Sunday, 5 November 2017

What's the Next Step in the Evolution of AI?



what exactly have we tend to been doing for the last sixty years?

Despite its age, these are still time period for AI, per Andrew NG, founding father of the Google Brain project at Google, the previous director of the Stanford computer science Laboratory and chief individual at Baidu analysis. 

AI, he states without ambiguity in a commentary in Harvard Business Review, "will remodel several industries." 

"But it’s not magic," he adds. "If a typical person will do a mental task with but one second of thought, we are able to in all probability automatize it victimization AI either currently or within the close to future," he wrote.

OK, therefore it's no solution. however it's already stirred on the far side a craze to the muse of helpful product. 

In a recent CMSWire story, Amit Kothari, chief executive officer of Tallyfy, same the largest developments of AI within the workplace is split into 2 distinct areas.
The first is language process (NLP), that is that the capture and identification of information
The second is machine learning, the power to check knowledge patterns and predict outcomes through analyzing historical patterns
He predicts fascinating things: "We have to be compelled to consider AI as a tool for coaching job, during this means we are able to faucet into human experience — and enhance this with machines."

The Question
"What's the next step in the evolution of AI?"
Here are the thought of some experts in the field one by one-


Today's conversations ar simplifying the potential of AI by golf shot it in a very slender scope. The market discusses AI usually as an automatic program response (chatbots), however it is enabled to find out and change responses supported the queries it's asked. 

The future of AI lies in pairing the technology with period, live knowledge to make customized and contextualized experiences. AI has the power to travel on the far side machine learning by deciphering and understanding the subtext of human feeling to make partaking experiences.

In this, AI will fully modification the client expertise as a result of most shoppers build selections supported its emotional impact. By deciphering specific signals that ar typically solely visible throughout in-person conversations, like facial impressions, marketers will really perceive their customers and supply intelligent responses.

With identity verification we have a tendency to ar near harnessing this power, however the ability of AI lies in victimization each single piece of information you have got access to. HBO's recent show, Westworld, stated the emotional capability of machines. 
-----Jamie Anderson, Senior vp and CMO, SAP Hybris




We reap all the advantages from analytics, procedure insights, prophetic  models, and therefore the like, particularly once foregone conclusion provides US with help or convenience. move the chase: humans ar willing to behave predictably for the sake of convenience.

To that finish, i feel we are going to see a dramatic acceleration of accommodative and intuitive applications and technologies, such as AI, not like we've got ever seen. 

This acceleration can build all of our devices and applications smarter so as to accommodate our behaviors. And associate degree exceedingly|in a very} world wherever technology is omnipresent and everybody and everything is connected — a notion I decision the "Engagement Economy" — the winners can use these technologies and a lot of to interact with individuals in an authentic and customized means at scale.
-----Steve movie maker, CEO, Marketo




In 2016, the business created unbelievable achieve democratize the ability of computer science even any. AI interfaces and technology ar currently therefore intuitive and simple to use that they need become a seamless a part of the means we have a tendency to run our personal lives.

But there's still lots of labor to try to to once it involves transfer AI into our businesses. The challenge is twofold: obtaining AI right is tough and therefore the overwhelming majority of firms simply do not have the technical experience and infrastructure needed. additionally, AI ought to be seamlessly integrated into the business user expertise. till recently, the insights, predictions and suggestions coming back from AI were offered in a very separate application and solely accessible by knowledge specialists, not the business users.

The next evolution of AI can ring within the age of the subject developer wherever each business user — not PhDs and knowledge scientists — ar ready to leverage AI to form smarter, a lot of prophetic  selections. 

Intelligent business apps can become a lot of client in nature, mimicking the straightforward expertise and lowering the barriers to entry to empower business users across sales, service, promoting and IT to remodel their business. similar to Siri is made into our phones and Netflix recommendations seem right the homepage, AI are going to be embedded directly wherever individuals work — not siloed in sophisticated tools that ar controlled by a pick few. 
-------John Ball, SVP, Salesforce, Salesforce Einstein

Thursday, 7 September 2017

What will we call a AI agent based Trojan/malware which can develop its own version of advance Trojan by unsupervised learning and spread like wildfire on networks?


What will we call a AI agent based Trojan/malware which can develop its own version of advance Trojan by unsupervised learning and spread like wildfire on networks?

This came as a wild thought in my mind and i start looking for the extent to how much this crazy idea is helpful hence i posted a thread on facebook and my finding are worth sharing enjoy.
The idea shared in this post is for educational purpose only please take it any other way,

Notion of even developing such a program will be very very difficult.



Here are my final thoughts this kind of malware agent based on Machine learning AI is not possible for next decade at least until we invent a working model of Quantum Entanglement Storage Device which is necessary for our AI agent  a to exchange  a massive amount of data for it's nodes to work in parallel cluster simultaneously so hence sleep tight 😃 and share this post.

If you want to learn more about Quantum Entanglement Applications in computer science refer to these link to research paper below, 

Thanks to my pal AdhokshajMishra https://www.facebook.com/AdhokshajMishra?fref=ufi for his valuable input on the topic.

Wednesday, 16 August 2017

Game of Thrones season 7 episode 6 just leaked no spoilers in this article



Yes you heard right the unreleased episode of Game of Thrones season 7, episode 6 Name "Death is the Enemy" just leaked today by accident.

let me explain how:-

This news news came just after the arrest of 4 people in India for leaking the episode 4.
Episode 4 leaked online two days before its scheduled time, but episode 6 arrived a lot earlier. Neither leak comes courtesy of the hackers that cracked HBO’s computer systems. Instead, we’re looking at two distinct internal leaks in the distribution and broadcasting chain system.

HBO Europe said in a statement (via AP) it had “learned that the upcoming episode of Game of Thrones was accidentally posted for a brief time on the HBO Nordic and HBO Espana platforms."

the new episode 6 is available to download on torrent as we speak right now i suggest you not to watch it from your home network at least use TOR browser/ TAIL or some kind of VPN before doing such wrong deed. 😁

But the question is will this time Game of Thrones fan will be able to commit to HBO official broadcasting while the social media is filled with spoilers already, during the last leak we say a new kind of behaviour among Game of Thrones fan they refused to watch the leaked show not just because the leaked show from Star media was of low quality but because of there love and respect of the show of HBO.

For legal reasons i can't tell you or share any links how to download or watch the leaked episode if you have not figured it out yourself but i am telling go out there somewhere.


Sharing is caring.

Thursday, 15 June 2017

OpenCV installation for Ubuntu

OpenCV installation for Ubuntu 

To install OpenCV 2.4.2 or 2.4.3 on the Ubuntu 12.04 operating system, first install a developer environment to build OpenCV.
    sudo apt-get -y install build-essential cmake pkg-config
Install Image I/O libraries
    sudo apt-get -y install libjpeg62-dev 
    sudo apt-get -y install libtiff4-dev libjasper-dev
Install the GTK dev library
    sudo apt-get -y install  libgtk2.0-dev
Install Video I/O libraries
    sudo apt-get -y install libavcodec-dev libavformat-dev libswscale-dev libv4l-dev
Optional - install support for Firewire video cameras
 sudo apt-get -y install libdc1394-22-dev
Optional - install video streaming libraries
 sudo apt-get -y install libxine-dev libgstreamer0.10-dev libgstreamer-plugins-base0.10-dev 
Optional - install the Python development environment and the Python Numerical library
    sudo apt-get -y install python-dev python-numpy
 
Optional - install the parallel code processing library (the Intel tbb library)
    sudo apt-get -y install libtbb-dev
Optional - install the Qt dev library
    sudo apt-get -y install libqt4-dev
Now download OpenCV 2.4 to wherever you want to compile the source.
    mkdir xxx
    cd xxx 
    wget http://sourceforge.net/projects/opencvlibrary/files/opencv-unix/2.4.2/Op...
or  
   wget http://sourceforge.net/projects/opencvlibrary/files/opencv-unix/2.4.3/Op...
file given above are old releases please follow this link to get the latest version of the opencv http://opencv.org/releases.html    

tar -xvf OpenCV-2.4.*.tar.bz2
Create and build directory and onfigure OpenCV with cmake. Don't forget the .. part at the end of cmake cmd !!
    cd OpenCV-2.4.*
    mkdir build
    cd build
    cmake -D CMAKE_BUILD_TYPE=RELEASE -D CMAKE_INSTALL_PREFIX=/usr/local
    -D WITH_TBB=ON -D BUILD_NEW_PYTHON_SUPPORT=ON -D WITH_V4L=ON 
    -D INSTALL_C_EXAMPLES=ON -D INSTALL_PYTHON_EXAMPLES=ON 
    -D BUILD_EXAMPLES=ON -D WITH_QT=ON -D WITH_OPENGL=ON ..
Now compile it
    make
And finally install OpenCV
    sudo make install

Saturday, 10 June 2017

Flashing/Installing stock MIUI image to the Rooted Redmi Devices and Fixing the Error 7

If you been wondering why the latest images of Android 7.1 Nougat based Lineage OS or RM OS are not working during the flashing processes showing some kind of Error 7,
Well there are 2 Solution for this problem


1) Edit the Android image zip file yourself remove the line of code regarding to devicename in the
following file which is responsible for this Error 7.
Open the Lineage OS ROM zip using any archiving software like 7zip, WinRAR, etc… You can also open it on your device.
  • Now, you need to navigate to this path: META-INF » com » google » android » updater-script.
  • Open the file updater-script in a text editor. You’ll see a bunch of lines with the command assert and the model name of the device next to it.
  • If there’s a mismatch with the codename of the device in the script, you’ll get Error 7 while flashing.
  •   
  • So, just either edit the code to match your device’s codename or delete all the lines having the code “assert & getprop”
  • Save the file.
  • Try to install the ROM now.



2) Install the Stock image of the Device in this case its the MIUI 8 from the Redmi

here is the link for it http://en.miui.com/download-301.html
on the section of -

and you also need these two things

b) Download the SuperSu zip file from here to root your phone again. Save the zip file on your phone.
Link here http://www.supersu.com/download

c) Download the lazy flasher zip file here to fix the boot loop issue. Yes, you nee to flash this file to fix the boot problem. Save the zip file on your phone internal memory.

Stable ROM

Click on Download Full Stock ROM if you have not yet rooted the device then you can follow there official guide for it that has been linked next to the download button there.
Else follow this blog.

 
 1. Download all the three files mention above and save all the file on your phone and remember the location of the files.

 2. Now open the updater application on your phone and Tap on the tap on three dots from top right corner and select “Reboot to Recovery Mode.”

 3. Now your phone will boot in the custom TWRP recovery mode.

 4. From here tap on the Wipe > Advanced Wipe and Select Dalvik Cache and Cache > Swipe to Wipe.

 5. After that go back to the main menu of the TWRP recovery. Select Install and Locate the MIUI 8 Recovery Full ROM zip file and flash the same on your phone.

 6. After flashing the ROM, Flash the Super Su zip file to get the Root access, and after that Lazy flasher zip file to fix the boot issue.

 7. Now reboot the system.


1. Download all the three files mention above and save all the file on your phone and remember the location of the files. 2. Now open the updater application on your phone and Tap on the tap on three dots from top right corner and select “Reboot to Recovery Mode.” 3. Now your phone will boot in the custom TWRP recovery mode. 4. From here tap on the Wipe > Advanced Wipe and Select Dalvik Cache and Cache > Swipe to Wipe. 5. After that go back to the main menu of the TWRP recovery. Select Install and Locate the MIUI 8 Recovery Full ROM zip file and flash the same on your phone. 6. After flashing the ROM, Flash the Super Su zip file to get the Root access, and after that Lazy flasher zip file to fix the boot issue. 7. Now reboot the system.



b) Download the SuperSu zip file from here to root your phone again. Save the zip file on your phone. c) Download the lazy flasher zip file here to fix the boot loop issue. Yes, you nee to flash this file to fix the boot problem. Save the zip file on your phone internal memory.


Monday, 5 June 2017

Highlights of WWDC 2017

I attended the World Wide Developer Conference of Apple and if you missed it or too busy to watch the lengthy keynote don't worry here it is-
In Total there are 8 new thing that came up in WWDC 2017

1 New Apple Watch OS 4.
2 Upgrades to Macbook.
3 New iMacPro.
4 Mac OS 11 High Sierra.
5 New iPad Pro.
6 HomePod.
7 ARKit
8 iOS 11


1 New Apple Watch OS 4


The Apple Watch has developed a new watch OS: Watch OS 4. Here are some of the important bits:

  1. There are new faces including a kaleidoscope and some Toy Story animations
  2. An increased focus on fitness allows for better tracking during runs and swims. There's also more encouragement for setting and achieving goals.
  3. The Apple Watch will automatically sync with fitness equipment from some of the biggest manufacturers to track your suffering.
  4. A new Music app has a redesigned interface.
  5. Native Bluetooth support allows the watch to communicate with small devices like a glucose monitor for diabetics.
  6. H.265 video supports HDR footage with 40% better compression to save space.


2 Mac and iMac


New MacBook Pros

All the MacBook and MacBook Pro are getting new Kabylake Processors from Intel (including MacBook Air).
Other big changes came in iMac
The venerable iMac computer is getting a refresh across a variety of specs. The screen is getting brighter, the max memory specs are doubling, and they're getting a pair of USB-C ports on the back for connecting fast storage.
  1. The 21.5-inch lower level model is getting a serious uptick in terms of graphic processing, which makes it 80% faster than before. 
  2. The 21.5-inch iMac 4K Retina now moves to discrete graphics, which makes it three times faster than the previous generation.
  3. The 27-inch 5K iMac goes up to 8 GB of VRAM, which can push up to 5.5-teraflops of computing power so it can handle VR development.
  4. Kaby Lake processors are coming across the board.

3 iMacPro

iMac Pro
The typical iMac can't handle super hardcore workstation stuff like machine learning development or real-time 3D rendering, so Apple build the iMac Pro. 
  1. Up to 18 cores of Xeon processing power
  2. AMD Radeon Vega graphics will handle the GPU roll.
  3. Up to 22 teraflops of computing power at the high-end which is a crazy amount. 
  4. It can have up to 128 GB of ECC memory
  5. Storage goes up to 4 terabytes built in. 
  6. It has 4 Thunderbolt ports and built-in 10 gigabit ethernet.
  7. Priced at $4,999 in December.

4 macOS High Sierra

The new version of macOS comes with a slight name change and a grip of new features.
  1. Apple now claims Safari is the fastest browser. 
  2. Auto play blocking in Safari detects videos with sound and blocks them, which is excellent.
  3. Safari's Intelligent Tracking prevention uses machine learning to identify cross-site tracking services. By, umbrella ads I see on every website.
  4. Photos gets improved search and better facial recognition. Tagging system is also synced across all devices if you're a neat freak about your images.
  5. Photos now gives you access to curves, which makes me very happy as a photography nerd. It's for advanced editing.
  6. Apple is opening its photo book printing service up to third party printers, which makes Microsoft's recent announcement about photo book printing seem weak.
  7. Public beta coming this month, free update coming in Fall as usual.
  8. Apple is releasing a new file system called APFS which is going to more performance cruncher.

5 iPad Pro 10.5-inch


iPad Pro
So a new iPad Pro today and it has a bigger screen with a smaller bazel.

  • 20% larger than the 9.7-inch, with a smaller border. 
  • It still weighs just a pound.
  • A10X Fusion with a six-core CPU and 12-core GPU which makes it 30-40% faster than the previous version across the board.
  • It's big enough to give a full-sized on-screen keyboard.
  • 120 Hz refresh rate makes scrolling and responses faster.
  • Apple Pencil now has just a 20 millisecond latency so it's more like writing. It's also 1 millisecond faster than Microsoft's Surface Pen.
  • Screens across the range will get 50% brighter.The screens also now have the color gamut for HDR video.

6 HomePod

Apple Home PodThis is the very exciting smart speaker launched by apple today. Here are the details on Apple's new smart home speaker.
  1. Siri is baked in and listens to you via six built-in microphones. It's built with the idea that you'll have an Apple Music subscription, of course.
  2. There's a HomeKit base built in, so you can use it to control smart home devices. Apple isn't focusing on this aspect as much as it is the sound quality, though.
  3. Spatial awareness helps it recognize the space it's in to tune the sound accordingly.
  4. Powered by an A8 chip that also powers the iPhone.
  5. There's a 4-inch woofer and the speaker itself is around 7-inches tall.
  6. It starts shipping in December for $349.

7 ARKit

With ARKit Apple is diving deep into the world of augmented reality, which is something that Microsoft and Google have been big on lately. It can place virtual objects on real-life surfaces in the world.
Apple ARKit
ARKit is going to let developers produce more augmented reality stuff. There's an AR Lego demo which sounds great because I can play with Legos, but not step on them.
Apple has taken this new step in Augmented Reality trend,

8 iOS 11

Apple started off its iOS 11 presentation by taking a shot at Google's Android fragmentation problem. No punches pulled there.
  1. Messages gets an update for to help sync messages across devices more efficiently as you sign in. 
  2. Apple Pay now operates on a person-to-person level so you can settle up with your friends after going out to eat.
  3. Siri is getting more conversational voices! 
  4. Siri will also now be able to do real-time translation so it can act as a go-between for people who don't have a common language.

Camera and Photos

  1. HEVC is the new format for video, which gives increased fidelity with smaller files.
  2. HEIF gives better quality photos at 2x compression.
  3. Portrait Mode in the camera now gets HDR and optical image stabilization.
  4. Machine learning recognizes different events and automatically creates slideshow-style presentations.
  5. They have embedded ML(Machine Learning ) inside the new iOS 11 to use the Apple Pencil more perfectly and to render graphics for the photos app like selecting a curve area etc.
That is all that happened today, Although more eyes will be on the September 2017 event of apple when it will launch the new IPhone8 which is going to be the most promising flagship smartphone.

Wednesday, 31 May 2017

Why using pirated windows is still a bad Idea

Using pirated windows is very bad idea from a security point of view -as these pirated copies of the windows are not secure enough as they will not get patched for critical security updates from Microsoft even if force try to update them then Microsoft server will catch your system based on fake licenses number and will block you from windows updates and disable several features including server capabilities and desktop wallpaper and software updates from windows update server.
Now you might be interested to know what kind of security risk are we talking about here so let get into it.

So I analysed a pirated copy of windows using a anti malware software and at the very first scan it found 4 infections of several kind of malware and key loggers.
now you want to know what malware it "malware is harmful piece of software that can cause damage to you data and exploit you system for any personal information "

Keylogger are the special program made to monitor each key stroke on the keyboard that you make these are used to steal your banking details credit card number and debit cards online banking passwords and system passwords for files and application like Password manager the dirty hacker who planted these harmful software in the pirated copy of windows can steal your identity and cause some serious damage to your virtual, reputation and real life they can empty your bank account in seconds and make you homeless.




this scan shows the infection type found in the core windows system files.


This is example what the infected pirated windows did its malware activated as soon as you powered the system and it downloaded a fake copy of visual basic name file which is actually a key logger that will monitor and send each key you press on your keyboard to the hacker through which they know everything you are typing those malware also has capabilities to install a RAT in your system.

A RAT is Remote Administrative Tool through which they can literally they can control your computer without physically touching it and can make your life more miserable.


here is what a security expert said about this issue-

Windows, after having dropped it's embedded ad's (see: One Drive Ad, now a part of explorer) - the feature could be further exploited to plant 'malware', 'spyware' & have the explorer infected from unknown sources.
That's a big hit & a broad risk. Shouldn't be any if you go all into Linux Core, as you're in control from the very scratch. If rich, go Mac - that's pretty decent as well. - Shritam Bhowmick Application Security Expert.


I don't want to promote Microsoft windows and there product here this is not a sponsored article but its better to use either original windows or if you can't buy it then don't use windows at all use Linux distributions like Ubuntu Debian or Mint which are great for starters in Linux community.

If you can afford to spend some more money I will suggest buying a Mac which is a perfect combination of security of unix plus performance of apple brand.

Again I am here if you have any question related to any topic in this field.

Please share and comment.


Wednesday, 26 April 2017

Backdoor In WhatsApp really?


Introduction

A security vulnerability that can be used to allow Facebook and others to intercept and read encrypted messages has been found within its WhatsApp messaging service.

Facebook claims that no one can intercept WhatsApp messages, not even the company and its staff, ensuring privacy for its billion-plus users. But new research shows that the company could in fact read messages due to the way WhatsApp has implemented its end-to-end encryption protocol.

Establishing the Case
Should I be worried about the WhatsApp encryption backdoor?
Privacy campaigners said the vulnerability is a “huge threat to freedom of speech” and warned it could be used by government agencies as a backdoor to snoop on users who believe their messages to be secure.

Recognize the Issue

WhatsApp has made privacy and security a primary selling point, and has become a go to communications tool of activists, dissidents and diplomats.

WhatsApp’s end-to-end encryption relies on the generation of unique security keys, using the acclaimed Signal protocol, developed by Open Whisper Systems, that are traded and verified between users to guarantee communications are secure and cannot be intercepted by a middleman.

However, WhatsApp has the ability to force the generation of new encryption keys for offline users, unbeknown to the sender and recipient of the messages, and to make the sender re-encrypt messages with new keys and send them again for any messages that have not been marked as delivered.

The recipient is not made aware of this change in encryption, while the sender is only notified if they have opted-in to encryption warnings in settings, and only after the messages have been re-sent. This re-encryption and rebroadcasting effectively allows WhatsApp to intercept and read users’ messages.

Addressing the Issue

The security loophole was discovered by Tobias Boelter, a cryptography and security researcher at the University of California, Berkeley. He told the Guardian: “If WhatsApp is asked by a government agency to disclose its messaging records, it can effectively grant access due to the change in keys.”

The vulnerability is not inherent to the Signal protocol. Open Whisper Systems’ messaging app, Signal, the app used and recommended by whistleblower Edward Snowden, does not suffer from the same vulnerability. If a recipient changes the security key while offline, for instance, a sent message will fail to be delivered and the sender will be notified of the change in security keys without automatically resending the message.

WhatsApp’s implementation automatically resends an undelivered message with a new key without warning the user in advance or giving them the ability to prevent it.

Boelter reported the vulnerability to Facebook in April 2016, but was told that Facebook was aware of the issue, that it was “expected behaviour” and wasn’t being actively worked on. The Guardian has verified the loophole still exists.

But Officals at whatsapp has denied of any loop hole in the whatsapp platform and said “Over 1 billion people use WhatsApp today because it is simple, fast, reliable and secure. At WhatsApp, we’ve always believed that people’s conversations should be secure and private. Last year, we gave all our users a better level of security by making every message, photo, video, file and call end-to-end encrypted by default. As we introduce features like end-to-end encryption, we focus on keeping the product simple and take into consideration how it’s used every day around the world.

Stay tune for more inside news from Hackers Underground and information security.

Please suscribe to blog and press the share button if you like it,

see you later.

Tuesday, 21 March 2017

Cheat sheet for Reverse Engineering for Malware Analysis


Download the original size here link  http://www.datafile.com/d/TWpVM01UWTNNekEF9/cheat sheet reverse v6.png


Sharing is Caring :)

Sunday, 5 March 2017

Introduction to vtechcoder point of sale (pos) Software

Introduction to vtechcoder point of sale (pos) Software


Most advance POS Project can be used in more than 170 countries and supports 17 international language. works on Windows,Linux and Mac and other touch enabled POS Hardware for Business Outlets .




here is a rough list of features that i have already in place in pos
Aside from complete Billing system. 
• Touch and Click User Interface.
• Bar Code Scanning
• Cancellation
• Coupons
• Credit Card Processing
• Customer History
• Customizable GUI
• Discounts
• Layaways & Quotes
• Mobile POS Capability
• Multi-System Integration
• Multiple Payment Forms
• Offline Transactions
• Print Reciepts
• Receipt Notes
• Refunds/Returns
• Revenue Totals
• Store Credit
• Tax Exemption
• Time-Limited Specials
• Transaction Hold/Recall
• Report generation.


GST Tax system implementation included for all the GST tax supporting market around the globe. 

Cash Flow Report - Basic list of order totals.
Cash Flow Report Extended - List of order totals with some more
information including customer name, transaction number, tender used.
Category Sales - Sales by category
Closed Cash Report - Shows sum of tenders for each POS by closed cash
period. Small update - Added number of no sales per sequence.
Closed Cash Export - Closed Cash Report in simple excel exportable
format.
Chart Sales - Sales by category.... in chart form!
Closed Products - Shows all items sold during closed cash periods by
register.Customer Diary - will show you customer payment activity for a date
range that you select, and can be filtered by customer. (a value of rupees
will show all customers in that date range)
Customer Report - this will show you a listing of your customers with
information
Products - Listing of Products in list view by category
Product Catalog - Changed the name from Sales Catalog to be clearer
on what this report is. This will create a report showing all items in your
database with item name, category, sell price, total price (sell price + tax)
and the item image if there is one in the database in a tile type view.
Product Sold - List of all items sold ordered by date/time.
Reservations Report - Will list reservations per day
Sales by Customer - Sales by Customer (Will only show sales that do not
have null for customer column)
Sales Taxes - List all sales tax.
Top 10 Sales - List top 10 sales with a handy chart (Gross amount not qty).




For free demo of the project and for Questions and Business Queries email us at vishwa@vtechcoder.com    -
vtechcoder@gmail.com


You can also buy source code for your organisation to modify it according to your needs or we will do that for you with small charge.

if you prefer business using third part here is the link for that 

Proper way to install nvidia 390 fix error

Proper way to install nvidia 390 if you see any error in the process look below; command  sudo apt purge --autoremove '*nvidia*...