Common Alerting Protocol


Common Alerting Protocol was created by the emergency management community and is available free-of-charge to both public and private sectors. It is an XML-based data format for exchanging public warnings and emergencies between alerting technologies. It increases warning effectiveness and simpli.....

Read More »

Software Analytics


Software Analytics is an area of explosive growth, which gathering billions and billions of metrics from live production software, including user clickstreams, mobile activity, end user experiences and transactions, and then making sense of those—providing with business insights. It’s met.....

Read More »

Spectral Clustering


This article talks about Spectral Clustering, which is a techniques to make use of the spectrum (eigenvalues) of the similarity matrix of the data to perform dimensionality reduction before clustering in fewer dimensions. The goal of spectral clustering is to cluster data that is connected but no.....

Read More »

Data Stream Clustering


Data Stream Clustering analyzes the advantages as well as limitations of data stream algorithms and suggests potential areas for future research. It faces many challenges and have to satisfy constraints such as bounded memory, single-pass, real-time response, and concept-drift detection. It is us.....

Read More »

Literate Programming


Literate Programming can be regarded as an essayist, whose main concern is with exposition and excellence of style. Literate programming paradigm, the central activity of programming becomes that of conveying meaning to other intelligent beings rather than merely convincing the computer to behave.....

Read More »

Template Processor


This article talks about Template Processor, which is also known as a template engine or template parser. It is typically include features common to most high-level programming languages, with an emphasis on features for processing plain text. It is used in various contexts for different purposes.....

Read More »

Self Modifying Code


This article talks about Self Modifying Code, which is a piece of software which achieves its goal by rewriting itself as it goes along. It is executing – usually to reduce the instruction path length and improve performance or simply to reduce otherwise repetitively similar code, thus simp.....

Read More »

Port Scanner


Port Scanner is the name for the technique used to identify open ports and services available on a network host. It is a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port; this is not a nefarious process in and of […]<.....

Read More »

Ping of Death


This article describe about Ping of Death, which is a type of network attack in which an attacker sends a network packet that is larger than what the target computer can handle. It is a method of using the ping command to freeze or reboot the computer by sending a packet greater than 65536 bytes......

Read More »



End-of-File is a code placed by a computer after a file’s last byte of data. It is either determined when the reader returns null as seen in Java’s BufferedReader, or sometimes people will manually insert an EOF character of their choosing to signal when the file has ended. EOF marks .....

Read More »

Buffer Overflow


Buffer Overflow is probably the best known form of software security vulnerability. It occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. It can be triggered by inputs that are designed to execute code, or alter the wa.....

Read More »

Static Program Analysis


This article talks about Static Program Analysis, which is the art of reasoning about the behavior of computer programs without actually running them. In most cases the analysis is performed on some version of the source code, and in the other cases, some form of the object code. In contrast, it .....

Read More »