Skip to content
Tuesday, August 26, 2025
  • Code stuffs
  • Facebook
  • Twitter
  • Linkedin
  • Youtube
  • Github
  • Instagram

Explore with me!

Come and explore with me

  • Code stuffs
    • Git
    • C#
    • node.js
    • Python
    • Shell
    • VB
  • Blog Series
  • Lets Learn
  • Devops
    • Kubernetes
    • CI/CD
    • Docker
  • Cloud
  • Tweaks
  • Myself
  • Deployed
    • Azure Static Website
You are Here
  • Home
  • Default
  • Page 5

Category: Default

Default

k-means Clustering

February 22, 2014

The k-means algorithm, a straightforward and widely used clustering algorithm. Given a set of objects (records), the goal of clustering or segmentation is to divide

Read More

goal, task, k, tasks, k-means, Thus, means, unsupervised, method, algorithm, Note, algorithms, notion, cluster, procedure, clustering, purposes, data, regression, Given, segmentation
Default

Cloudera and Udacity partner to offer Data Science training courses

November 19, 2013

As per the need of handling of the data, this step seems to be very useful. The world needs more data scientist. And for that

Read More

Default

Blogging via phone app

August 30, 2013

I have been blogging since 8 to 9 months. But I have never thought it would be this easy to blog. After getting my smartphone,

Read More

developers, smartphone, windows, apps, Blog, Blogging
Default

WinSever Community Roundup for the month of July

July 20, 2013

Read More

Default

What Is Digital Marketing?

June 2, 2013

See on Scoop.it – Talks 4 tech It’s a pretty expansive question, but let’s try and sum it up in a single sentence: digital marketing

Read More

Default

What are Spinal Codes?

May 20, 2013

During my research on Software engineering, i found the article about the Spinal codes. We all have heard about the spinal cords in biology. But

Read More

encoding, polynomial, spinal codes, wireless networks, coded, decoding
Default

Online fraud: a major problem with the technological advancement

April 9, 2013

Who among us don’t use internet? I guess none of us. I am also so dumb to ask this question. if internet was not here

Read More

be safe, criminals, digital world, hacker, online frauds, threat
Default

How online translation are changing lives!

April 7, 2013

When it comes to adopt the new technology, there is just one question “Will it change the life?” And when gets the answer it can,

Read More

online translator, bing translator, bridging the digital divide, changing lives, google translator
Default

The Top Jobs for 2013 – Forbes

April 3, 2013

See on Scoop.it – Talks 4 tech Looking for a new career? Here are the top jobs for 2013.   The study used EMSI’s rich

Read More

Default

A ’21st Century’ Education Is SO Last Century

April 2, 2013

See on Scoop.it – Talks 4 tech It’s empty phraseology designed to sound like we are preparing for the future when we are already living

Read More

classroom, learning, technology

Posts pagination

Previous 1 … 4 5 6 … 8 Next

Recent Posts

  • Zero-Trust Architecture with Azure AD: Part 7 – Enterprise Integration & Advanced Scenarios
  • Zero-Trust Architecture with Azure AD: Part 6 – Monitoring, Analytics & Continuous Improvement
  • Zero-Trust Architecture with Azure AD: Part 5 – Device Management & Compliance
  • Zero-Trust Architecture with Azure AD: Part 4 – Advanced Risk Management
  • Zero-Trust Architecture with Azure AD: Part 3 – Conditional Access Policies – Core Implementation

Post Tabbed

  • You may like
  • Recent Posts
  • windows

    BranchCache: WAN Bandwidth Optimization

    December 30, 2012
  • Software Engineering

    Stakeholders, The Players of an Information System

    May 1, 2021May 19, 2023
  • Default

    Shutdown button in windows 8

    December 30, 2012
  • Software Engineering

    Ethical Issues related to Information Technology Professionals

    January 24, 2013April 17, 2021
  • Azure Zero Trust Enterprise Integration Advanced Scenarios Privileged Access

    Zero-Trust Architecture with Azure AD: Part 7 – Enterprise Integration & Advanced Scenarios

    August 23, 2025August 23, 2025
  • Azure Analytics Monitoring Zero Trust Security Operations

    Zero-Trust Architecture with Azure AD: Part 6 – Monitoring, Analytics & Continuous Improvement

    August 23, 2025August 23, 2025
  • Azure Compliance Zero Trust Device Management Intune Endpoint Security

    Zero-Trust Architecture with Azure AD: Part 5 – Device Management & Compliance

    August 23, 2025August 23, 2025
  • Identity Protection Azure Cybersecurity Zero Trust Risk Management

    Zero-Trust Architecture with Azure AD: Part 4 – Advanced Risk Management

    August 23, 2025August 23, 2025

Find Me

Software Engineer | Devops | AI Enthusiasts | IOT Enthusiasts | Love doing Research | Trainer | Learner | Friend | Son | Husband | Brother | Father of a beautiful Angel

  • facebook
  • twitter
  • linkedin
  • instagram

Featured Posts

kubernetes
Default Devops Kubernetes

Kubernetes : an Orchestration and Management Infrastructure for Containers

June 29, 2021May 14, 2023
Introduction to Kubernetes Docker was responsible for introducing developers to the concept of container-based applications.
  • kubernetes
    Devops Kubernetes

    Understanding Kubernetes architecture in depth

    June 14, 2021May 14, 2023
  • kubernetes
    Default Kubernetes

    Understanding Pods in Kubernetes

    June 10, 2021May 14, 2023

You May Have Missed

c#
Default Code stuffs Tweaks C#

Runtime Compile C# Code

July 24, 2021July 5, 2022
c#
Tweaks C# Code stuffs

Lets Create a Null Checking Extension on C#

June 26, 2021May 14, 2023
c#
Tweaks C#

How to encrypt and decrypt using cryptography (AES)?

June 14, 2021July 8, 2022
Default Tweaks

How to auto-generate unique-identifier column in Sql?

May 25, 2021May 14, 2023
All Rights Reserved 2024.
Proudly powered by WordPress | Theme: Refined Magazine Pro by Candid Themes.