NuCypher – Proxy re-encryption
Thought Process Imagine a scenario, where you have a file say for example of 120KB, and you want to securely store in the cloud…
Thought Process Imagine a scenario, where you have a file say for example of 120KB, and you want to securely store in the cloud…
When working with large or complex applications with a lot of asynchronous activity and where there’s a lot of state that is being shared and manipulated between multiple components…
1. Kong API Gateway: Kong is a scalable, open source API Gateway. Kong runs in front of any RESTful API and is extended through Plugins, which…
The first-generation blockchain, Bitcoin led the way in the creation of numerous alternative currency platforms as the first generation of blockchain technology. In late…
Hello There!! When designing an application one of the pivotal area of interest is how to authenticate and authorize the users who are logging…
NITI Aayog, in collaboration with Nucleus Vision and the State Governments of Goa and Telengana, has hosted International Blockchain Congress in Hyderabad. As you…
Identification of HTML elements is the main task when it comes to E2E testing of web applications. Though the existing way of using…
MNIST is a dataset which contains the images of handwritten digits from 0–9. It contains two sets of images, one set of images are…
Let us begin with the basic understanding of CSS Grid and Flexbox CSS Grid: CSS Grid layout allows us to align the elements in…
We all may know what is deployment of a service or a web application. In nutshell, it is the process of delivering a software…