How to Create Exclusive Custom Taxonomies in WordPress

WordPress, one of the most powerful open source blogging and content management systems, is being used to power a major chunk of the interwebs. Unlike many other CMSes, WordPress is loved by many for its flexibility and customizability. Taxonomies, one of the core features of WordPress, allows you to organize content just the way you Read more about How to Create Exclusive Custom Taxonomies in WordPress[…]

An Introduction to Computability Theory and Complexity

An Introduction to Computability Theory and Complexity

Have you ever wondered: What exactly is the device that you are reading this article on? What is a computer? Computational science dates back to a time long before these modern computing devices were even imagined. In an industry where the more frequently asked questions revolve around programming languages, frameworks, and libraries, we often taken Read more about An Introduction to Computability Theory and Complexity[…]

Android and iOS UI Testing with Calabash

Testing is an essential part of any mobile app development process. Whether you are automating such tests or not, no sane developer considers their work to be done unless they have tested their app. A well-tested app usually goes through multiple steps of testing: Unit testing, integration testing, acceptance testing, and so on. As your Read more about Android and iOS UI Testing with Calabash[…]

Maximum Flow and the Linear Assignment Problem

Here’s a problem: Your business assigns contractors to fulfill contracts. You look through your rosters and decide which contractors are available for a one month engagement and you look through your available contracts to see which of them are for one month long tasks. Given that you know how effectively each contractor can fulfill each Read more about Maximum Flow and the Linear Assignment Problem[…]

What is SRVB Cryptosystem? Find about it all

Introduction Information security is a fascinating field of knowledge that can involve anything from theoretical computer science to software engineering, and even observe the psychology of human error. Cryptography is now one of the many anonymous technological heroes of our daily life. Social networks, web banking, military intelligence, and any other information system that deals Read more about What is SRVB Cryptosystem? Find about it all[…]

The 10 Most Common Mistakes Web Developers Make

The 10 Most Common Mistakes Web Developers Make: A Tutorial for Developers

Since the term the World Wide Web was coined back in 1990, web application development has evolved from serving static HTML pages to completely dynamic, complex business applications. Today we have thousands of digital and printed resources that provide step-by-step instructions about developing all kinds of different web applications. Development environments are “smart” enough to catch and fix many Read more about The 10 Most Common Mistakes Web Developers Make: A Tutorial for Developers[…]

What is Aashaar card

Aadhaar Card is mandatory for Bank Accounts

The central government recently announced that Aadhaar card is mandatory for bank accounts. It shall be mandatory to link Aadhaar numbers to all non-small bank accounts, failing which, access to the bank accounts will be disabled after December 31. This requirement has been brought into the law via Prevention of Money-laundering (Maintenance of Records) (Second Amendment) Read more about Aadhaar Card is mandatory for Bank Accounts[…]

nine bank closing viral fake news in watsapp

Rumor about nine banks to be closed by RBI- Viral News

Hey Guys today I am informing you about “Rumor about nine banks to be closed“. Recently, you must have come across a WatsApp message, which lists nine banks that Reserve Bank of India will apparently shut down. The message ends with a warning for readers to manage their cash immediately. This message creates chaos and Read more about Rumor about nine banks to be closed by RBI- Viral News[…]

Reliance Jio hacked user’s Data Put Publicly online by some Hacker

Reliance Jio Hacked, yes guys your heard it right. 2 days before Private data of customers of Jio was compromised through the hacking attack and users information like name, email, activation date, and AAdhar number was showing up. Company Jio said breach data is “unverified and unsubstantiated claims”, but added that it has informed the Read more about Reliance Jio hacked user’s Data Put Publicly online by some Hacker[…]

Petya Another Ransomware outbreak happens globally after WannaCry

hey, guys today I found one new on the internet and its viral on Twitter Petya Another Ransomware outbreak. Today on Twitter this message is trending “New global ransomware attack” with the hashtags #Ransomware and #Petya. we are trying to recoverRansomWare and again this new attack is happening majorly in Europe. when computer attacked by Read more about Petya Another Ransomware outbreak happens globally after WannaCry[…]