Functional Programming

Data Structure and Control Structure in Solidity

Reading Time: 3 minutes Hello Reader, Do you know what are data structures? If not then here is what data structures mean. A data structure is a particular way of organising data in a computer memory so that it can be used effectively. Solidity provides three types of data structures: Structs Arrays Mappings One by one let us look at each data structure. Structs: Solidity provides a way to define new Continue Reading

Gyroscope| Sensor of the “stm32 Discovery Board”

Reading Time: 4 minutes Today we are going to learn about a new sensor of the stm32f3 Discovery Board. This sensor is known as Gyroscope. We are going to know about this particular sensor and its function and why we need it in our embedded development. This is going to be a series of the blogs just like other series for Sensors. In our previous series of blogs, we Continue Reading

Jenkins builds on Kubernetes cluster

Reading Time: 4 minutes Hello everyone, so in this blog, we are going to learn today that how can we run Jenkins build in Kubernetes as a pod. Jenkins is an open-source tool written in java and also have a plugin built for continuous integration and build automation purpose. It helps in automating the parts of software development related to building, testing, and deploying, facilitating continuous integration and continuous Continue Reading

Getting Started With Django web framework

Reading Time: 4 minutes What is Django? Django web framework is a full-fledged python based web framework that can be used to build complex and highly scalable web apps. It closely follows the MVC(Model, View, Controller) pattern of software development i.e., MVT(Model, View, Template) where the template is equivalent to the controller in the MVC pattern. Model defines the data structure. This is the base layer to an application Continue Reading

Alerts in grafana, all you need to know

Reading Time: 3 minutes Grafana alerts are useful since they tell you about the problems in your system moments after they occur. Which in turn results in quickly resolving the issue. Also reducing the disruption time of the service. Main components of Alerts Alerting rule– This consists of one or more query/expression, a condition, the frequency of evaluation. Also the duration (optional) that a condition must met for the Continue Reading

Why Solidity is used to Develop Smart Contracts?

Reading Time: 3 minutes Solidity was first proposed and developed in year 2014 by Gavin Woodand since then it has come a long way. Then Ethereum’s Solidity team led by Christian Reitwiessner developed it later. It is a high-level , object-oriented language used for implementing smart contracts. A smart contract is a self-executing contract. It has the terms of the agreement between buyer and seller. The code and the agreements Continue Reading

Accelerometer as Puncho-o-meter | The “stm32-Discovery Board Sensor”- Part 3

Reading Time: 4 minutes Hello everyone, In this blog, we are going to provide you the way to use the Accelerometer Sensor of the Discovery Board as a Punch-o-meter. This is going to be the last part of the series in which we will work with Accelerometer as Puncho-o-meter. In the previous part, we have discussed the Accelerometer Sensor of the Discovery Board and we also got the readings Continue Reading

JavaScript Fundamentals

Reading Time: 3 minutes “this” keyword in JavaScript The “this” keyword in JavaScript refers to an object, that object which is executing the current bit of the code.“Execution context means how the function is being called”. Every java script function while executing has a reference to its current execution context called “this”. “this” refers to a global object. To put it in simpler terms “this” refers points to the Continue Reading

Spring Security – A Starter Guide

Reading Time: 5 minutes spring security – authentication and authorization in detail Topics covered Basics of spring security What is spring security? What spring security can do? 5 core concepts of spring security and their detailed breakdown. Definition of Spring Security : The proper definition of spring security is: spring security is an application level security framework that provides ways to to apply application level security to the application. Continue Reading

Tensorflow used for Image Classification

Reading Time: 2 minutes What is TensorFlow? Tensorflow is an open-source library for numerical computation and large-scale machine learning that ease Google Brain TensorFlow, the process of acquiring data, training models, serving predictions, and refining future results. How Tensorflow and Keras used for Image Classification This blogs shows how to classify images of wheat classes. It creates an image classifier using a keras.Sequential model, and loads data using preprocessing.image_dataset_from_directory. You will gain practical experience Continue Reading

Error Handling in Rust – Error are a fact of life in Software.

Reading Time: 4 minutes Hello Readers!! Again I am here with an exciting topic that is Error Handling. As we know errors are things that no one wants in their program. So lets see what are Errors and how we can handle them . An error is basically an unexpected behaviour or event that may lead a program to produce undesired output or terminate abruptly. We can try to find Continue Reading

Guide to Implement Jenkins on AWS with High Availability

Reading Time: 3 minutes In our current project we were using managed service as our primary CICD solution. Since the last few months our managed service provider’s servers went down a few times which impacted our client’s business. So we decided to move to a self managed CICD solution. For our case Jenkins turns out to be the best tool to implement the same. Requirements High availability Scalability Security Continue Reading

Monads: Functional Programming in Scala

Reading Time: 3 minutes Introduction Monads have a deep basis in the mathematical side of computer science, coming out of category theory. Monads are nothing more than a mechanism to sequence computations around values augmented with some additional feature. This section will therefore present a condensed and simplified take on monads. As we said, a monad augments a value with some additional features. Such features are called effects. Some well-known effects Continue Reading