Image must be less than 2MB
08 Feb 2022
03 Feb 2022
Named after the Roman God of war and often called the “red planet,” Mars has long captivated scientist's imagination due...
02 Feb 2022
Triple extortion method combines denial of service attacks with encryption and data disclosure threats. Learn more about...
26 Jan 2022
The general framework for SRE and DevOps are quite similar and they share the same end goal. Discover how these two, SRE...
08 Jan 2022
What is Social Proof?
06 Jan 2022
How The Term Agile Software Development Has Evolved with The Introduction of SRE (Site Reliability Engineering)?
14 Dec 2021
06 Dec 2021 - Present
Want to grow your Instagram? Read this article.
05 May 2021
I conducted research on a specific constituency, spoke with governing members of that constituency, and wrote a report o...
01 Feb 2020 - 30 Apr 2020
JIS College of Engineering
The core principles of computer programming and networking covered in the B.Tech Computer Science course include algorit...
02 Aug 2019