Start with self-belief

Start with self-belief

Persistence pays Take risks, do not be reckless It’s not about ideas. It’s about making ideas happen They don’t talk, they do They nail every opportunity Hard lessons are learnt only by failure

Hashing

Hashing

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string. For example SHA-2 Hash of above statement will be 696421ad8a148a5e4c4064b9c9191831b6bed4aa484b2ccebe3208184bb30b29 Check Online at xorbin.com Other hashing are MD5 and SHA-1 (previous version of SHA – 2). Importance of Hashing Functions can be judged based upon there use cases 1) BlockChain Powered BitCoin (Digital Currency) core is SHA-2 Hash. 2) Digital Signature for Documents.

Web Beacons or Web Bug : What are they ?

Web Beacons or Web Bug : What are they ?

A web bug/beacons is an object that is embedded in a web page or email and is usually invisible to the user but allows checking that a user has viewed the page or email.[1] Common uses are email tracking and page tagging for Web analytics. Alternative names are web beacon, tracking bug, tag, or page tag. Common names for web bugs implemented through an embedded image include tracking pixel, pixel tag, 1×1 gif, and clear gif.[2] When implemented using JavaScript,…

Read More Read More

Internationalization (i18n) and Localization (l10n)

Internationalization (i18n) and Localization (l10n)

You might have seen these keywords in Project Design Docs. Lets understand their significance. Internationalization (i18n) Internationalization is often written i18n, where 18 is the number of letters between i and n in the English word (I……18 letters……n). Internationalization is the design and development of a product, application or document content that enables easy localization for target audiences that vary in culture, region, or language. Localization (l10n) Localization is sometimes written as l10n, where 10 is the number of letters…

Read More Read More

WeakReference and WeakHashMap in Java

WeakReference and WeakHashMap in Java

Weak Reference : An Object will not be garbage collected if one or more reference exits. This is not true always if the references are Weak Reference then its a valid candidate of Garbage Collection. four types of references in Java i.e. strong reference, soft reference, weak reference and phantom reference. We will discuss about these references later. Lets start with an example to understand Weak Reference. Suppose you have a requirement to store current Active visitors with the entry…

Read More Read More