Tech Blogs

File Handling and Operations in Python

Reading Time: 4 minutes Python is extensively used for file handling and operations performed in a file. It supports multiple programming paradigms such as: Structured Programming Object-oriented Programming Functional Programming File Handling Python has its own standard library which is very extensive and offers a wide range of functionalities such as I/O handling and standard solutions to many problems that arise during execution. It uses dynamic typing to verify Continue Reading

ZFS Storage pool layout: VDEVs

Reading Time: 3 minutes ZFS initially stood for Zettabyte File system. It was developed by Matthew Ahrens and Jeff Bonwick as a part of Sun Microsystems in 2001 but later was placed under a closed license when Oracle Corporation acquired Sun Microsystems Inc. ZFS is well known for its storage pool and the features associated with it. It is a multiprotocol enterprise storage system that is designed to enhance the Continue Reading

Bash Array

Reading Time: 2 minutes Bash Array It can be define as the collections of a similar type of elements.In bash, There are no option for multi-dimensional arrays but yes bash provide the support of one-dimensional numerically indexed arrays. Initialization To initialize a array in bash, we use assignment operator (=), by specifying the list of the elements within parentheses and separated by spaces like below: Access Elements echo ${ARRAY_NAME[2]} Continue Reading

Overview of Docker Registry

Reading Time: 4 minutes The Docker Registry is open-source, under the permissive Apache license. Docker Registry is a storage where you can store and distribute the docker images.  And why we need Docker Registry explained in below : So let’s say you’re working on your project and you have your own docker images so you want to host your docker images locally for your office work , your organization, Continue Reading

What is Deployment in Kubernetes?

Reading Time: 4 minutes Deployment in kubernetes is an upgraded and higher version of Replication controller. They manage the deployment of a replica set which is also an upgraded version of the replication controller. Deployment in kubernetes allows you to describe an application life cycle, such as which images to use for the app, the number of pods, and the way in which they should be updated. In kubernetes, Continue Reading

Add AWS credentials in Terraform

Reading Time: < 1 minute Hi readers, in this blog we will discuss about the different ways to add aws credentials (access key and secret key) in a Terraform configuration file. There are many ways to do it. Lets discuss some of them. Add it to your configuration files while defining your variable This would be the most naive way to do it. You will add the values in the Continue Reading

All about data connectors

Reading Time: 3 minutes Bottomline: A data connector is used to copy the data from one(or more) source(s) to the data warehouse (usually a single location where it is easy to perform certain operations) What is data connector? A data connector is the logic that enable developers (or data-science folks) to transfer the data from source (after extracting) to the destination. For example you need to prepare a model Continue Reading

Exploring Spring Boot :Beginners Level

Reading Time: 4 minutes What is Spring Boot Spring Boot is a project which is built on the top of the Spring Framework. it will provide us an easier and faster way to set up likewise configure. Similarly it runs both simple and web-based applications. Spring module provides the RAD (Rapid Application Development) feature.The Spring Framework is used to create a stand-alone Spring-based can just run because it needs minimal Continue Reading

Introduction to Hibernate

Reading Time: 3 minutes In this article, we are going to discuss the Introduction to Hibernate framework. Before proceeding, we need to understand concepts of Core Java, SQL as well as the working of JDBC. Let’s understand Object Relational Mapping(ORM). What is ORM(Object Relational Mapping)? Object-Relational Mapping (ORM) technologies are responsible for saving/reading/editing/deleting the objects from our application to the relational database tables. ORM makes our Java application more flexible Continue Reading

Contracts in Ethereum using Solidity

Reading Time: 2 minutes The Contracts in the sense of Solidity is a collection of code and data. That resides at a specific address on the Ethereum blockchain. Contracts in Solidity are similar to classes in object-oriented languages. They contain persistent data in state variables, and functions that can modify these variables. Creating Contracts Contracts can be create from outside via Ethereum transactions or from within Solidity contracts. Lets Continue Reading

Let’s Learn About TestNG Framework

Reading Time: 6 minutes In this tutorial my goal is to share knowledge regarding Test Next Generation (TestNG) TestNG is an open-source test automation framework for Java. It is develope on the same lines of JUnit and NUnit , Few advanced and useful features provided by TestNG makes it more robust framework compared to it’s peers.TestNG framework eliminates the limitations of the older framework by providing more powerful and Continue Reading

Error handling in Solidity is very useful

Reading Time: 3 minutes Hello guys, here is another blog on Solidity. Check out my previous blog on Value types in Solidity. In this blog, we will see how to do error handling in Solidity. Solidity uses state-reverting exceptions to handle errors. Such an exception undoes all changes made to the state in the current call and all its sub-calls and reports the error to the caller. When exceptions Continue Reading

Why Is There a Need For Authentication and Authorization?

Reading Time: 2 minutes So let’s talk about authentication & authorization. Authentication confirms that users are who they say they are. Authorization gives those users permission to access a resource. These two terms might sound similar but they have different meanings & purposes. Authentication The act of validating that users are who they claim to be is what we can call authentication. This technology provides access control for systems Continue Reading