Making money using Amazon Affliate Links (Store: investexperie-20)

Today, I decided to start the journey of creating an amazon affliate link to make an income as I have not been receiving any income from doing sales for the past 3-5 weeks in the business. These are some of the products I am promoting as part of a new affliate in the amazon affliate program in Singapore.

These are the steps to become an amazon affliate marketer to promote products and to be a better sales professional.
1. Start an affliate account by logging into your amazon account on https://affiliate-program.amazon.com/


After that, start sharing the different products and help other committed shoppers to benefit from their consumer choices.
1. We can buy any of the software engineering bookers here.
2. We can buy any of the books to BecomeABetterMedicalProfessional
3. We can buy and invest in any of these equipment to become FitterStrongerMoreHealthy

4. We can buy and invest in any of the sports and fitness equipments to ExerciseHealthier

5. We can buy and invest in any of the photography equipments to ShootVideosEffectively

6. We can book and prepare good nutrition to cook healthy food for family, friends and loved ones: Cookhealthily

7. We can BecomeBetterEntrepreneurs in reading and understanding the different resources of other entrepreneurs who have succeeded as well as their failure stories too.
8. We can BecomeBetterInvestors in reading and understanding the different resources of other investors who have succeeded as well as their failure stories too.
9. We can BecomeBetterDevelopers in developing and implementing different features on the computer as a developer to write better and more effective code with lesser technical debt.

10. We can BecomeBetterEsportsGamer in developing better versions of gamers.


Start your journey of being an amazon brand affliate now.

My TR90 Journey

5 weeks ago, I started a weight loss program to improve my health. This weight loss program is called TR90. It loss weight by increasing muscle mass and activating the youth gene cluster. What TR90 does is that it identifies 3 youth gene activation clusters. It works by activating the muscle growth gene, activating the fat burning gene and the appetite control gene. This is my progress over the 90 days. I have


Here is my photo to show the progress:

Before TR90:

After TR90:

after tr90


The diet plan I still follow is 3333 Diet
This means 3 servings of non meat protein, 3 servings of meat protein, 3 servings of vegetables and 3 servings of fruit as well as half your fist worth of carbohydrates.
This is the change I have seen so far in my diet plans.

This is my OMRON body composition results I do for all my friends and family to help them benefit from TR90. You can support me by volunteering to get your health checked so that I can improve my skills as a health consultant.

These are my omron body composition results. Let me explain these terms you can find in your body composition results.
1. Weight: 76.3kg
2. BMI: 25.8
3. Body Fat %: 25.7
4. Visceral Fat: 10.0
5. Resting Metabolism: 1693 kcal/day
6. Skeletal Muscle: 31.5%

Dear Friends, if you are interested to find out more, message me to arrange for an appointment of body composition. Have a great weekend ahead.





SimpliLearn Caltech Center for Technology and Management Education (CTME) Postgraduate DevOps Program Course Review

I started a part time course on developer operations last year November to build up my competency in devops as I thought it will be important to expand my skill bank in automation area. When someone from simplilearn called me to share with me the opportunity in late october. I decided to try it since I did not enroll it a batch back and felt that it will be good not to miss this opportunity. After paying the course fee of 2k+ USD, I waited to start the course in anticipation. This course is done in collaboration with California Institute of Technology’s Center for Technology and Management Education and bootcamp Simplilearn.

(Needless to know, the experience was a horrible experience)

As course students, Simlilearn prepared a introduction session on one of the weekday nights before the course commencement which will start on mid November Saturday evening. The introduction session was useful to understand how Simplilearn works as well as how the courses are structured.

The horror started when we commenced on the 1st module. The online learning with the recorded videos is fine however for me who lived in Singapore, my lesson timings was the worst one can expect (Saturdays and Sundays 10pm – 2am ). On top of that, for some of the modules (Jenkins, Ansible, Terrfaorm, Kubernetes), there are labs provisioned for us to deploy our virtual machines using EC2 AWS. However, what makes the labs a nightmare to use is that the labs are reset everyday when we have done our work. This makes it very counterproductive for us to do our practice as well as our project as we have to finish everything in one day. It hinders our progress as we have to keep provisioning new EC2 VMs the next day for us to complete different lab exercises.

After completing the last capstone project, my classmates and I are relieved that we have completed this 7 month part time course. However, we sincerely warn and hope that our fellow peers in the industry will not enroll in a Simplilearn course as it is not very helpful in our continuous upgrading of skillsets as a tech professional. There are many other better options online that are free and better designed. The experience of using the tools such as the labs has to be improved for the learners to benefiit from this course.

Creating a Podcast

Recently, I came across a friend’s 7 day podcast challenge on Internations. Internations is an expat website for finding expats and foreigners living in different countries. After receiving the email newsletter of each day for the podcast challenge, I decided to work on building a simple podcast. Looking through the structure of podcasts, I started working on the draft and script. I decided to choose a topic about song writing and music for the podcast as music has always been a big influence and a companion in my life.

After writing the draft, I recorded the podcast on Zencastr.



The next step, I did was to create a podcast account and upload the audio file onto Anchor.




The good thing about using Anchor is that it allows you to publish your podcast on Spotify

and other podcast platform. Your podcast episode looks something like that.



You can find out more and listen to this episode here:
1. Anchor: https://anchor.fm/caleb-yang/episodes/Episode-1-What-does-Music-mean-to-me-and-its-influences-e185irb/a-a6kdjla
2. Spotify: https://open.spotify.com/show/33RgkvJV5FOGQihx12FdRk?si=8cid_XgtTLqGRPMzkSBofw&dl_branch=1

How to Use Zencastr: http://blog.zencastr.com/blog/2015/9/30/getting-started-recording-your-first-show-with-zencastr
How to use Anchor: https://anchor.fm/how-to-start-a-podcast#:~:text=Download%20the%20free%20Anchor%20mobile,segments%20to%20finish%20your%20episode.

Have a good weekend.

The Russian Anxiety by Mark B Smith

This book explains and describes how the trade as well as the history of Russia changes from 9th – 15th Century. However, since this book is written by a history academic from a university, it can be hard to understand how those interested to learn about the development in the Russian history. A tenet of this book that Professor Mark describes about is how the invasion of other forces united the country together. The insecurity of invasion from other countries can be challenging.

For Russian history lovers, it requires a sense of persistence and patience to decipher the making of how each of the different trade or perilous battles influenced the government as well as the business factions in making decisions to build a cohesive and united community.

It is important to note that history books written by professors can be akin to trawling through a merchant junk finding the equipment that is required to fix it in a barrel of ropes, nails and strings. However, it offers a perspective of how many people misunderstand diffferent countries. History books make us appreciate how much failures and mistakes made by diffferent groups of people progress through the future.

Professor Mark B Smith is a professor of history specialising in Russian History at University of Cambridge. He makes history and russian studies animate live in explaining the context that Russia experienced in the past.

The book can be found on Goodreads: https://www.goodreads.com/book/show/42086147-the-russia-anxiety

The book can be found on major ebook and publishing platforms (book depository, amazon and other ecommerce platforms in Singapore as well as around the region)

Secrets of the Javascript Ninja Book Review

javascriptninja

Secrets of Javascript Ninja Second Edition: John Resig, Bear Bibeault,
Josip Maras. Published by Manning Books

This book describes different parts of utilizing javascript effectively. Each section of the book covers different areas of what it means to understand how the code inter-relate with each other. John Resig describes what it means for using asserts to test if functions is written concisely in keys. Simple tools like closures, DOM, events and timers that we take for granted are what make the tools useful and effective.

The Document Object Model can consist of elements that relate or comply with the different tool components in a website: in styling as well as timers.Events and timers are important to help each user understand the component of how certain functions and components can work without the use of simple tools.

You can view some of the code snippets in this book. It is important to perform unit tests of the functions in javascript we write in understanding how to relate with each of the components.

Check this book out: Link if you are genuinely interested in being more proficient in javascript.

.NET 2019 Conference

It was a great Conference that the .NET meetup team did to organise the conference at NUS Enterprise in Blk 71 of Singapore. The topics mentioned were.

Riza Marhaban spoke about the updates of .NET Core 3.0 and .NET 5.0 as well as the updates for the development community.

A break was given for the participants to refresh themselves before continue listening to the talk. Nilesh Gule explained succintly how one can build cloud native applications with kubernetes and .NET Core 3.0

After lunch, Ben Ishmiaya Levy shared two sessions. The former on mixed reality with Xamarin and anchors; Ben Ishimaya was a very animated and comical coach that engages his participants fully on the topic. He then shared his experiences working with Azure sphere and how one can use Azure sphere to develop augmented applications using .NET environment. The audience benefitted from the sharing and asked many deep technical questions about the technology and the applications one can use to build them.

 

 

Sabrina Kay and Goh Chun Lin presented on Development and Dev Ops for Desktop Applicatons using .NET Core 3.0. It was quite insightful for the participants interested of learning how one uses .NET Core 3.0 for their projects.

 

Marvin Heng educated the audience on constructing real – time image classifiers for mobile applications with Azure custom vision tools. It was a very interesting and practical topic for most developers attending that talk.

Priyanka H Shar demonstrated how one integrates ML.Net with a chatbot. In a community obsessed with machine learning and chatbots, it proved useful practical tips for the developers attending this talk.

 

Cheah Eng Teong trained the developers in utilizing Machine Learning Ops to unleash development operations to machine learning.  Cheah Eng Soon prepared the audience how the Apriori Machine Learning Algorithm works in ML.Net with a brief overview.

Concluding the conference,  Dr Li Hao Bin tutored the audience the art of architecture .NET microservices in a docker ecosystem. With a increasing adoption of docker containers, the integration of microservices in docker become more relevant in the past few years.

More information for this conference and speakers can be found here:

https://conf.dotnet.sg/

 

 

 

 

Database management and API Research

This project seeks to involve algorithms, cryptography and website protocols to transfer data in a more secure way. This project plans to work with application programming interfaces and database managements to enhance the security of such platforms and systems. Algorithms are used in the IT security and data structure to arrange and sort information. It is used in storing file types such as videos, images and photo using a Cipher texts are sent for the file format in either music, photo or video. A malicious attack by a person assuming the role of a copy of a server can corrupt the system and steal confidential privilege information In terms of enhancing this system, use of  64bit or 128 bit encryption may make it more complicated for hackers to hatch their data breaching plots. The Bellman Ford Algorithm, Dijkstra’s Algorithm and A* Algorithm are used to do graph searches and can be applied in building the new solution for algorithm to make hacking harder. In the security space, Diffie Hellman key exchange is a method of securely exchanging keys or pass-codes between 2 parties. Message authentication codes, digital signatures and digital certificates make every message sent on a server or system which is part of the primitive backbone in cryptohraphy.  Due to the mass number of web traffic, it is hard to track. Cryptography hires data security services such as confidentiality, data integrity, authentication and non-repudiation. Non- repudiation a property that is most desirable in circumstances where there are probabilities of a disagreement over the exchange of data. A cryptosystem is an implementation of cryptographic techniques and their complementary infrastructure to offer information security services. A cryptosystem is also discussed as a cipher system. In the application programming interface, it is the system architecture that assembly front end and back end programming solutions to deliver a solution to customer.

 

The increase in availability of APIs create business opportunities for companies and can act a s a technical barrier to companies scaling up their operations. They require enterprise developers to build this architecture and support  the operations of such a server when there is a sizable number of web traffic.  Program work flow managers are reminded of the urgency and their responsibility to communicate the key business goals of a proposed APIs to programming design effectively who will then construct the interface that bridges between customer and business employees. Enterprise IT in the 21st Century has been characterized by a shift towards utilizing siloed databases and applications, so that data and functionality can be accessed across organizational boundaries or reused in new systems. The explosion of web oriented APIs emerge after the service oriented architecture. Web services central to Service Oriented Architecture (SOAs) represent similar architecture as web APIs. Both web interfaces are used to unlock backend systems. Certain differences arise between SOAs and web APIs. On one level, the important technical difference is that SOA programs are focused on creating Web services to facilitate internal, server- to- server integrations, whereas Web APIs exist to speed the creation of Web and mobile based apps, often of a customer facing nature. SOA programs are generally driven by IT departments and focused on cost savings, but API programs more commonly originate with business development organizations and focus on generating new revenues. API programs by contrast should be focused on meeting the needs of application developers. API is designed as an enabling self-service for application developers and application users. It reduces barrier to accessing valuable enterprise resources.

 

This research projects investigates algorithms, cryptography and APIs to find ways and methods to build a encryption platform to secure documents with a unique 64 bit or 128bit code that is able to be smart enough if a user attempts to do a malicious attack server.  Analyzing the fields of algorithms, cryptography will make a difference and change the paradigm of Information technology security in data analytics and handling large data.