Jerry was the kind of guy you love to hate. He was always in a good mood and always had something positive to say. When someone would ask him how he was doing, he would reply, “If I were any better, I would be twins!”

He was a unique manager because he had several waiters who had followed him around from restaurant to restaurant. The reason the waiters followed Jerry was because of his attitude. He was a natural motivator. If an employee was having a bad day, Jerry was there telling the employee how to look on the positive side of the situation.

Seeing this style really made me curious, so one day I went up to Jerry and asked him, “I don’t get it! You can’t be a positive person all of the time. How do you do it?”

Jerry replied, “Each morning I wake up and say to myself, ‘Jerry, you have two choices today. You can choose to be in a good mood or you can choose to be in a bad mood.’ I choose to be in a good mood. Each time something bad happens, I can choose to be a victim or I can choose to learn from it. I choose to learn from it. Every time someone comes to me complaining, I can choose to accept their complaining or I can point out the positive side of life. I choose the positive side of life.”

“Yeah, right, it’s not that easy,” I protested.

“Yes, it is,” Jerry said. “Life is all about choices. When you cut way all the junk, every situation is a choice. You choose how you react to situations. You choose how people will affect your mood. You choose to be in a good mood or bad mood. The bottom line: It’s your choice how you live life.”

I reflected on what Jerry said. Soon thereafter, I left the restaurant industry to start my own business. We lost touch, but I often thought about him when I made a choice about life instead of reacting to it.

Several years later, I heard that Jerry did something you are never supposed to do in a restaurant business: he left the back door open one morning and was held up at gunpoint by three armed robbers. While trying to open the safe, his hand, shaking from nervousness, slipped off the combination. The robbers panicked and shot him. Luckily, Jerry was found relatively quickly and rushed to the local trauma center.

After 18 hours of surgery and weeks of intensive care, Jerry was released from the hospital with fragments of the bullets still in his body.

I saw Jerry about six months after the accident. When I asked him how he was, he replied, “If I were any better, I’d be twins. Wanna see my scars?”

I declined to see his wounds, but did ask him what had gone through his mind as the robbery took place. “The first thing that went through my mind was that I should have locked the back door,” Jerry replied. “Then, as I lay on the floor, I remembered that I had two choices: I could choose to live, or I could choose to die. I chose to live.”

“Weren’t you scared? Did you lose consciousness?” I asked.

Jerry continued, “The paramedics were great. They kept telling me I was going to be fine. But when they wheeled me into the emergency room and I saw the expressions on the faces of the doctors and nurses, I got really scared. In their eyes, I read, ‘He’s a dead man.’

“I knew I needed to take action.”

“What did you do?” I asked.

“Well, there was a big, burly nurse shouting questions at me,” said Jerry. “She asked if I was allergic to anything. ‘Yes,’ I replied. The doctors and nurses stopped working as they waited for my reply. I took a deep breathe and yelled, ‘Bullets!’ Over their laughter, I told them. ‘I am choosing to live. Operate on me as if I am alive, not dead.”

Jerry lived thanks to the skill of his doctors, but also because of his amazing attitude. I learned from him that every day we have the choice to live fully. Attitude, after all, is everything.


You have 2 choices now:

1. Crib about your daily life and what are you doing and be unhappy . . .

2. Enjoy every moment of your life & give in your Best . . .

Keep Smiling Always…


IP Cores

What Are IP Cores All About?

• “IP” in this sense means “intellectual property”

Which really means “circuit designs” cleaned up and made available to other engineers

What’s a Hard Core?

A packaged chip with the plastic package removed

Shape is fixed, electrical characteristics are fixed, size is fixed, functions are fixed, silicon process (e.g., 0.25-micron CMOS) is fixed – everything is fixed!

GDSII (Hard version) is just another view

  • Provided to expedite other designs on some process

  • porting is done via re-synthesis

  • full custom sections ported by porting tools or manually

What’s a Soft Core?

The same circuit design delivered in “source code” format instead of physical film or physical-layout information

Not as flexible as you might think!

Electrical characteristics are fixed, functions are fixed – everything but size and shape!

Equivalent to delivering C source code. The program doesn’t change at all, only the details of the executable binary you create

• “Synthesizable” and “soft” do not mean changeable

All Digital IP starts as soft IP

  • RTL model is reference implementation model

  • specification can be written and/ or executable (C++ or behavioral HDL)

  • synthesizable RTL used to generate all hard views

  • Full custom block can be used to replace blocks in critical path

What’s a Configurable Core?

Starts with a soft (synthesizable) core

Gives you the ability to alter or modify the “source code” of the hardware and still make working hardware

This is both a technical feature and a legal detail

Like changing Grandma’s cookie recipe to add chocolate chips

The scope of your changes is usually somewhat limited to avoid hardware bugs and to ease testing

Important Linux Commands : Miscellaneous Commands


passwd [option(s)] [username]

Users may change their own passwords at any time using this command. Furthermore, the administrator root can use the command to change the password of any user on the system.
su [option(s)] [username]

The su command makes it possible to log in under a different user name from a running session. When using the command without specifying a user name, you will be prompted for the root password. Specify a user name and the corresponding password to use the environment of the respective user. The password is not required from root, as root is authorized to assume the identity of any user.
halt [option(s)]

To avoid loss of data, you should always use this program to shut down your system.
reboot [option(s)]

Does the same as halt with the difference that the system performs an immediate reboot.

This command cleans up the visible area of the console. It has no options.

Important Linux Commands : System Commands

System Commands
System Information

df [option(s)] [directory]

The df (disk free) command, when used without any options, displays information about the total disk space, the disk space currently in use, and the free space on all the mounted drives. If a directory is specified, the information is limited to the drive on which that directory is located.

-H   shows the number of occupied blocks in gigabytes, megabytes, or kilobytes – in human-readable format

-t    Type of file system (ext2, nfs, etc.)

du [option(s)] [path]

This command, when executed without any parameters, shows the total disk space occupied by files and subdirectories in the current directory.

-a  Displays the size of each individual file

-h  Output in human-readable form

-s  Displays only the calculated total size

free [option(s)]

The command free displays information about RAM and swap space usage, showing the total and the used amount in both categories.

-b  Output in bytes

-k  Output in kilobytes

-m  Output in megabytes

date [option(s)]

This simple program displays the current system time. If run as root, it can also be used to change the system time. Details about the program are available in date.


top [options(s)]

top provides a quick overview of the currently running processes. Press H to access a page that briefly explains the main options to customize the program.
ps [option(s)] [process ID]

If run without any options, this command displays a table of all your own programs or processes – those you started. The options for this command are not preceded by hyphen.

aux   Displays a detailed list of all processes, independent of the owner.

kill [option(s)] process ID

Unfortunately, sometimes a program cannot be terminated in the normal way. However, in most cases, you should still be able to stop such a runaway program by executing the kill command, specifying the respective process ID (see top and ps).

kill sends a TERM signal that instructs the program to shut itself down. If this does not help, the following parameter can be used:

-9  Sends a KILL signal instead of a TERM signal, with which the process really is annihilated by the operating system. This brings the specific processes to an end in almost all cases.

killall [option(s)] processname

This command is similar to kill, but uses the process name (instead of the process ID) as an argument, causing all processes with that name to be killed.


ping [option(s)] host name|IP address

The ping command is the standard tool for testing the basic functionality of TCP/IP networks. It sends a small data packet to the destination host, requesting an immediate reply. If this works, ping displays a message to that effect, which indicates that the network link is basically functioning.

-c  number Determines the total number of packages to send and ends after they have been dispatched. By default, there is no limitation set.

-f  flood ping: sends as many data packages as possible. A popular means, reserved to root, to test networks.

-i  value Specifies the interval between two data packages in seconds. Default: one second


The Domain Name System resolves domain names to IP addresses. With this tool, send queries to information servers (DNS servers).
telnet [option(s)] host name or IP address

Telnet is actually an Internet protocol that enables you to work on remote hosts across a network. telnet is also the name of a Linux program that uses this protocol to enable operations on remote computers.

Important Linux Commands : File Commands

File Commands
File Administration

ls [option(s)] [file(s)]

If you run ls without any additional parameters, the program will list the contents of the current directory in short form.

-l   detailed list

-a  displays hidden files

cp [option(s)] sourcefile targetfile

Copies sourcefile to targetfile.

-i  Waits for confirmation, if necessary, before an existing targetfile is overwritten

-r  Copies recursively (includes subdirectories)

mv [option(s)] sourcefile targetfile

Copies sourcefile to targetfile then deletes the original sourcefile.

-b  Creates a backup copy of the sourcefile before moving

-i   Waits for confirmation, if necessary, before an existing targetfile is overwritten

rm [option(s)] file(s)

Removes the specified files from the file system. Directories are not removed by rm unless the option -r is used.

-r   Deletes any existing subdirectories

-i   Waits for confirmation before deleting each file.

ln [option(s)] sourcefile targetfile

Creates an internal link from the sourcefile to the targetfile, under a different name. Normally, such a link points directly to the sourcefile on one and the same file system. However, if ln is executed with the -s option, it creates a symbolic link that only points to the directory where the sourcefile is located, thus enabling linking across file systems.

-s   Creates a symbolic link

cd [options(s)] [directory]

Changes the current directory. cd without any parameters changes to the user’s home directory.
mkdir [option(s)] directoryname

Creates a new directory.
rmdir [option(s)] directoryname

Deletes the specified directory, provided it is already empty.
chown [option(s)] file(s)

Transfers the ownership of a file to the user with the specified user name.

-R   Changes files and directories in all subdirectories.

chgrp [option(s)] groupname file(s)

Transfers the group ownership of a given file to the group with the specified group name. The file owner can only change group ownership if a member of both the existing and the new group.
chmod [options] mode file(s)

Changes the access permissions.

The mode parameter has three parts: group, access, and access type. group accepts the following characters:

u   user

g   group

o   others

For access, access is granted by the + symbol and denied by the – symbol.

The access type is controlled by the following options:

r   read

w  write

x   eXecute – executing files or changing to the directory.

s   Set uid bit – the application or program is started as if it were started by the owner of the file.

gzip [parameters] file(s)

This program compresses the contents of files, using complex mathematical algorithms. Files compressed in this way are given the extension .gz and need to be uncompressed before they can be used. To compress several files or even entire directories, use the tar command.

-d   decompresses the packed gzip files so they return to their original size and can be processed normally (like the command gunzip).

tar options archive file(s)

The tar puts one file or (usually) several files into an archive. Compression is optional.

tar is a quite complex command with a number of options available. The most frequently used options are:

-f  Writes the output to a file and not to the screen as is usually the case

-c  Creates a new tar archive

-r  Adds files to an existing archive

-t   Outputs the contents of an archive

-u  Adds files, but only if they are newer than the files already contained in the archive

-x  Unpacks files from an archive (extraction)

-z  Packs the resulting archive with gzip

-j  Compresses the resulting archive with bzip2

-v   Lists files processed

The archive files created by tar end with .tar. If the tar archive was also compressed using gzip, the ending is .tgz or .tar.gz. If it was compressed using bzip2, .tar.bz2.

locate pattern(s)

The locate command can find in which directory a specified file is located. If desired, use wild cards to specify file names. The program is very speedy, as it uses a database specifically created for the purpose (rather than searching through the entire file system). This very fact, however, also results in a major drawback: locate is unable to find any files created after the latest update of its database.

The database can be generated by root with updatedb.
updatedb [options(s)]

This command performs an update of the database used by locate. To include files in all existing directories, run the program as root. It also makes sense to place it in the background by appending an ampersand (&), so you can immediately continue working on the same command line (updatedb &).
find [option(s)]

The find command allows you to search for a file in a given directory. The first argument specifies the directory in which to start the search. The option -name must be followed by a search string, which may also include wild cards. Unlike locate, which uses a database, find scans the actual directory.

Commands to Access File Contents

cat [option(s)] file(s)

The cat command displays the contents of a file, printing the entire contents to the screen without interruption.

-n   Numbers the output on the left margin

less [option(s)] file(s)

This command can be used to browse the contents of the specified file. Scroll half a screen page up or down with PgUp and PgDn or a full screen page down with Space. Jump to the beginning or end of a file using Home and End. Press Q to exit the program.
grep [option(s)] searchstring filenames

The grep command finds a specific searchstring in the specified file(s). If the search string is found, the command displays the line in which the searchstring was found along with the file name.

-i   Ignores case

-l   Only displays the names of the respective files, but not the text lines

-n  Additionally displays the numbers of the lines in which it found a hit

-l   Only lists the files in which search string does not occur

diff [option(s)] file1 file2

The diff command compares the contents of any two files. The output produced by the program lists all lines that do not match.

This is frequently used by programmers who need only send their program alterations and not the entire source code.

-q   Only reports whether the two given files differ

File Systems

mount [option(s)] [<device>] mountpoint

This command can be used to mount any data media, such as hard disks, CD-ROM drives, and other drives, to a directory of the Linux file system.

-r   mount read-only
-t   filesystem

Specifies the file system. The most common are ext2 for Linux hard disks, msdos for MS-DOS media, vfat for the Windows file system, and iso9660 for CDs.

For hard disks not defined in the file /etc/fstab, the device type must also be specified. In this case, only root can mount. If the file system should also be mounted by other users, enter the option user in the appropriate line in the /etc/fstab file (separated by commas) and save this change. Further information is available in mount.
umount [option(s)] mountpoint

This command unmounts a mounted drive from the file system. To prevent data loss, run this command before taking a removable data medium from its drive. Normally, only root is allowed to run the commands mount and umount. To enable other users to run these commands, edit the /etc/fstab file to specify the option user for the respective drive.

« Older entries