computational geometry Polygon Triangulation In this article, we have explained the problem statement of Polygon Triangulation along with algorithmic approaches.
computational geometry Applications of Computational Geometry In this article, we have explained Applications of Computational Geometry along with topics/ algorithms used to solve a specific problem.
Linux ufw in Linux ufw (Uncomplicated Firewall) is a Linux utility that runs on top of iptables used to manage netfilter and managing the firewall. We look at ufw in Ubuntu and how to manage the firewall.
Linux vmstat command in Linux We use the vmstat command for system performance monitoring in Linux. It reports statistics about threads, system calls, CPU activity, memory, disks, and more.
Machine Learning (ML) YOLOR model architecture In this article, we have covered YOLOR model architecture in depth and compared it with other YOLO variants like YOLOv4.
Python Python script to read and write JSON file In this article, we have explained the idea of reading and writing JSON file in Python with a complete Python implementation example.
Linux firewalld in RHEL firewalld is a Linux utility used to manage firewall rules. In this article we discuss firewall management using firewalld.
Linux iptables in Linux We use iptables to create firewall rules. In this article we learn about iptables and how to manage firewall rules in Linux.
List of Mathematical Algorithms Finding ASCII value of a character In this article, we have explained the approach to find the ASCII value of a character in various Programming Languages along with the introduction to ASCII.
String Algorithms Find all anagrams of a given string In this article, we have explained efficient algorithms to Find all anagrams of a given string. This involve techniques like sliding window approach.
Problems on Binary Tree Bottom view of a Binary Tree In this article, we have explained the algorithm to find the Bottom view of a Binary Tree.
DevOps Next big thing in DevOps DevOps trends that will rule the Software Industry in the coming few years.
Data Communication and Computer Networks Distance Vector in Computer Network In this article, we have covered the idea of Distance Vector in Computer Network in depth along with Routing and Distance Vector Routing protocol.
Interview Problems on Array Maximum consecutive ones when at most k zeros can be flipped In this article, we have explored algorithms to Find the longest sequence of consecutive ones when at most k zeros can be altered to 1. This involve techniques like Sliding Window approach.
List of Interview Questions Questions candidate should ask a DevOps Interviewer We have compiled a list of questions to help you get the most out of your interview and learn more about the company and the role you're interviewing for.
Python Scalar Variable Types in Python In this article, we will be discussing what scalar variable types are and how to use them correctly in Python. These are some basic and very important datatypes.
C++ Variable in C++ In this article, we will learn everything about the variables in C++ including rules of variable naming, types of variables and much more.
Python Different ways to merge dictionaries in Python In this article, we have explored Different ways to merge dictionaries in Python.
System Design Graph Database in System Design In this article, we will look at what are graph databases, how they differ from traditional relational databases, and their uses in System Design.
data science Data Warehousing using SSIS In this article, we will learn how SQL Server Integration Services (SSIS) is used for Data Warehousing in Data Science.
data science Data Warehousing In this article, we will understand the concept of Data Warehousing in Data Science and get an idea of some tools used for data warehousing.
TensorFlow tf.reshape(): Reshape tensors in TensorFlow In this article, we have explored the idea of Reshaping tensors in TensorFlow with tf.reshape() and which models like GoogleNet use it.
Linux journalctl in Linux In Linux, systemd provides a centrally managed journal where all kernel and userland processes' logs are stored. We use journalctl to interact with journals.
Linux SSH passwordless login in Linux Passwordless login is useful in cases whereby we want to automate server administration tasks. We discuss how to configure ssh passwordless login in Linux.
Linux Accessing a remote server using SSH Secure Shell(ssh) is a cryptographic protocol for networking which encrypts communication between two remote hosts. In this article we learn how to safely access a remote server using ssh.