Uncategorized Archive

Public and Private-key cryptography

Public-key cryptography is the backbone of most distributed systems. It provides both a way to encrypt a message and to confirm the source of a message, without the need to agree upon a shared key. It is used in a wide variety of protocols and data formats, which are implemented by a huge range of

Caching Explained

Caching Scheme The concept of caching is simple. If the data needed to satisfy the access request are not already cached, then a copy of those data is brought from the server to the client system. Accesses are performed on the cached copy. The idea is to retain recently accessed disk blocks in the cache,

Deploy resources in AWS quickly using AWS CloudFormation

  Cloud Formation is an infrastructure-as-code (IaC) product, where it allows developers and systems administrators with an   easy way to create and manage a collection of related AWS resources, provisioning and updating them in an orderly and predictable fashion .It make use of codes or templates to define infrastructure in order to create, modify and

we accept payment through

Social Media Auto Publish Powered By : XYZScripts.com