Blogs
Malware detection Methodologies
What is Malware? A software intent to infect a computer or do any frau...
Why consider using Gitlab over Jira?
This blog gives you a high-level idea about different terminologies us...
Steps to Implement 2-Way (Mutual) SSL Authentication
SSL (Secure Socket Layer) is a protocol used to establish a secure enc...
React Native Vs Flutter: An Evaluation for Your App Development
It’s a no-brainer that mobile app development is growing vigorously. N...
Design Patterns in Test Automation – A Quick Walkthrough
Design patterns are best practices that the programmer can adapt to en...
How to Implement Push Notification using Firebase in React Native 0.60+ (iOS)
WHAT IS A PUSH NOTIFICATION? AND WHY IT MATTERS? Push notification is ...
Haversine Vs Vincenty: Which is the best?
In traditional methods, we calculate distance by assuming the earth as...
Configuring Eclipse for Protractor
If you are using Protractor for automating AngularJS application testi...
What matters now is BIG DATA! [ Infographics ]
Large datasets that cannot be analysed with traditional computing tech...