In this article, we will look at one of the most common (and simplest too) design patterns: Factory method design pattern.
All of us have wondered at some point of time "why we sleep". This book tries to answer some of the questions we have about the sleep and what is it doing for us.
A pragmatic programmer is the one who deal with situations sensibly and realistically. And this book is to help you to learn the pragmatic programming from the years of experience of the authors in software development.
When dealing with encryption, there is a negligible probability that an attacker will be able to try out all the possible keys used to encrypt the message. Can we make an encryption scheme which will be secure even if attacker has infinite power?
There can be requirements when we need variables to maintain data for the system (like some global parameters) or need to call methods from the class without creating a new instance of the class every time. One solution to these situations will be to use static fields and methods. But with static, you can not inherit the methods or variables from another class or interface. Because of this, you...
Bill is promoted to the VP of the IT operations and is given the resposibility to lead The Pheonix Project which will decide the future of the Parts Unlimited. This is a novel about the importance of IT operations in the organization and how the protagonist learns the new ways to work efficiently.
One of the most important skills for a software developer is to be able to create software that is scalable, extendable, and modular. This post is an introduction to the series on software design patterns and in this article, we will talk about what design patterns are, why should we learn and apply them in our software projects.
Do you always feel overwhelmed by the work you are getting? Or that you never seem to have enough time to do everything you want to do? In this book, the author is trying to explain how most of us undervalue our time when we have to choose between time and money. And also, how we can get the best out of the same 24 hours available to all of us.
Almost all the programming languages have a library function for generating a Universally Unique Identifier (UUID). These libraries are responsible for generating an identifier that is unique in the whole universe. How do these libraries go around the complete universe and generate a unique identifier in just a few milliseconds?
Cryptography-I is offered by Professor Dan Boneh from Stanford University on the Coursera platform. The course is about the theory and practice of modern cryptography and provides an in-depth view of the field.