As the number of cyber security attacks are growing exponentially, In 2020, approximately 75% of enterprises around the world will have experienced a phishing attack. In this blog, we will cover what do you mean by a phishing attack, the most commonly used phishing techniques, the life cycle of a phishing technique, and ways to prevent a phishing technique.Read More Things to know about Phishing attacks
With the continuing growth of micro services and the cloud best practice of designing decoupled systems, it’s imperative that developers have the ability to utilize a service, or system for better scalability and availability. Event-driven architecture focuses on function as a service, giving the developers more availability, elasticity, scalability, and cost optimization. This blog covers what do you mean by serverless architecture, when to use it, and various AWS serverless services such as API Gateway, Lambda, SQS, SNS, and SES.Read More Things to know about Event-Driven Architecture
This blog focuses on how operating system memory manages processes and Memory. Along with Memory allocation with fragmentation(Paging and segmentation). And, a little introduction to virtual memory in operating systems.Read More How does OS manage memory and virtual memory?
This blog focuses on operating system evolution and structures, process management with process scheduling algorithms, and process synchronization with semaphores and monitors.Read More Information to know about Operating System
In this blog, we will focus on fault tolerance in distributed systems, two phase commit protocol and Voting Protocol. Also focus on recovery in distributed systems, backward and forward error recovery, database modification with state based approach and Checkpoint algorithm. Also a little information on Distributed database.Read More Fault Tolerance and Recovery in Distributed systems
In this blog, we will focus on how to prevent a deadlock, how to detect a deadlock, centralized, decentralized and hierarchical resolution algorithms for deadlock.Read More How to detect a Deadlock and resolve it in Distributed Systems?