lp1tl

[Developer: Clockworkmod] [Version: 1.0.6.2] [Size: 2.81MB] How to Install : Open Chrome's extensions page (chrome://extensions/), drag-and-drop the *.crx file to the extensions page to install it. 5. Click On “ADD To Chrome” To Add The App To The Chrome Browser On Your Computer. 6. When The App Is Added And Installed In Your Browser, Launch It By Clicking On Its Icon In Your Browser. [Launch Vysor App in Your Chrome Browser]


7. When The App Launches, Click On The Button That Says “Find Devices”. [Find Devices in Vysor App] 8. If Your Android Mobile Is Correctly Connected With Your PC, You Can See Your Android Device Here. Select Your Android Device and Click On the Select Button. [Select Your Android Device in Vysor App] 9. A Pop-Up Will Appear In Your Android Mobile Screen. Click On OK. [Allow USB Debugging In Phone]


10. Now You See Vysor App In Your Android Mobile Screen. Click On Ok And Your Android Mobile Is Fully Connected With Your Computer. Your Android Mobile Appears In Your PC Screen. This Is One Of The Perfect And Easy Way For Control And Sees Your Android Mobile From The PC. 


Notice: For More See This Video:


Windows User Need ADB Driver and Windows 10 Users Must download the latest Version of Universal Adb Drivers: http://download.clockworkmod.com/test/UniversalAdbDriverSetup.msi [16.27 MB]

Saturday, August 6, 2016

President Duterte reads list of gov. officials, judges and policemen involved in illegal drug trading

President Duterte reads the list of the government officials, court judges and policemen who are allegedy involved and protecting the drug lords in the Philippines.
In his visit in the Naval Forces Eastern Mindanao (NFEM) Multi-Purpose Covered Court, where the soldiers who died during the NPA ambush on Friday, President Rodrigo Duterte showed his disappointment in the politicians and judges who are protecting the illegal drug trade in the Philippines.



He also ordered the police and the military who are guarding the said officials to report to their mother unit immediately or else he will dismissed all of them from their positions.
President Duterte also ordered the executive officials he named to report directly to him.
He also cleared that he doesn’t have any personal anger to the mentioned officials and he is just doing his job as the President of the Philippines.
President Duterte only scratches his head after reading the list of the politicians and judges who are allegedly involved in the illegal drug trade industry and some of his political allies and friends were belong in the list.

According to him, the list of the politicians and judges that he mentioned are gathered from the military and the police.
President Duterte mentions many names of judges, government officials and police who are involved in illegal drug trade, these are some of the names that listed on President Duterte’s list.
President Duterte cancels firearms permits of officials allegedly involved in illegal drugs and orders them to surrender it in 24 hrs to PNP.
The names that he mentioned are still innocent until proven guilty and he will give a chance to them to defend theirselves in the court.
The name of the judges are,
  • Judge Mupas of Dasmarinas Cavite
  • Judge Reyes of Baguio City
  • Judge Savillio of Iloilo City
  • Judge of Casiple Kalibo Aklan
  • Judge Rene Gonzales
  • Judge Navidad of Calbayog City
  • Judge Dagala of Siargao.
He also mentioned Mayors and their names are,
  • Renaldo Flores of Naguillian, La Union,
  • Dante Garcia of Tubao La Union
  • Martin De Guzman of Bauang La Union
  • Marjorie Salazar of Lasam Cagayan
  • Cipriano “Goto” Dungao Violago Jr of San Rafael Bulacan
  • Marino Morales of Mabalacat Pampanga
  • Felix Castillo of Langiden Abra
  • Jesus “Boying of Bolinao Pangasinan
  • Jose “Pepe” Miranda of Santiago City
  • Vicente Amante of San Pablo, Laguna
  • Ryan Dolor of Bauan Batanas
  • Gamar A. Janihim of Sirawai Zamboanga Del Norte
  • David Navarro of Pagadian Zamboanga Del Sur
  • Alex Centena of Calinog, Iloilo
  • Julius Ronald Pacificador of Hamtic, Antique
  • Jed Mabilog of Iloilo City
  • Mariano M. Malones of Maasin, Iloilo
Vice Mayors
  • Edgardo Trinidad of El Nido, Palawan
  • Francis Amboy Ansing of Maasin, Iloilo
He also mentions the names of:
  •   Michael “Mike” Rama former Mayor of Cebu City.
  •  Hector Ong of Northen Samar
  • Rolando Espinosa of Albuera Leyte
  • Beda Canamaque of Negros Oriental
  • Madelyn Ong of Northern Samar
  • Franz Sabalones of San Fernando Cebu.
  • Erwin Tongtong Plagata of Iloilo City.
  • Ex- Congressman JC Rahman Nava of Guimaras.
  • Partylist Congressman Jeffrey Selis
  • Abubakar Karim of Zamboanga del sur
  • Bobby Alingan of Kolambugan, Lanao Del Norte
  • Ramin of Iligan City.
  • Jessie Aguilera of Surigao Del Norte.
  • Fajad Salik of Marawi City
  • Macabago of Suguiaran, Lanao Del Sur
  • Makadatu of Lanao Del Sur.
  • Rasul Sangki of Ampatuan, Maguindanao.
  • Montasir M. Sabal of Sultan Sumagka, Maguindanao
  • Vicman Montawal of Datu Montawal
  • Samsudin U. Dimaukom of Datu Saudi-Ampatuan, Maguindanao.
  • Norodin S. Salasal of Datu Salibo, Maguindanao
  • Benahar Tulawie of Talipao Sulu.
  • Andong Parojinog of Ozamiz City
  • Nova Princess Parojinog of Ozamiz City
  • Omar Salitario Ali of Marawi
  • Abdul Sabal of Talitay Maguindanao
  • Koto Montawal of Datu Montawal, Maguindanao
  • Salik of Marawi City
  • Macabao of Saguiaran, Lanao Del Sur
  • Ex-Congressman Guillermo A. Romarate, Jr. of Surigao Del Norte.
  • Board Member Ricardo Parojinog of Ozamiz
  • Ex Mayor Eriguel of Agoo, La Union
Police:
  • Police Inspector Rolando Batolayan
  • Retired Police Superintendent Manalo
  • PNP CIDG Roberto Palisoc
  • Superintendent Ada
  • Eric Bueneventura of Navotas
  • PO2 Geraldine Bautista Manuel of PNP PRO2 Health Service
  • SPO3 Ronald Calap of Isabela PPO
  • PO Ronel Samoledo
  • PO3 Cecilio Domingo CIDT
  • PO2 Ryan Mendoza of Tarlac
  • Jeffrey Serapica of Butuan PPO
  • PO1 Norman Adarno of Puerto Galera NPS
  • Mark Canete of MIMAROPA
  • Christian Catalina PNP Camarines Norte
  • PO2 Alan Carpio of Pasay City
  • PO3 Eric Plazo of QCPD 6
  • PO3 Alexander Macabeo PCP3 Paranaque City
  • SPO2 Joselito Melendrez Binangonan Police Station
  • General Valerio of Sta. Barbara Iloilo


Sunday, July 31, 2016

Sison kay Duterte: “Masyado kang butangero…”


“Kailanman ay hindi pwedeng utusan ni Duterte ang rebolusyunaryong grupo na sumunod sa kanyang gusto”.
Yan ang bahagi ng pahayag ni Communist Party of the Philippines Founding Chairman Jose Maria Sison.
Sinabi pa ni Sison na nakatakda sanang maglabas ng kautusan ang pamunuan ng CPP-NPA alas-otso ngayong gabi na nagsasabing magdedeklara rin sila ng ceasefire order para sa kanilang mga tauhan.
Dagdag pa ni Sison, “masyadong butangero yang si Duterte at gusto niya ay gulo agad….kung ayaw niya ng katahimikan eh di huwag…”
Ipinaliwanag pa ni Sison na binalewala ni Duterte ang kanyang mga negosyador ay siya na mismo ang nagdesisyon ng hindi man lang kino-kunsulta ang kanyang mga tauhan.
Tinawag din ni Sison na isang “bully” si Duterte at hindi umano ito uubra sa kilusang rebolusyonaryo.
Ipina-uubaya naman ni Sison sa mga lider ng CPP-NPA dito sa Pilipinas kung itutuloy pa ang pakikipag-usap sa pamahalaang Duterte o hindi.
Kaninang alas-singko ng hapon ay natapos ang deadline na ibinigay ni Duterte sa CPP-NPA para sa kanilang paliwanag sa ginawang pag-ambush sa mga tauhan ng CAFGU at militar sa Daval del Norte.
- See more at: http://radyo.inquirer.net/36362/36362#sthash.11FVjh8H.dpuf