Blog

  • 21
    Jan
    2019
    Using Selenium To Interact With Elements On A Web Page

    A web application runs in servers where most of the complex processing takes place: interactions with databases and external services, validation of business logic, and encryption and security measure

  • 19
    Jan
    2019
    Hadoop Installation And Configuration

    What is Hadoop? Hadoop is a globally-used, open source software programming framework which is based on Java programming with some native code of C and shell scripts. It can effectively manage large

  • 18
    Jan
    2019
    Blockchain Tutorial

    As the use of cryptocurrency has widespread, the number of transactions are increasing everyday. Maintaining a record for all these transactions is difficult, so the Blockchain technology is introduce

  • 16
    Jan
    2019
    Why Network Security Needs To Have Big Data Analytics?

    Businesses go through massive renovations now and then to accommodate their growing needs. A traditional system renders many businesses incapable of taking the right decision at the right time. Becaus

  • 16
    Jan
    2019
    Record Level Security In Salesforce

    Record level security enables the users to access few object records. Every record/data is owned by the user and he/she has the full access to it. In hierarchy, the users in the senior levels always h

  • 14
    Jan
    2019
    Microservices Security And How Do You Secure Them?

    Microservices is one of the things which comes to our mind when we think about the innovation. It has been contributing its share towards the enhancement and development of software. Microservices ar

  • 12
    Jan
    2019
    Operators In Java

    Java has a rich set of operators. Operators in Java are a symbol which is used to perform some operations on data. They can be divided into below categories. Java Operators Arithmetic Operators

  • 11
    Jan
    2019
    User Management And Object Level Security In Salesforce

    Internal Security in Salesforce About 59% of security threats are faced due to internal threats which occur with employees, Third parties and Ex-employees. They are becoming a casualty of phishing sc

  • 09
    Jan
    2019
    Appium Tutorial For Beginners

    Introduction Appium is one of the open source tools which is widely used for automation testing of mobile apps. The tool is used to test apps in iOS and Android platforms. Appium is suitable for test

  • 08
    Jan
    2019
    Security And Audit Trail In Salesforce

    Salesforce Security Salesforce enables two types of security namely internal, and external security to protect the data and applications. We can implement our own security scheme in order to protect