Learning Portal @T9

  • TCP (Transmission Control Protocol)

    TCP is the layer 4 networking protocol of the OSI model, TCP is responsible for the networking capabilities, both TCP and UDP are placed in the LAYER 4 OSI MODEL,…


  • PAN (Personal Area Network)

    PAN refers to a personal area network. The coverage area of PAN is lowest as compared to LAN, PAN is aligned with personal computing and personal…


  • Pen-testing : Info-gathering, Payload Delivery, Port-scanning

    The process of penetration testing of a system is called pen-testing, port-scanning is a process that scans the ports of the system, and Info-gathering is the…


  • Database as a Service : Dbaas

    Database as a service is a type of cloud-based service, that provides database instances on demand, the end user can run database-driven (storage workloads) via integrating Dbaas. The data can…


  • CPU

    CPU is the central processing unit, these are the basic set of components to which the CPU is connected. All the above-mentioned systems are connected with…


  • CPU Utilization

    CPU utilization refers to the amount of CPU that is utilized to execute tasks assigned by the OS, the tasks are assigned via APPLICATION PROGRAM and SYSTEM PROGRAM, which are hosted…


  • Data Management

    The set of processes, protocols, and rules involved in managing data, securing data, and generating value from data is termed data management. The data…


  • HARDWARE DRIVERS

    I/O systems are required to communicate with the computer, without an I/O system the end user will not be able to get the desired output or add…


  • API GATEWAY

    API GATEWAY is a gateway where all the application traffic is routed before the traffic hits the web server or cache layer, all the application traffic will be routed via API…


  • Dockers

    Dockers is a container standard maintained by OSI (open source initiates), docker client uses docker API to connect to the docker daemon which does all the heavy…


  • Data Normalization

    Data normalization is the way to store data in an OLTP system, the normalization needs to be (an ACID-compliant transaction). Data normalization will result in high…


  • SDLC Security Posture

    Be it infra, network, or hardware endpoints all of it needs to be protected and secured hence it is very important to adapt to a strong SDLC security posture. With the…


  • Registers

    The register is the smaller memory unit, which holds data during processing. The register holds data, physical addresses, instructions, operands, and character values. The register holds data…


  • Designing Phase

    The designing phase is the second phase of SDLC where the UX and Dev team along with the business team/sponsors decide the look and feel of the front end and back end…


  • EDA (Event Driven Architecture)

    The Event driven Architecture of software solutions is based on event production, event streaming, and even consumption. The events produced in EDA are streamed to be consumed by the…


  • WaterFall SDLC

    Waterfall SDLC is one of the most primitive software developmentlife cycle management process, since its inception many other models like scrum, V shape model…


  • SDLC at Enterprise Level

    SDLC at Enterprise Level is a process that involves lot of human resources, it has many stages, the first stage is the requirement analysis,…


  • File System

    The files can be stored in the PUBLIC CLOUD | PRIVATE CLOUD | ON-PREM. The file system is leveraged to keep the file organized…


  • CACHE

    In computer system the cache memory is used to store temporary files / data, which will be used frequently, the cache memory is expensive…


  • ACID Compliance & Transactions

    ACID TRANSACTION refers to atomicity, consistency, isolation and durability. ACID transactions are implemented globally across all high performance, highly available, highly consistent and mission…


  • Array & Linked List

    Array is a data structure in which elements are stored in continuous memory location (memory representation ), continues allocation of elements takes place in…