Xiaomi Quick Charge 3.0 charger launched in India

Xiaomi finally launched its quick charger in India at Rs. 449.

Xiaomi already sells its standard 5V-2A charger in India, but the new charger comes with up to 12V and 3A output. Moreover, with Qualcomm’s Quick Charge support it will offer fast charging to the Xiaomi smartphones especially to Mi Mix 2, Mi Max 2 in India.

“We are delighted to announce that Qualcomm certified Quick Charge 3.0 charger will be now available on mi.com. This new charger can withstand voltage surges up to 380V and is compatible with Mi MIX 2, Mi Max 2, and Mi 5. Now forget about long waiting […]

Read more »

Why is SSD more expensive than HDD?

Ever since solid-state drives (SSDs) came out, the hype around them has been overwhelming. Media outlets were talking about how much faster they are than hard disk drives (HDDs) due to the lack of moving parts. In a way, they are not wrong. However, since SSDs went into the market, people have been asking themselves whether they are worth their hefty price tags. More so, people have also been asking why these drives are 5-10 times more expensive than HDDs, to begin with. There are multiple reasons for this, and I will explain why Are solid-state drives so expensive below.

Read more »

What is the safest way of rooting an Android phone?

The steps necessary to root an Android phone vary widely, from “one-click” methods to “impossible”. It depends on the exact model of your phone and version of Android you are currently on (or desire).

Further complicating matters are the carriers. For example, the methods for rooting phone X on AT&T, Verizon, Sprint or T-Mobile (or any “foreign” carriers for that matter) are often NOT the same. The same can be said of your current baseband/radio versions.

So at a bare minimum rooting an Android phone requires extreme attention to detail to make sure you meet ALL the requirements and not brick your […]

Read more »

What is penetration testing

Penetration testing allows the business to understand if the mitigation strategies employed are actually working as expected; it essentially takes the guesswork out of the equation. The penetration tester will be expected to emulate the actions that an attacker would attempt and will be challenged with proving that they were able to compromise the critical systems targeted. The most successful penetration tests result in the penetration tester being able to prove without a doubt that the vulnerabilities that are found will lead to a significant loss of revenue unless properly addressed. Think of the impact that you would have if […]

Read more »

Difference between JavaScript and Java

Although JavaScript’s name appears to connote a close relationship with Java, JavaScript and Java are actually very different. One important difference is support for object-oriented programming. Although JavaScript is sometimes said to be an object-oriented language, its object model is quite different from that of Java and C++.

In fact, JavaScript does not support the object-oriented software development paradigm. Java is a strongly typed language. Types are all known at compile time, and operand types are checked for compatibility. Variables in JavaScript need not be declared and are dynamically typed, making compile-time type checking impossible. One more important difference between Java […]

Read more »

Ruby Programming Language

Why Ruby?

Ruby is a programming language, created 20 years ago by Yukihiro “Matz” Matsumoto. By most measures of programming language popularity. Ruby ranks among the top ten, though usually as tenth (or so) in popularity, and largely due to the popularity of Rails. Like Java or the C language, Ruby is a general-purpose programming language, though it Is best known for its use in web programming.

In a podcast from This Developer’s Life and in an interview from 2005 David Heinemeier Hansson, the creator of Rails describes building an online project management application named BaseCamp in 2004. He had been using […]

Read more »

Intrusion Detection System (IDS) – in Hindi

Intrusion Detection System (आईडीएस) कंप्यूटर सिस्टम और नेटवर्क में अनधिकृत घुसपैठ का पता लगाने के लिए एक प्रणाली है। एक प्रौद्योगिकी (technology) के रूप में Intrusion का पता लगाने के लिए IDS system नया नहीं है, इसका उपयोग पीढ़ियों के लिए बहुमूल्य संसाधनों का बचाव करने के लिए किया गया है। राजाओं, सम्राटों और राजवंशों ने धन अर्जित किया था, बल्कि इसे एक दिलचस्प तरीके से प्रयोग किया था। उन्होंने पहाड़ियों के शीर्ष पर महल और महलों का निर्माण किया और अवलोकन टावरों के साथ तीक्ष्ण चट्टानों को उनके नीचे भूमि की एक स्पष्ट अवलोकन प्रदान करने के लिए बनाया, […]

Read more »

Intrusion Detection System (IDS)

An intrusion detection system (IDS) is a system used to detect unauthorized intrusions into computer systems and networks. Intrusion detection as a technology is not new, it has been used for generations to defend valuable resources. Kings, emperors, and nobles who had wealth used it in rather an interesting way. They built castles and palaces on tops of mountains and sharp cliffs with observation towers to provide them with a clear overview of the lands below where they could detect any attempted intrusion ahead of time and defend themselves.

Empires and kingdoms grew and collapsed based on how well intrusions from […]

Read more »

System Development Life Cycle (SDLC) Phases

1.1. DEFINITION

Software development life cycle (SDLC) is the step by step unambiguous processes and tasks performed in developing software. It can also be defined as a representation of the major components of software development works and their interrelationships in a framework that can be easily understood and communicated. It consists of a detailed plan describing how to develop, maintain, replace, edit, debug and alter specified software (Beydeda, Book & Gruhn, 2005)

1.2. SDLC MODELS

There are diverse types of software development life cycle models which are defined, design and inculcate during software development processes. Each process model is unique in styles and […]

Read more »

Take the Android Taste Test to easily customize your phone

Die-hard Android fans don’t hesitate to tout the ability to completely customize your Android phone’s overall look as a benefit over Apple‘s iOS.

But how do you know where to start? Android can be downright confusing. There are launchers, icon packs, wallpapers, widgets and so much more you can tinker with.

Google wants to take the guesswork out of the process and thus has created the #myAndroid Taste Test website.

Visit the site, either from your phone or on a computer. You’re tasked with answering 22 questions without debating, but just reacting. Questions range from whether or not you like strong, vivid colors […]

Read more »

Asus ZenFone Zoom S Review

Fitting smartphones with two camera sensors around back seem to be the go-to strategy for pretty much every smartphone manufacturer today. Adding oodles of RAM and CPU cores just doesn’t seem attention-grabbing enough anymore. Either that or people are now wise enough to know that numbers are not really everything. However, having a companion sensor to the primary one can have tangible benefits, whether it might be for zooming into your subject, gauging depth, getting a wider shot, or just improving the quality of your photo.

The first ZenFone Zoom (Review) from Asus was quite an achievement as it managed to […]

Read more »

Holo for Android and iOS Is a Fun Augmented Reality Camera App

Nearly four years ago, the bundled camera app on the Sony’s flagship smartphone of the year included an interesting feature: an Augmented Reality mode that allowed you to add virtual objects to your photos, such as a T-Rex walking around in the palm of your hand. It was an impressive display of processing power back then, and cut to 2017, processing power of phones has grown to the point that entry level phones with the right apps can get the job done every bit as easily.

There are actually a number of Augmented Reality Camera apps, but these are often buggy […]

Read more »