Home

  • Price and The Pauper

    Every writing of Mark Twain is work that deserves applauds, He has, this exception ability of coming with extraordinary observation and also, he was equally capable of transforming an ordinary event into beautiful narratives that kept readers glued to the pages. Prince and Pauper is no different in that sense. I thoroughly enjoyed its fast paced,…

    Read more…

  • The Inevitable

    12 Technological forces that will shape our future by Kevin Kelly Recently finished “The Inevitable” by Kevin Kelly. Wonderful perspective shared on technology and its future roadmap. In his book, he has talked about the 12 technological forces that are going to shape our future. Book covers very recent developments in technology such as Block…

    Read more…

  • The Bourne Betrayal

    A Novel by Eric Van Lustbader and Robert Ludlum I am huge fan of Robert Ludlum. I love all novels and this includes those that are written by Eric Van Lustbader. There is a difference between Ludlum’s novel and Lustbader’s once but there is nothing bad to complain on, It is different because each writer…

    Read more…

  • Web Assets and Security Risk

    In application security world blacklisting and whitelisting validations are very popular. This basically indicates what should be allowed and what shouldn’t be allowed. I was thinking about some of the web applications deployment structure and paying attention on the way various files are packaged and deployed. I found one interesting thing about web assets like…

    Read more…

  • New Programming Language, Do we really need ?

    We have seen multiple new programming languages every year and question which is commonly asked is Will there always be new programming languages coming out? I believe  many new programming languages will keep coming and many are on the way. Technologies are evolving around us will make it fairly easy; everyday big corporation and tech…

    Read more…

  • ipconfig/displaydns

    Why does the aboave command prints URLs, Websites addresses that we have never accessed before ? When your system communicates with the DNS server for resolvingthe name queries, Your system builds the cache over the perios of time, This cache normally contains records from the host file and also the retrieved records from the recently…

    Read more…

  • Backend vs Frontend

    Why did backend guys always feel superior over frontend guys? I have been on both side and have done both front-end development and back-end development for long time. Truth is in a web based product nothing is superior both complement each other. Think about the product which has sophisticated transaction processing system, better error handling,reliability…

    Read more…

  • Information Security Profile Questions

    One of the friend asked this question in one of the popular forums, i thought I should keep copy of my answer in my blog as well.What sort of interview questions can be asked in information security profile?It depends on your role under information security profile, If you are ininformation security engineering role, questions will…

    Read more…

  • Google and Facebook’s Data Center

    I think Capacity wise Facebook is the good place to start as no other website has experienced kind of volume and traffic that Facebook has witnessed in the recent past.As you have not specified whether You want to know more about the infrastructure, security or you are interested in their operating model, staff size and…

    Read more…

  • Microservices Architecture, A developer’s Prespective

    Microservices architecture addresses many concern of application development but does not solve all the problems. It has its own advantages and limitations. In order to understand it fully, we need to understand one common architecture pattern in practice, i.e. Monolithic Architecture Monolithic architecture are highly tightly coupled and you can’t change something without impacting other.…

    Read more…