Author: M. Saqib

Quicksort Video – Algorithm Explanation

Quicksort is an efficient sorting algorithm based on Divide and Conquer rule. It works by selecting a ‘pivot’ element from the array and partitioning the other elements into two sub-arrays and recursively sorting them.

Read More

How to Read and Write Excel Files in C#

This tutorial shows you how to Read and Write Excel files in C#. We are going to use Microsoft COM Objects i.e. Excel 16 object in our application. Use the following sample C# source codes for Excel reading and writing. There are multiple examples discussed in this tutorial to read Excel files using C# and write data back to Excel file.

Read More

Fundamental Principles of Data Integration for Database Administrators

We live in a new era of data-centered enterprise management. There are various types of modern data coming through different sources, in increasing volumes, and from different locations like never before. We now live in an era of emerging solutions which helps enterprises to meet the challenges in data integration effectively.

Read More

LRU and FIFO L1 Cache Implementation using C

This is a C program to demonstrate cache mechanism by simulating a cache in C. The source code can run in any C Compiler with minor modifications if required. It can run on real memory traces as input to your cache simulator. We have implemented two cache replacement policies i.e. least recently used (LRU) and First-in first-out (FIFO) replacement policies.

Read More

Vigenere Encryption and Decryption in C++

The Vigenere cipher is a method of encrypting or decrypting alphabetic text by using a series of interwoven Caesar ciphers (Caesar Shift), based on the letters of a keyword. In cryptography, Caesar shift is one of the simplest known encryption techniques. It employs a form of polyalphabetic substitution, which is using multiple substitution alphabets.

Read More

The Better Traits and Features of RASP Security

The other name for RASP is Runtime Application Self Protection. It is one of the most contemporary technicalities that help in protecting the running application in time. It can be compared to WAF perimetral approach and RAASP helps in protecting the applications from the interior. It refers that RASP has greater visibility in case of data flow and each input comes with the consequences to help the application receive with glee. Here is the post to describe the perfect working of RASP along with the set of necessary advantage. This will help compare the perimetral defenses and this can be leveraged by the main teams as part of the Software Development Lifecycle.

Read More

What You Need to Know About Ethereum Based Dapps

When it comes to blockchain technology, one of the most interesting uses so far has been in regard to Dapps. The applications that have been created range from blockchain based games, to a decentralised version of twitter, and even a voting platform.

Read More

What You Should Know About Call Centers

Providing a satisfying customer experience is what makes or breaks any business. There are different ways through which our digital-driven world has managed to revolutionize call centers. If you are new to this world, here is everything you need to know about call centers.

Read More

Subscribe for updates

Join Over 20,000+ Readers    

Advertisement