Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Apps/Applications Articles
Page 3 of 148
How to Add Password to PDF Documents in Google Drive
How to Add a Password to PDF Documents in Google Drive Sharing documents online can be risky if they contain sensitive information. Adding a password to your PDFs can help keep your data safe. With the PDF Toolbox add-on, you can easily encrypt your PDFs directly from Google Drive. Step-by-Step GuideAdding a password to your PDF documents in Google Drive is easy with the PDF Toolbox add-on. Here’s how you can do it: 1. Log in to Google Drive Open Google Drive and log in ...
Read MoreServing Large models - VLLM, LLAMA CPP Server, and SGLang
Both Large Language Models (LLMs) and Vision-Language Models (VLMs) have exploded in popularity over the last two years. Powered by recent advancements in GPU tech, these models have been pre-trained on trillions of tokens and allow developers to easily leverage state-of-the-art AI, either by fine-tuning them or just using them outright.But how would one go about hosting these models? In this article, we'll compare 3 of the most popular solutions: vLLM, llama.cpp, and SGLang.vLLMReleased in June 2023 by researchers from UC Berkeley, vLLM is a high-performance model LLM backend based on a technique called PagedAttention. PagedAttention optimizes memory management which ...
Read MoreHow Netflix Warms Petabytes of Cache Data
As one of the world's biggest streaming services, Netflix has a problem: to delivery high-quality video content to millions of users at any time. One part of this complex problem is so-called caching warmup: the strategy of storing copies of frequently accessed data closer to the users to reduce latency and make the streams smoother.Read this article to understand the several strategies and technologies that Netflix adopted in order to warm its cache up as efficiently as possible to give its viewers' the best possible viewing experience.Predictive Caching Predictive caching is the fundamental technique used by Netflix to predict what ...
Read MoreRecycler view item animate when scrolling in Android
Before getting into Item animation for recycler view example, we should know what is Recycler view in android. Recycler view is a more advanced version of the list view and it works based on View holder design pattern. Using recycler view we can show grids and list of items. card view is extended by frame layout and it is used to show items in card manner. It supports radius and shadow as predefined tags. This example demonstrates how to integrate Animation in Recycler View with card view by creating a beautiful student records app that displays student name with age. ...
Read More10 Best Android Development Courses in 2023
Are you interested in Android development and want to learn how to create amazing mobile apps? Then, you’ve come to the right place. In this article, we’ll be exploring some of the best Android development courses available in 2023. Android is the most popular mobile operating system, with over 2 billion active users worldwide. Therefore, it's no surprise that the demand for skilled Android developers is on the rise. Learning Android development can lead to a rewarding and lucrative career, as well as giving you the opportunity to create innovative mobile apps that can change the world. So, without further ...
Read MoreHow to hack android phones with PhoneSploit?
Introduction PhoneSploit is an open-source system for hacking Android devices utilizing pernicious apps. Whereas it has genuine employment for security examiners, its control too comes with moral dangers. This article looks at how the PhoneSploit system permits hacking Android gadgets, both in hypothesis and hone. We begin with an audit of the hypothetical setting behind versatile gadget abuse. At that point, we do a specialized jump into PhoneSploit design. At long last, we walk through the method of compromising an Android phone utilizing PhoneSploit to illustrate connected assault methods. What is PhoneSploit? PhoneSploit is a hostile security system created to illustrate Android powerlessness misuse. ...
Read MoreHow to Create a Chatbot in Android with BrainShop API?
Introduction We can considerably modernize the user's wits by implementing a chatbot and connecting it with an Android application. This enables for increasingly engaging engagement with the program, which simplifies surfing and obtaining information. In this tutorial, we'll squint at how to create an Android chatbot with the BrainShop API. We will divide the method into multiple sections to offer well-spoken and intelligible instruction. What is BrainShop API With the BrainShop API, programmers can easily incorporate AI and NLP-powered chatbot functionality into their projects. Intentional recognition, entity extraction, and sentiment analysis are just some of the cutting-edge technologies that make ...
Read MoreBest way to null check in Kotlin
In any programming paradigm, it is mandatory to check "null safety" in order to prevent runtime errors. In this article, we will see different ways to check "null safety" in Kotlin. Example - Using if…else In most of the programming languages, we have the "if" keyword to check conditions. In Kotlin too, we can use the "if-else" clause to check the null safety of a variable. fun main() { val name="TutorialsPoint.com" //null check if (name != null) { println(name) ...
Read MoreAccess Lists (ACL)
In computer networking, access control lists (ACLs) are a vital tool used to control network traffic by granting or denying access to specific resources or services. Access lists are typically used on routers, switches, and firewalls to regulate traffic flow in and out of a network. This article will explore access control lists in greater detail, including their purpose, components, types, and examples. What are Access Control Lists (ACLs)? Access control lists (ACLs) are a set of rules that are used to control network traffic based on source or destination IP address, protocol, port number, or other criteria. ACLs are ...
Read MoreDifference between Viber and Skype
Several platforms have evolved in the ever-changing world of communication technology to promote smooth interactions between individuals, both locally and globally. Viber and Skype are two important competitors in this industry, each with their own set of features and functionalities. Read this article to find out more about Viber and Skype and how they are different from each other. What is Viber? Viber is a messaging and Voice over Internet Protocol (VoIP) application that allows users to interact with friends, family, and coworkers using text messages, voice calls, and video calls. It was created by the Israeli company Viber ...
Read More