KanishdankaniWEB APPLICATION PROGRAMMING INTERFACEwe are going to know about web API.3 min read·Oct 25, 2020----
KanishdankaniAzure Cloud Platformsample environment in the Azure cloud platform based on the shared cloud architecture — SE/2015/0153 min read·Aug 16, 2020----
KanishdankaniExternal data representation and marshalingExternal Data Representation4 min read·Jul 30, 2020----
KanishdankaniSecure digest functionsA message digest (or hash) function is a cryptographic primitive used for digital signatures and password protection. It maps a message of…2 min read·Jul 29, 2020----
KanishdankaniPublic key Algorithms in Cryptography.Asymmetric algorithms are also called public-key algorithms. Public-key algorithms are asymmetric algorithms based on the use of two…4 min read·Jul 29, 2020----
KanishdankaniRemote Method invocationIn the above example, class1 on the client to call class2. method() from the server. Using RMI, the client obtains an instance of…2 min read·Jul 18, 2020----
KanishdankaniRemote procedure control(RPC)RPC is an inter-process communication architecture to make easy communication between two computers. in this article, we will learn about…1 min read·Jul 18, 2020----
KanishdankaniApache sparkApache Spark is a fast and general-purpose cluster computing system. It provides high-level APIs in Java, Scala, Python and R, and an…2 min read·May 20, 2020----