Category: SWE

  • ICMP

    ICMP is a network layer protocol (IP layer protocol). ICMP is for IPV4 and is defined in RFC 92. ICMP for IPV6 is defined in RFC 4443. The Structure of ICMP is : TYPE | CODE | CHECKSUM | CONTENT (header of ICMP) ICMP is leveraged for diagnostic and control purposes. Many command line utilities are based on ICMP, ICMP is the network protocol…

  • EM Waves

    Electromagnetic waves are referred to as EM waves. EM waves are transverse waves, EM waves are the propagation of the electric and magnetic field. The EM spectrum includes EM with variable wavelengths : AM | FM | Infrared | UV | Visible | X RAY |  Gama Ray | Many types of waves are part of the electromagnetic spectrum. Charged particles (electrons…

  • ARP (Address Resolution Protocol)

    ARP is an address resolution protocol, The ARP protocol is utilized to resolve IP to MAC ADDRESS. (ARP maps IP and MAC) ARP request is sent | ARP response is received. ARP operates in the data-link layer and network layer. IP -> Network layer protocol and addressing MAC —> Data– layer addressing The devices whose IP ARP is looking will be sent via…

  • WIFI (Wireless Tech)

    Wifi is referred to as wireless technology, the majority of the devices around us are controlled with the help of WIFI. The mobile phone and computers are connected to WIFI VIA NICs (network interface cards). Primarily modern devices are based on wireless tech because wire can be a bit cumbersome and in complex situations can result in BAD CABLE MANAGEMENT. Wifi is clearly defined in IEEE STANDARDS. WIFI…

  • Laravel (PHP MVC)

    Laraval is PHP MVC (model view code ) based Framework, coding in Laravel makes (PHP CODE DEVELOPMENT) which is a user-friendly process. Laravel is the most popular PHP MVC-based framework and has been in the industry for more than a decade. All the major enterprises are carrying out PHP-based development activities by integrating Laravel into their tech stacks. Laravel descriptiveness, expressiveness, and elegant syntax provide an interactive,…

  • Logic Gates

    Logic gates perform logical functions, logic gates are the fundamental part of digital logical circuits and are the basic building blocks of digital systems, logical gates carry out logical operations. Logical Functions utilizes diodes / transistors for electronic switching. Logic gates uses transistors and diodes which acts as electrical switches, the voltage will be passed…

  • IDE (Integrated Dev Env)

    The IDE can be called the INTEGRATED DEV ENVIRONMENT, it is where all the development activities take place, it can be cloud-based or it can be local. IDE has support for all the high-level languages be it the front-end or back-end languages. The developers can just compile the code from the console and can carry out I/O ops, find errors, throw exceptions, and much more. The choice of IDE is limited, popular vendors…

  • LAMP STACK

    Lamp stack is a full stack development suit that is leveraged to build WEBSITES. LAMP is a full-stack development solution that has integrated front-end and back-end capabilities. FRONT END TECH: HTML, CSS, js, pre-processors, ps, ai, react  BACK END TECH: PHP, node.js  The lamp stack has both a web server and a database server. GUI-based cpanel is used to operate and manage LAMP SERVERS. Both GUI-based…

  • Kali Linux (OS)

    Kali Linux is a Debian-derived operating system used for digital forensics, cyber security, and pen-testing purposes. It offers over 600 cyber security tools for tasks such as network analysis, digital forensics, pen testing, information gathering, hacking, and more. Armitage: cyber attack tool (GUI-based). Nmap / zenmap : Port scanning tool. Metasploit: Pen-testing and Payload delivery. Sqlmap: SQL injection…

  • WebRTC

    WebRTC full form of web real-time communication, it is a web-based real-time communication protocol, and RTC enables web apps to stream audio/video media over the internet. RTC over the web is called webRTC. WebRTC can perform DATA SHARING and TELECONFERENCING in a peer-to-peer fashion. WebRTC works in tandem and synchronized way with OSI PROTOCOL STACKS and APIS. WebRTC is integrated with MEDIA APPs and…

  • Hardware Cables

    Hardware cables are the wired format of connecting two or more hardware devices via Physical layer. Hardware cables are part of WIRED TECHNOLOGY DOMAIN. Fiber optics provides very high bandwidth ranging up-to 100 mbps (100 BASES FX —> FIBER CHANNEL). After the prescribed limit the signal will start to attenuate, each cable type has its…

  • Graphic Card

    A graphic card is a chipset that is integrated with the motherboard to render HD GRAPHICS to high-definition monitors like LED, OLED, Super AMOLED, and more, along with graphic rendering on the screen, the Graphic card is utilized for video rendering, video processing, ultra high definition streaming, game rendering, simulations rendering, high computation graphics processing, high…

  • RESTFUL and GraphQL

    Both RESTFUL and GraphQL are the most implemented API technologies globally, here are the major differences between them. RESTFUL API GRAPHQL API : Diagram The article above is rendered by integrating outputs of 1 HUMAN AGENT & 3 AI AGENTS, an amalgamation of HGI and AI to serve technology education globally. (Article By : Himanshu…

  • GUI and CUI

    The user interface can be graphic-based which is called GUI and it can be character-based called CUI, below are the key differences between the two. GUI and CUI are vital part of HCI. Graphic User Interface : Character User Interface : Cmd is CUI and any application on the web and mobile is GUI, both are leveraged to satisfy specific use cases. Diagram The article above is rendered by…

  • HCI

    HCI as the name suggests deals with how humans interact with computers. If we look at the current tech scenario, humans are interacting with computers via Graphic user interface and Command line interface. The GUI is visual and textual, and CLI is only textual. The command line interface is a more complex approach for the user to connect with the computer. (CLI usage will…

  • Google Maps

    Google maps platform is leveraged by enterprises to map access and integrate highly efficient, low latency, and reliable map services at scale. Google Maps services come under the GOOGLE MAP PLATFORM. Google map coverage is 99 percent of the world’s. It is the highest coverage provided by any private organization for enterprise usage. Google Maps is…

  • Text Data Compression

    TEXT DATA The human-readable linguistic character sets are converted to binary for being processed by the CPU, which means all the characters that humans are converted to base 2. The character encoding can be hexa-based but in the end, all that data will be converted to base 2 binary format. Text data compression is lossless in nature. A-Z are 8-bit binary combinations, which are passed as binary…

  • WASM (web assembly)

    WASM is leveraged to run (HIGHLY COMPLEX APPLICATION) on THE WEB, the WASM provides the compilation target where complex applications like HD games, Photo editor, and video editor can Run on Compilation Target. WASM is a compilation target for programming languages, currently, it supports lots of popular languages. Web assembly provides a sandboxed execution environment. Applications that are written in C, C+, and JAVA programing languages need a compiler…

  • UTF

    UTF is a character encoding standard that has been integrated into digital communication, character code is very vital for any form of textual/visual digital communication, without character code schema the browser / applications will not be able to render the web page in the original format and language. UTF is defined by Unicode standards, the name is derived from universal coded character set transformation format –…

  • PAN (Personal Area Network)

    PAN refers to a personal area network. The coverage area of PAN is lowest as compared to LAN, PAN is aligned with personal computing and personal networking. The Bluetooth connection which is leveraged to connect computing devices with peripherals is one of the examples of PAN. PAN is a personalized network and has a lower range than LAN but a higher range than BAN. The…

  • TCP (Transmission Control Protocol)

    TCP is the layer 4 networking protocol of the OSI model, TCP is responsible for the networking capabilities, both TCP and UDP are placed in the LAYER 4 OSI MODEL, TCP sends packets across the internet and makes sure that the packets are transferred securely, consistently and efficiently.  TCP connection is established by 2 servers and once the TCP session is established, DATA packets can be sent across TCP. TCP leverages the THREE…

  • Database as a Service : Dbaas

    Database as a service is a type of cloud-based service, that provides database instances on demand, the end user can run database-driven (storage workloads) via integrating Dbaas. The data can be structured,semi-structural, and object storage. The Dbaas provides an interface for all kinds of database-driven operations. The MYSQL – Postgres – NOSQL – MongoDB and the DB drivers are available via…

  • Pen-testing : Info-gathering, Payload Delivery, Port-scanning

    The process of penetration testing of a system is called pen-testing, port-scanning is a process that scans the ports of the system, and Info-gathering is the process of gathering information about the system.  Servers have ports that run services and these services need to communicate with other ports to achieve computation/storage/data transfer/communication-based tasks. All the servers are assigned with port numbers, major ports are…

  • CPU

    CPU is the central processing unit, these are the basic set of components to which the CPU is connected. All the above-mentioned systems are connected with the CPU and work in coordination to carry out execute fetch cycle at high speed, precession, and reliability. CU -> CU is a component that is a sub-system of the CPU, the control unit carries out instruction execution…

  • CPU Utilization

    CPU utilization refers to the amount of CPU that is utilized to execute tasks assigned by the OS, the tasks are assigned via APPLICATION PROGRAM and SYSTEM PROGRAM, which are hosted by the OS. CPU utilization is a metric that provides the usage data of CPU resources, CPU utilization is directly proportional to the computational tasks, the higher the computational task, the higher the CPU…

  • Data Management

    The set of processes, protocols, and rules involved in managing data, securing data, and generating value from data is termed data management. The data management can be divided into 11 key areas: 1) Data governance :  |data assets | data trustee| data subject | data steward | data ethics | data customization | The policies, rules, protocol, and…

  • HARDWARE DRIVERS

    I/O systems are required to communicate with the computer, without an I/O system the end user will not be able to get the desired output or add input. Hardware Drivers are the nexus between the Hardware devices sitting at the physical layer and the OS sitting at the software layer.  Hardware Devices –> Hardware Drivers -> I/O Ops (Software Level) All the devices be it…

  • API GATEWAY

    API GATEWAY is a gateway where all the application traffic is routed before the traffic hits the web server or cache layer, all the application traffic will be routed via API GATEWAY. API GATEWAYS are connected to APP servers, CDNS, DNS servers, API Servers, Data centers, Private cloud, On-prem, and many more components in the public and private domain. All the major websites (Major…

  • Dockers

    Dockers is a container standard maintained by OSI (open source initiates), docker client uses docker API to connect to the docker daemon which does all the heavy lifting.  The docker daemon will host docker images which are pulled up from the docker registry. The containers will be running on docker images which are lightweight machine images. Docker client –> API –>docker daemon –>docker image -Container The…

  • Data Normalization

    Data normalization is the way to store data in an OLTP system, the normalization needs to be (an ACID-compliant transaction). Data normalization will result in high consistency and low data redundancy. The 3NF which is the 3rd normalization form is being leveraged widely. Data normalization will reduce redundancy and will enhance Data integrity and consistency, Data normalization process will ensure tables are optimized to…

  • SDLC Security Posture

    Be it infra, network, or hardware endpoints all of it needs to be protected and secured hence it is very important to adapt to a strong SDLC security posture. With the help of a strong security posture, the enterprise and its endpoints can be secured and protected from black hat entities. A tested and pragmatic security strategy with efficient implementation is what enterprises…

  • Registers

    The register is the smaller memory unit, which holds data during processing. The register holds data, physical addresses, instructions, operands, and character values. The register holds data and instructions for real-time processing. Registers hold data that the CPU is processing. The instructions stored in the register will go through processing, eg the value stored in two registers can be added via add operations,…

  • Designing Phase

    The designing phase is the second phase of SDLC where the UX and Dev team along with the business team/sponsors decide the look and feel of the front end and back end of the software infra. The deliverables in front end designing phase will be different from the deliverables in back end designing phase, the backend needs to be designed as well via diagramming and designing frameworks like UML…

  • EDA (Event Driven Architecture)

    The Event driven Architecture of software solutions is based on event production, event streaming, and even consumption. The events produced in EDA are streamed to be consumed by the event consumer. Event producers will produce the events and the events will be streamed via a streaming pipeline to be consumed by the event consumer. Events in EDA are of multiple types and formats and a…

  • WaterFall SDLC

    Waterfall SDLC is one of the most primitive software developmentlife cycle management process, since its inception many other models like scrum, V shape model etc have evolved, but till this data if linear development needs to be undertaken then waterfall model is one of the best way to carry out software development. Waterfall model is…

  • SDLC at Enterprise Level

    SDLC at Enterprise Level is a process that involves lot of human resources, it has many stages, the first stage is the requirement analysis, the second is the designing and the third is the development phase which is the crux of SDLC. In development phase the front end code will be developed by the front…

  • File System

    The files can be stored in the PUBLIC CLOUD | PRIVATE CLOUD | ON-PREM. The file system is leveraged to keep the file organized and accessible. The file can be stored in a flat file system along with this multiple other  file systems can be leveraged for file storage and retrieval .The file systems are…

  • CACHE

    In computer system the cache memory is used to store temporary files / data, which will be used frequently, the cache memory is expensive as compared to another types of persistence storage. Data that is used frequently is stored in cache memory. The cache works in 3 levels: L1 Cache – Fastest SpeedL2 Cache –…

  • ACID Compliance & Transactions

    ACID TRANSACTION refers to atomicity, consistency, isolation and durability. ACID transactions are implemented globally across all high performance, highly available, highly consistent and mission critical systems like banking, government processes, business process, healthcare processes and much more. ACID Database Transactions ensure consistency and availability during errors, power failure, system failure and network errors. Acid transaction…

  • OLAP & OLTP

    OLAP is for analytics processing and OLTP is for Transaction processing. OLAP & OLTP are integrated at enterprise level in order to process transactions and analyze analytics. OLAP (Online analytics processing systems) online analytics processing, OLAP is for managing analytics workload, the output is analytics processed via algos, it is read heavy in nature, OLAP…

  • Array & Linked List

    Array is a data structure in which elements are stored in continuous memory location (memory representation ), continues allocation of elements takes place in arrays, Linked list consist of Data and Reference. Array has random access permissions and Link list has sequential access permissions. Both Array & Linked List organizes data differently. Insertion and deletion process…

  • API Management

    The API needs to be optimized and managed in the right way to ensure efficiency, scalablity and cost-effective operations of API infra. The client API DEV PORTAL will be connected to the API SERVERS via CLIENT ID and CLIENT SECRET which will be provided by the cloud and api vendors. Client will connect through API…

  • ALU (Arithmetic Logical Unit)

    ALU full form is arithmetic logical unit, all the mathematical and logical operations are carried out by ALU. ALU is a combinational digital circuit which performs the following ops: Arithmetic operations | Bit-wise Operations | Logical Operations In order to carry out floating point operations, the floating point unit is leveraged. In order to carry…

  • No Code Platforms

    No code platforms ensures that the website idea can be easily translated into a back-end and front end web/mobile infra which can be consumed by user base at scale. The web development can be categorized into front end and back end web development, in order to develop websites, both front end developer and back end…