Datacyper

  • Facebook
  • Twitter
  • Google Plus
  • Frontend
    • Java Script
      • Angular
  • Backend
    • Python
      • Flask
    • Java
    • PHP
  • Database
    • MySql
    • Database Management System
  • Deployment
  • Web Services
  • Cyber Security
    • Cryptography
  • Digital Marketing
  • Trending
    • Apache POI

Tag - analysis

  • SDLC

Software Development Life Cycle(SDLC)

28th June 2021
by Shruti Goel
2 min read
1 Comment

A Software Development Life Cycle (SDLC) is essentially a project management model. It defines different stages that are necessary to bring a project from its initial idea or conception all the way to deployment and later...

Continue reading

  • Cryptography
  • Cyber Security
  • Network Security

Hash functions in cryptography

21st June 2021
by Drishti Patel
3 min read
1 Comment

Hash functions in cryptography takes a message of arbitary length and creates a message digest of fix length. Moreover, we have already seen about cryptography, let us know about hash functions. Firstly, a hash function H...

Continue reading

  • Artificial Intelligence
  • Database
  • Technology
  • Trending

Problem characteristics in AI

16th June 2021
by Drishti Patel
2 min read
Add Comment

Problem characteristics in AI refers to finding an optimal way and a good solution to characterize the problem. In addition, problem solving is one of the key concerns in AI. Certainly, we know AI is a vast field and branch of...

Continue reading

  • Data Analytics
  • Technology

What Is Data Analytics (DA) ?

12th June 2021
by Nikita Shingade
3 min read
Add Comment

Data analytics(DA) is the science of analyzing raw data in order to make conclusions about that information. As we know, data analytics(DA) comprises the processes, tools and techniques of data analysis and management, including...

Continue reading

  • Cryptography
  • Cyber Security
  • Security

How secure is RSA Algorithm?algortihm

4th June 2021
by Drishti Patel
3 min read
Add Comment

As we know, RSA algorithm is an asymmetric cryptography method because it uses two different keys for encryption and decryption. Public key is available to all and private key is for individual encryption. It is an acronym...

Continue reading

Copyright © 2025. Created by Digitvilla. Powered by Digitvilla.
  • Frontend
    • Java Script
      • Angular
  • Backend
    • Python
      • Flask
    • Java
    • PHP
  • Database
    • MySql
    • Database Management System
  • Deployment
  • Web Services
  • Cyber Security
    • Cryptography
  • Digital Marketing
  • Trending
    • Apache POI
  • Facebook
  • Twitter
  • Google Plus