-
The MECE MUSE
Christie Lindor is a management consultant, a great speaker, role model and mentor to many. Quality experience of more than 15+ years in management consulting companies such as Deloitte Consulting LLP and IBM Business Consulting Services gives her unique perspective. It became apparent to me as I finished the first few chapters that, this is…
-
Price and The Pauper
Every writing of Mark Twain is work that deserves applauds, He has, this exception ability of coming with extraordinary observation and also, he was equally capable of transforming an ordinary event into beautiful narratives that kept readers glued to the pages. Prince and Pauper is no different in that sense. I thoroughly enjoyed its fast paced,…
-
New Programming Language, Do we really need ?
We have seen multiple new programming languages every year and question which is commonly asked is Will there always be new programming languages coming out? I believe many new programming languages will keep coming and many are on the way. Technologies are evolving around us will make it fairly easy; everyday big corporation and tech…
-
ipconfig/displaydns
Why does the aboave command prints URLs, Websites addresses that we have never accessed before ? When your system communicates with the DNS server for resolvingthe name queries, Your system builds the cache over the perios of time, This cache normally contains records from the host file and also the retrieved records from the recently…
-
Backend vs Frontend
Why did backend guys always feel superior over frontend guys? I have been on both side and have done both front-end development and back-end development for long time. Truth is in a web based product nothing is superior both complement each other. Think about the product which has sophisticated transaction processing system, better error handling,reliability…
-
Information Security Profile Questions
One of the friend asked this question in one of the popular forums, i thought I should keep copy of my answer in my blog as well.What sort of interview questions can be asked in information security profile?It depends on your role under information security profile, If you are ininformation security engineering role, questions will…
-
Google and Facebook’s Data Center
I think Capacity wise Facebook is the good place to start as no other website has experienced kind of volume and traffic that Facebook has witnessed in the recent past.As you have not specified whether You want to know more about the infrastructure, security or you are interested in their operating model, staff size and…
-
What is RSASecure ID and How it works
RSA SecureID is in use from long time, I think even before GPS. It uses two factor authentication mechanism. **RSA SecurID**, formerly referred to as **SecurID**, is a mechanism developed by Security Dynamics (later RSA Security and now RSA, The Security Division of EMC (RSA Security)) for performing two-factor authentication (Two-factor authentication) for a user…
-
Cryptocurrencies, what is it ?
Precious metal, exchange of goods have served as currency in the past, as human race advances and their knowledge of market, financial innovations surfaces. This time its about the Cryptographic currencies. You might have heard about Block Chain, Bitcoin, Titcoin, Primecoin etc.. all of them are digital way of exchanging values. These frameworks outlines how…
-
The Litigators | Book review
I am back after 10 days long leave from work, sometime it really feels so good to stay away from work and office, sometime it is very much required not only to relax but also to give some time to your other hobbies and remind yourself that We are human and no matter what we…