Author: Harshit Gupta

female software engineer coding on computer

How to build and push a docker image in ACR using the ADO pipeline

Reading Time: 3 minutes What is ACR? ACR is known as Azure Container Registry. It is a cloud-based service for managing private registries on Docker Registry. We can use it to create and maintain Docker container registries in the Azure cloud and manage to store Docker images and artifacts privately. These are the following steps to build and push the docker image to ACR using ADO: Step1. Firstly you Continue Reading

woman using laptop computer with vr headset

How to check vulnerability in IaC using Snyk

Reading Time: 2 minutes What is Snyk? Snyk (pronounced sneak) is a platform to secure your source code, Containers, and IaC, It scans your code and tells what vulnerabilities are in your code. We can Integrate Snyk in different IDEs to check your code. In another word, we can say it is Grammarly for your code. Steps to Scan your IaC Prerequisite If you don’t have Snyk you can go Continue Reading

female engineer controlling flight simulator

How to add an Agent in the Azure DevOps Pipeline

Reading Time: 3 minutes What is Agent? An agent is a service that runs the jobs of your pipeline in other words we can say it is a computing infrastructure (maybe any VM or local machine) with installed agent software to run the pipeline jobs. When you build and deploy code using ADO Pipelines you need at least one agent. There are two types of Agent in ADO Here Continue Reading


What is Penetration Testing and Its Stages

Reading Time: 2 minutes Penetration testing, known as a pen test, is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. This simulated attack aims to identify any weak spots in a system’s defenses that attackers could take advantage of. With the help of Penetration testing, we can secure our system and our organization because there are many tools that provide Continue Reading

Developing programmer Development Website design and coding technologies working

What is Logrotate and Its Uses

Reading Time: 3 minutes Before starting the logrotate we should know about what are logs. Logs are the records of everything and anything that happens within a system. It is helpful for finding what an application is doing and troubleshooting for a possible problem. Linux has a directory for storing logs i.e /var/log. This directory contains logs of OS ,services and applications that run on the system. What is Continue Reading

How to Set Bucket Policy Using Boto3

Reading Time: 2 minutes What is Boto3 Boto is a software development kit (SDK) design to enhance the use of the Python programming language by Amazon Web Services. For more details and installation of Boto3 visit the Reference section. Set a bucket policy A bucket’s policy can be set by calling the put_bucket_policy method. Example This is the complete code to set policy. How to generate Bucket policy in aws console Continue Reading

Storage Mechanism In Open Stack

Reading Time: 2 minutes What is Open Stack ? Open Stack is an open source platform that uses pooled virtual resources to build and manage private and public clouds. It handle the core cloud-computing services of compute, networking, storage, identity, and image services It offers unlimited storage pools and supports block-IO from a variety of vendors, as well as object file storage. Open Stack Storage Option : There are 4 storage option in Open Stack Block Storage Continue Reading

Which Technology is Better: GSM or CDMA ?

Reading Time: 3 minutes What is CDMA ? CDMA stands for Code Division Multiple Access.The CDMA came into existence in 2G and 3G generation.It is the protocol of wireless communication. It is based on the spread spectrum technology and makes optimal use of the available bandwidth. Since it uses the spread spectrum technology. It allows each user to transmit the data over the entire frequency spectrum at any time. Whenever a call Continue Reading

Architecture of GSM Technology

Reading Time: 4 minutes INTRODUCTION GSM (pronounced GEE – ESS –EM) is the most popular cell phone standard, especially when compare to CDMA .The origins of GSM can be traced back to 1982. When the Group Global System for Mobile communications was one of the second generation mobile .There signal convert Analog to Digital . According to the “GSM Association(GSMA)” In 2010 GSM achieving 90% market share and operate Continue Reading

Internet of Things: An Implementation Aspect

Reading Time: 3 minutes What is the Internet of Things? The Internet of Things, or IoT, refers to the billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. IOT is an intelligent technique which reduces human effort as well as easily accesses physical devices. In other we can say IoT devices are basically smart devices which have support for Continue Reading

Difference between Cloud and fog Computing

Reading Time: 3 minutes What is cloud ? The term cloud is very popular in now days move to the cloud , running in the cloud ,stored in the cloud. Accessed from the cloud: these days is seems like everything is happening “in the cloud”. But what exactly is this concept? The short answer is that it’s somewhere at the other end of your internet connection – a place Continue Reading

How to handle iframe in Selenium Webdriver

Reading Time: 4 minutes What is iframe ? An iframe is also known as the inline frame. It is a tag used in HTML5 to embed an HTML document within a parent HTML document. An iframe tag is defined using <iframe></iframe> tags. An iFrame is an inline frame used inside a webpage to load another HTML document inside it. This HTML document may also contain JavaScript and/or CSS which is loaded at Continue Reading

What is Plagiarism and their Detection techniques

Reading Time: 4 minutes Plagiarism has always been an issue for teachers, writers, editors, and others who deal with words and ideas on a regular basis.There are many software that check plagiarism. But not every program has a large database or an accurate algorithm. Even the best checkers don’t have a 100-percent success rate.So the manual process is also there. But knowing how the tools that check text for Continue Reading