Görüş Bildir
JB Benjamin

JB Benjamin



Extremely technically proficient and a highly motivated Digital Content Designer responsible for the development of multiple successful digital campaigns for several international companies and agencies.

Simply, a depth map is a picture where every pixel has depth information, rather than RGB, and it is normally represented as a grayscale picture. Depth information means the distance of the surface of scene objects from a viewpoint. A depth map contains information about the distance between the surface of objects from a given viewpoint. When this is merged with the source image, a 3D image is created. It will appear as though the original source image has depth to it, giving it an almost lenticular effect.

Read More
The Ultimate Git Guide for Beginners

What Do I Need?

Any Dedicated or Virtual Server.

What is Git?

One of the most popular source control systems available, Git has been around for a very long time. Git is a completely mature and actively maintained open-source project originally developed by Linus Torvalds in 2005. Who is Linus Torvalds? Only the world-famous creator of the Linux operating system kernel. A simply monumental amount of software projects rely on Git for version control. The beauty of Git is it’s a decentralized approach to version control. Having a distributed architecture, it’s an example of a distributed version control system or DVCS. Instead of only having one place for the full version history of the software as is popularly prescribed with once-popular version control systems like CVS or Subversion, or SVN, in Git, every developer’s working copy of the code is also a repository that can contain the full history of all the submitted changes.

Read More

Active Directory (AD) is a database and set of services that connect users with the network resources they need to get their work done.

The database, or directory, contains critical information about your environment, including what users and computers there are and who’s allowed to do what. For example, the database might list 100 user accounts with details like each person’s job title, phone number, and password. It’ll also record their permissions.

Read More

Security should always be one of the foremost thoughts at all stages of the design, development and deployment of your Linux server. In order to implement a solid and efficient security policy on a machine requires a good handle on the fundamentals of Linux as well as some of the applications, protocols and languages that are used. The security of your operating system is a massive subject and there are literally tomes on this; however, I’ve done what I can to bring you some of the most relevant things to remember.

Read More