Randhir RayinComputer SecurityConfidentiality with EncryptionWe already discussed a bit about encryption in our previous article. So atleast many of us now know about cipher texts. No worries even if…Nov 16, 2019Nov 16, 2019
Randhir RayCreate a Map from Java 8 stream with multiple different key value pairsHey Guys !! It’s been long Java 8 is out and hence most of us know how to create an instance of Map from the underlying stream. Let’s take…Nov 15, 2019Nov 15, 2019
Randhir RayinComputer SecurityEncryption, Hashing and EncodingIn my school days I always somehow believed that Encryption and Encoding are just synonyms of one another. With time I realised how…Nov 9, 2019Nov 9, 2019
Randhir RayHTTP Proxy in JavaHi guys, we all know what proxy is , isn’t it?? If you don’t have any idea what I am talking about then all you need to do is GOOGLE it…May 22, 2018May 22, 2018
Randhir RaySerialization and Deserialization in Java — Part 1Often we think we know a topic very well unless and until we dig deeper into it. It is at this particular point of time when due to some…Mar 28, 20182Mar 28, 20182
Randhir RayIsland of IsolationHere I am, again with some garbage collection concepts. Please take a look at my previous article “garbage collection” which might help you…Mar 16, 2018Mar 16, 2018
Randhir RayGarbage CollectionWhen an object(say A) holds the reference to another object (say B)Mar 2, 2018Mar 2, 2018
Randhir RayMax Sum contiguous subarrayHello there!! I am not here to teach anything, perhaps we are here to discuss something where we would interact with each other, isn’t it??Oct 17, 2017Oct 17, 2017