KanishdankaniWEB APPLICATION PROGRAMMING INTERFACEwe are going to know about web API.Oct 25, 2020Oct 25, 2020
KanishdankaniAzure Cloud Platformsample environment in the Azure cloud platform based on the shared cloud architecture — SE/2015/015Aug 16, 2020Aug 16, 2020
KanishdankaniExternal data representation and marshalingExternal Data RepresentationJul 30, 2020Jul 30, 2020
KanishdankaniSecure digest functionsA message digest (or hash) function is a cryptographic primitive used for digital signatures and password protection. It maps a message of…Jul 29, 2020Jul 29, 2020
KanishdankaniPublic key Algorithms in Cryptography.Asymmetric algorithms are also called public-key algorithms. Public-key algorithms are asymmetric algorithms based on the use of two…Jul 29, 2020Jul 29, 2020
KanishdankaniRemote Method invocationIn the above example, class1 on the client to call class2. method() from the server. Using RMI, the client obtains an instance of…Jul 18, 2020Jul 18, 2020
KanishdankaniRemote procedure control(RPC)RPC is an inter-process communication architecture to make easy communication between two computers. in this article, we will learn about…Jul 18, 2020Jul 18, 2020
KanishdankaniApache sparkApache Spark is a fast and general-purpose cluster computing system. It provides high-level APIs in Java, Scala, Python and R, and an…May 20, 2020May 20, 2020