Technology Inside Out!

Index ¦ Archives ¦ Atom ¦ RSS > Author: sanyam_khurana

Infrastructure as Code with Terraform

Infrastructure as Code (IaC) is an approach to managing IT infrastructure in which infrastructure resources are managed as code rather than through manual processes. Terraform is a popular open-source tool for implementing IaC. In this article, we'll explore how to use Terraform to manage infrastructure as code and how it …


Terraform and AWS Lambda

AWS Lambda is a serverless computing service that allows you to run your code without provisioning or managing servers. Terraform is a popular tool for infrastructure as code, which allows you to manage your infrastructure as code rather than using manual processes. In this article, we'll explore how to use …


Setting up CI/CD Pipelines with GitHub Actions

Continuous integration (CI) and continuous delivery (CD) are essential practices in modern software development. These practices allow teams to deliver software faster, with fewer bugs, and with more confidence. GitHub Actions is a powerful tool that can help you automate your CI/CD pipelines and integrate them seamlessly into your …


Pros And Cons Of Using JWT (JSON Web Tokens)

JWT (JSON Web tokens) is a great way to implement authentication in your applications, though often it is being treated as a silver bullet for almost every backend project. While JWT provides a lot of benefits while implementing auth, it does come with a price. Anyone who is thinking to …


Django and Machine Learning: Building Intelligent Web Applications

Machine learning and artificial intelligence (AI) are rapidly transforming the way we build and interact with web applications. By leveraging the power of machine learning algorithms, developers can build intelligent applications that can learn from user behavior, adapt to changing environments, and make data-driven decisions in real-time.

Django is a …


Few terms in C++

Howdy Coders!

Well, today we will learn about a few terms related to File Handling in C++.

Stream :- A sequence of bytes

File: A collection of data or information stored on some media with some specific name is called file.

Text File :- The file which stores data or information in …


MD5 Hashing using C#

Its common now a days that all the passwords are being encrypted in order to prevent data theft. So the passwords are being encrypted, the most common and most secure encryption method is MD5 hashing.
MD5 hashing stands for Message Digest algorithm 5. The idea of MD5 algorithm is to …


[CHEAT-SHEET] List of Important IRC Commands

While you start using IRC, it becomes very essential to do certain tasks. To ensure yours tasks are carried out smoothly, you must know the commands which may come handy. So, today we've compiled here a list of IRC Commands that would come handy doing different tasks in IRC.

Changing …


How to Make Bootable Linux Pendrive

Well, you may not realize today, but it is very essential to have a Bootable Linux Pen Drive with you. Many times, your system may crash unexpectedly, or even your DVD ROM faces some problem or you might just want to dual boot Linux with Windows to give it a …


Understanding Complete Boot Process In Linux

Ever wondered, what happens behind the scenes to boot Linux? Knowing about what happens from the time you press the power button to the time when you get the login screen on Linux, i.e. boot process in Linux is very important. It can come very handy when you're debugging …

© The Geeky Way. Built using Pelican. Theme by Giulio Fidente on github.

Disclaimer Privacy policy