Anjana SinAnalytics VidhyaModern AuthenticationDecades before we had a way to authenticate the users in order to access the data that is present on the website. How it was done there …8 min read·Dec 3, 2023----
Anjana SCyber Kill ChainCyber Kill Chain talks about gathering possible vulnerabilities in the infrastructure, a device, or a network and attacking those…2 min read·Aug 31, 2022----
Anjana SHyper AutomationIn simple terms hyper automation is the extension of traditional legacy business process automation by combining the efforts of…3 min read·Jul 14, 2022----
Anjana SOpen Source IntelligenceOpen Source Intelligence (OSINT) is intelligence collected from publicly available resources. To take a real-life scenario let’s take that…6 min read·Jul 6, 2022----
Anjana SGuessing Game in UipathThe Problem :- In this Game , the computer will have one random number in the memory and the user gets 5 chances to guess it . If the…3 min read·Jan 30, 2022----
Anjana SRE Framework in UipathIt is also called as Robotic Enterprise Framework which is based on state machines. State machines are ones that uses finite number of…2 min read·Jan 22, 2022----
Anjana SinAnalytics VidhyaAssociation Rule Mining Including Apriori AlgorithmSupermarkets have large number of customers checking into the shops and as Shop Owners they need to decide what products could be at which…5 min read·Jan 2, 2022----
Anjana SChallenges Faced by BusinessesUnderstanding the reality of business2 min read·Nov 9, 2021----