Cloud Computing

Cloud Computing

Introduction To Cloud Computing Cloud Computing refers to manipulating, configuring, and accessing hardware and software resources remotely. Cloud computing is a subscription-based service where you can obtain computer resources. Cloud Computing is a technology which makes it possible for y...

Manual Testing

Manual Testing

What is software testing Software testing is a step by step process to examine whether the given product/project/application/software is working as per their desired requirement and specification or not. It is the process of executing a program/application under positive and negative condition...

Password Hashing

Safe Password Hashing The new password hashing API exposes four simple functions: password_hash() – used to hash the password. password_verify() – used to verify a password against its hash. password_needs_rehash() – used when a password needs to be rehashed. password_g...

Android Technology

Android Technology

Android Technology A mobile operating system, also referred to as mobile OS, is the operating system that operates a Smartphone, tablet, PDA, or other digital mobile devices. Modern mobile operating systems combine the features of a personal computer operating system with touch screen, cellular, ...

Green Cloud Computing

Green Cloud Computing

    What is Green Computing   Green Computing is the term used to donate efficient use of resources in computing. It is also Known as Green IT. Green Computing is “ Where organizations adopt a policy of ensuring that the setup and operations of Information Technology...

Rain Technology

Rain Technology

RAIN Technology RAIN technology is the most scalable software cluster technology for the Internet marketplace today. There is no limit on the size or the performance of a RAIN cluster. Within a RAIN cluster, there is no master-slave relationship or primary-secondary pairing. All nodes are active ...

DATA LEAKAGE DETECTION

DATA LEAKAGE DETECTION

DATA LEAKAGE DETECTION Data leakage is defined as the accidental or unintentional distribution of private or sensitive data to an unauthorised entity . Data leakage poses a serious issue for companies as the number of incidents and the cost to those experiencing them continue to increase. D...

MySQL

MySQL MySQL is a very popular, open source database. Officially pronounced “my Ess Que Ell” (not my sequel). Handles very large databases; very fast performance. Why are we using MySQL? Free (much cheaper than Oracle!) Each student can install MySQL locally. Easy to u...