What is an enumeration attack?A User Enumeration attack occurs when an attacker obtains the user name for a website by brute-forcing or social engineering, and then…Mar 15, 2022Mar 15, 2022
Introduction to Azure HPCMost modern technologies such as artificial intelligence, machine learning, and deep learning consume mountains of data every day to…Mar 15, 20221Mar 15, 20221
Introduction to KeptnThe Keptn project began as a way to assist enterprises in adopting cloud-native strategies for either cutting-edge microservice…Mar 8, 2022Mar 8, 2022
What is Social Engineering?Cyber attackers are getting more and more sophisticated with each passing day; so are cyber attacks. The advancements of technology have…Mar 8, 2022Mar 8, 2022
What is performance counter in .NET?The Performance Counter is a Windows feature that allows you to record and publish system and application performance metrics.Mar 8, 20221Mar 8, 20221
Introduction to Azure BoardsIn the world of software development and infrastructure management, keeping track of your path is not easy. Managing software projects end…Mar 7, 2022Mar 7, 2022
Introduction to MongoDBToday’s demand for robust and highly scalable applications has led to some difficulties that cannot be solved by the typical SQL databases…Mar 7, 2022Mar 7, 2022
Reasons why your ASP.NET server could be slow and how to improve its performanceServer performance issues might arise at any time and due to multiple reasons — memory problems, delayed database requests, shortage of…Mar 7, 2022Mar 7, 2022
Introduction to ReSharperAre you a Visual Studio user looking for the following -Mar 7, 2022Mar 7, 2022
.NET Core vs .NET Standard vs .NET FrameworkMicrosoft’s .Net platform provides a comprehensive environment for developers to create applications. Whether you’re creating an app for…Mar 7, 2022Mar 7, 2022