Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Satish Kumar
Page 79 of 94
10 Best Google Cloud Platform Courses in 2023
Google Cloud Platform (GCP) is a cloud computing platform that offers a wide range of services to help businesses run their operations in the cloud. With its flexible and scalable infrastructure, GCP has become one of the most popular cloud platforms in recent years. If you're looking to learn how to use GCP to its fullest potential, taking a course is an excellent way to get started. In this article, we'll take a look at some of the best GCP courses available in 2023. Introduction to Google Cloud Platform If you're new to GCP, the Introduction to Google Cloud Platform ...
Read More10 Best Computer Science Courses in 2023
In the constantly evolving world of technology, it's imperative to stay updated with the latest developments in computer science. With numerous online courses available, it's challenging to determine which courses are worth taking. In this article, we'll discuss the best computer science courses to take in 2023. Artificial Intelligence (AI) Artificial Intelligence is one of the most in-demand fields in computer science. It is the science of creating intelligent machines that can perform tasks that usually require human intelligence. AI involves the use of algorithms and techniques such as machine learning, natural language processing, and robotics. The following courses are ...
Read MoreException Handling in Distributed System
Introduction In context of distributed systems, exception handling refers to process of detecting, diagnosing, and recovering from errors that occur in a distributed system. In such systems, errors can occur at any point in communication and coordination process, including network failures, hardware malfunctions, and software bugs. Thus, effective exception handling is crucial to ensure reliability and availability of a distributed system. In this article, we will explore various techniques and best practices for exception handling in distributed systems. Importance of Exception Handling in Distributed Systems In a distributed system, multiple processes run on different machines and communicate with each other ...
Read MoreEvolution of Distributed Computing Systems
Introduction Distributed computing systems refer to a network of interconnected devices that share resources and work together to achieve a common goal. evolution of distributed computing systems has been rapid, and it has transformed way we use technology in our daily lives. From simple file sharing systems to advanced cloud computing, distributed computing systems have come a long way. In this article, we will discuss evolution of distributed computing systems and explore some of examples. Early Days of Distributed Computing The early days of distributed computing can be traced back to 1960s, where researchers began experimenting with idea of sharing ...
Read MoreEvent Ordering in Distributed System
Introduction Distributed systems have become an integral part of our modern-day technological infrastructure. They have made it possible to deliver services at scale, provide better resilience, and enable better fault tolerance. However, designing distributed systems is a challenging task, and one of most significant challenges is maintaining ordering of events in system. This article will discuss event ordering in distributed systems and provide examples of different techniques used to achieve it. Event Ordering Event ordering is essential in distributed systems because it determines order in which events occur. In a distributed system, events can happen concurrently on different nodes, and ...
Read MoreActive and Passive attacks in Information Security
Introduction Information security is an essential aspect of modern-day technology, and it's vital to understand various threats that can compromise sensitive data. Two of most common types of attacks that can occur are active and passive attacks. In this article, we'll explore differences between active and passive attacks, methods used by hackers, and ways to protect against these types of threats. What is an Active Attack? An active attack occurs when a hacker attempts to alter or manipulate data in a system. This type of attack can be easily identified as it typically involves an attacker trying to perform some ...
Read MoreAccess Lists (ACL)
In computer networking, access control lists (ACLs) are a vital tool used to control network traffic by granting or denying access to specific resources or services. Access lists are typically used on routers, switches, and firewalls to regulate traffic flow in and out of a network. This article will explore access control lists in greater detail, including their purpose, components, types, and examples. What are Access Control Lists (ACLs)? Access control lists (ACLs) are a set of rules that are used to control network traffic based on source or destination IP address, protocol, port number, or other criteria. ACLs are ...
Read MoreA Cryptographic Introduction to Hashing and Hash Collisions
Introduction Hashing is an essential aspect of modern cryptography. It is used to encrypt data in a secure and efficient way. Cryptographic hash functions are a type of mathematical function that takes data of any size and converts it into a fixed-size output, which is referred to as a hash. This article will provide a cryptographic introduction to hashing and hash collisions, explaining how hash functions work and why hash collisions can be a problem. What is Hashing? Hashing is a process that takes input data of any size and maps it to a fixed-size output, which is called a ...
Read MoreBest Practices for Protecting Your Data and Customer SaaS Business
As a SaaS (Software-as-a-Service) business owner, protecting your data and customers should be a top priority. With an increasing number of cyberattacks and data breaches, you cannot afford to be complacent about your security measures. In this article, we will discuss some of the best practices you can implement to protect your data and customers. What is Data Protection? Data protection refers to the process of safeguarding sensitive and confidential information from unauthorized access, use, disclosure, or destruction. It is a critical aspect of information security and privacy, and it is essential for ensuring the confidentiality, integrity, and availability ...
Read MoreHow to Change Root Password of MySQL or MariaDB in Linux?
Introduction As with any password, the root user password for a MySQL or MariaDB database should be changed regularly for security reasons. The root user has complete access and control over all databases and tables within the system, making it a prime target for any potential attacks. Regularly changing the root password can help prevent unauthorized access to your data, as well as provide an added layer of security against potential server breaches. Checking Current Root Password A root user is a powerful administrator account that has full access to the MySQL or MariaDB server. It is important to regularly ...
Read More