IDE’s

Top IDEs for C or C++ Developers in 2020 & Beyond!

8
Heya! A warm welcome to all the programmers and readers. Before we go ahead and read the below article, I'm sure the first computer language...
Python Tutorial – Part (2)

Getting more familiar with Python Programming

Let's start from the point at which we stopped the last time. In Python Tutorial Part1, we have written a very simple program, that...
Kids coding games

Top 15 Coding Games For Kids to Learn Programming

As technology is now dominating our world and everything is getting digitized, learning computer skills can be said to be the basic need of...
Python Tutorial – Advanced Topics_5

Learn Object Oriented Programming in Python – Composition

5
The Concept When you hear the word "composition", what will be the first thing to come into your mind? - Actually, complexity!! Great, you are right!! The...
Visual Studio Code

Visual Studio Code Is So Popular But Why?

Good text editors are important for the majority of the programmers for making them faster and efficient. Many confuse text editors with an IDE,...
File Encryption Decryption

File Encryption And Decryption Using Python

3
Encryption is considered one component of a successful security strategy. Successful encryption completely depends on robust passwords and passphrases called “keys”. Why Encryption is important? For...
Developing Secure Applications Part 2 OpenID Connect

Developing Secure Applications Part 2 OpenID Connect

Introduction This article is part 2 of a four part series where we look at the issues around developing secure applications. In Part 1 we...
Python Tutorial – Advanced Topics

Learn Operating System Interaction in Python

0
As nobody can live alone and isolated from others, the interaction with the surrounding environment is a necessity. This holds true both in real...
Version Control Systems

Learn The Three Different Types Of Version Control Systems

Version Control System: Version Control Systems are process management systems which maintain changes recorded in a file or set of files over period of time....
Developing Secure Applications Part 1 Secure Socket Layer (SSL)

Developing Secure Applications Part 1 Secure Socket Layer (SSL)

Introduction This article is part 1 of a four part series where we look at the issues around developing secure applications. Thousands of hackers work...
- Advertisement -

Artificial Intelligence

AI API Keras

Functional API of Keras

0
The Why and The How In our previous blogs in the Keras series, we have explored Deep Neural Networks, Convolutional Neural Networks and Recurrent Neural...
featured

Recurrent Neural Networks and LSTMs with Keras

0
Wherever you are as you read this blog, I want you to take a moment and think back to how you went about your...
Convolutional Neural Networks

Convolutional Neural Networks with Keras

0
In the previous post, we scratched at the basics of Deep Learning where we discussed Deep Neural Networks with Keras. As a code along...

Become An Insider!

Discover Latest News, Tech Updates & Exciting offers!
JOIN NOW
close-link