Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by karthikeya Boyini
Page 101 of 143
How Technology has Changed the Face Of Education
Assignments, projects, homework, exams, in my day, I don’t remember having a wizard or a complete encyclopedia that could give me all answers and suggestions in a second, or even correct my mistakes for meHow has technology changed education today? This has me wondering if I can still enroll in a college and study all over again just to get the feel of how easy it is today.Although I do realize how it isn’t easy per se, but I don’t find the kids today, determined by only what is taught in schools and books, alternative methods of teaching and learning ...
Read MoreHow Hover Camera Helps in Taking Drone Selfies
The word ‘Selfie’ has become as been one of the most hyped words in the last decade or so. Smartphone makers are leaning more and more towards enriching the selfie experience of their phones. After all, who needs another person to capture your favorite moments when you can do it on your own? In the last two years, the world has witnessed a huge variety of tools dedicated to enhance the selfie experience, such as a selfie stick, a dedicated flash, or a zooming lens; the list goes on.Would you believe me if I tell you all these accessories are ...
Read MoreHow does WhatsApp “End-End Encryption” Feature Keeps data Safe?
WhatsApp has emerged as a popular smart app and is even more admired due to its secured chatting feature. With different versions, it offers users an additional security level each time, thus ensuring the safe messaging experience, but the updated version of WhatsApp post 31st march 2016 brought a revolutionary change by introducing a strong security feature for its users known as “end-to-end encryption”, designed on Open Whisper System. This has added another layer of safety to its application and has made more well-liked.What is End-to-end Encryption?End to end encryption means no one except you and the recipient can see ...
Read MoreHow does Das Keyboard’s Work?
What do you visualize when somebody coins the term ‘input device’? A keyboard, a mouse, a joystick or may be a touch screen. For the majority of the world’s population, keyboards have been the symbols of input devices. Whether you are a professional or a hard-core gamer, a keyboard would always be the primary input device for you.Keyboards have been around with us since the beginning of the typewriters and digital computers. The keyboards we see now have evolved across a plethora of inventions, innovations, and technological advancements. In the present world, we have smartphones, smartwatches, smart washing machines, smart ...
Read MoreHow Automation Testing Changed the Perspective?
Software Test Automation has surely changed the way software testing used to happen in the industry. Earlier, the tester is supposed to test what developer has developed – No questions asked. However, with the changing trend, testers have started taking the rope in their hand. Now, developers and testers are at par or we should say ahead and more responsible in project management. Now, the testers have to not only just check the functionality, but also need to check the performance and compatibility.Quality has become the center point now. The competition has moved from quantity to quality. But, even after ...
Read MoreHow an E-Commerce Store Decreases Your Business Capital
For those of you who have your own brick-and-mortar store (or are planning to open one), I have a quick and easy exercise. Let’s start with few questions:How much of your capital investment went towards rent?How about your internet service provider, Electricity and other utilities?For Staff and contractors?How much stock do you have on hand, and are you able to move them?Where do your customers reside?Keep your answers in mind. We’ll get to those shortly.Finally, do you want to make more money using less up-front capital, while spending less of your capital investment on expenses?To be sure, your answer is ...
Read MoreLearn How to Use http stat to Find out Website’s Performance
HTTP state is a Python3 script that visualizes web curl(1) statistics. This script is written in a single file without a dependency. This article explains about How to Use http stat to Find out a Website’s PerformanceInstalling httpstatThere are two ways to install httpstat on Ubuntu as shown below−Download the script directly.Through Python pip.Installing from ScriptTo install httpstat from direct script, use the following command−$wget https://raw.githubusercontent.com/reorx/httpstat/master/httpstat.pyThe sample output should be like this −--2016-12-19 11:27:18-- https://raw.githubusercontent.com/reorx/httpstat/master/httpstat.py Resolving raw.githubusercontent.com (raw.githubusercontent.com)... 151.101.100.133 Connecting to raw.githubusercontent.com (raw.githubusercontent.com)|151.101.100.133|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 10577 (10K) [text/plain] Saving to: ‘httpstat.py’ httpstat.py ...
Read MoreHow to Protect Files and Directories from Deleting in Linux
Are you working as a Linux Admin? Do you generally defend script documents or any important files? You might be aware that, Chattr (change Attribute) is a command line Linux utility that is used to set/unset exact attributes to a file in Linux process to comfortable unintended deletion or change of major files and folders, although you’re logged in as a root user.This article helps you to look after your records or folders that may support in disallowing an unauthorized user to delete your touchy contents.Protecting FileIn the below example abc.txt is the file nameProtecting a fileTo protect file, use ...
Read MoreLearn How to Manage Various Logs using Logrotate in Linux
Logrotate is designed for administration of Ubuntu systems that generate giant numbers of log records. It allows automatic rotation, compression, removal, and mailing of log records. Each log file could also be handled every day, weekly, monthly, or when it grows. This article explains about -“Learn how to manage various log using logrotate in Linux”To install logrotate, use the following command –$ sudo apt-get install logrotateThe sample output should be like this –Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: libecap3 squid-common squid-langpack Use 'sudo apt ...
Read MoreKnow what Ad Size is Optimum for your Website?
Google advises its Adsense Publishers to switch ad formats as more number of Adwords advertisers tend to target these ad sizes. Hence, more competition will be there among the advertisers and it will lead to higher eCPMs, thus translating it into increased earning to the owners of the website.As per the statistics, the best performing banner size is 300×250 medium rectangle and 336×280 large rectangle. That’s not all, in addition to standard IAB units, the Adsense program does support the custom sized ads which may be bigger than large rectangular ads. But, the big question is – will they perform ...
Read More