<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Asir Reshmi on Medium]]></title>
        <description><![CDATA[Stories by Asir Reshmi on Medium]]></description>
        <link>https://medium.com/@asirreshmi0103?source=rss-145d7a6ce7e6------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/0*gxE5eHIbj3eUfEVp</url>
            <title>Stories by Asir Reshmi on Medium</title>
            <link>https://medium.com/@asirreshmi0103?source=rss-145d7a6ce7e6------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Mon, 18 May 2026 11:46:19 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@asirreshmi0103/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Amazon Relational Database Service (RDS)]]></title>
            <link>https://medium.com/@asirreshmi0103/amazon-relational-database-service-rds-c332d35ce0b3?source=rss-145d7a6ce7e6------2</link>
            <guid isPermaLink="false">https://medium.com/p/c332d35ce0b3</guid>
            <dc:creator><![CDATA[Asir Reshmi]]></dc:creator>
            <pubDate>Wed, 06 Mar 2024 15:15:17 GMT</pubDate>
            <atom:updated>2024-03-07T05:00:33.501Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/286/1*SWSg1B-l0L5xqkQKTldZgA.png" /></figure><p>Amazon Relational Database Service (RDS) is a managed relational database service provided by Amazon Web Services (AWS). It simplifies the process of setting up, operating, and scaling relational databases in the cloud. RDS supports various popular database engines such as MySQL, PostgreSQL, Oracle, SQL Server, and Amazon Aurora.</p><p>Key features of Amazon RDS include:</p><ol><li><strong>Automated Backups</strong>: RDS automatically takes backups of your database, enabling point-in-time recovery.</li><li><strong>High Availability</strong>: RDS provides options for high availability configurations, including multi-AZ deployments, which replicate your database across multiple availability zones to ensure redundancy and fault tolerance.</li><li><strong>Scalability</strong>: You can easily scale your database instance vertically by changing the instance class or horizontally by adding read replicas to handle increased workload and traffic.</li><li><strong>Managed Maintenance</strong>: AWS handles routine database maintenance tasks such as software patching, hardware provisioning, and backups, reducing the administrative burden on users.</li><li><strong>Security</strong>: RDS offers various security features, including network isolation using Amazon VPC, encryption at rest using AWS Key Management Service (KMS), and integration with AWS Identity and Access Management (IAM) for user authentication and authorization.</li><li><strong>Monitoring and Metrics</strong>: RDS provides built-in monitoring and performance metrics through Amazon CloudWatch, allowing you to monitor database performance and set up alarms for specific metrics.</li><li><strong>Compatibility</strong>: RDS supports multiple database engines, making it easy for users to migrate existing databases to the cloud or choose the engine that best fits their requirements.</li></ol><p>Benefits of using Amazon RDS:</p><p><strong>Managed Service</strong>: AWS handles routine database management tasks such as provisioning, patching, backup, recovery, scaling, and monitoring, freeing users from the administrative burdens of database maintenance.</p><p><strong>Ease of Use</strong>: Setting up a relational database instance with Amazon RDS is straightforward using the AWS Management Console, CLI, or SDKs. It eliminates the need for manual installation and configuration of database software.</p><p><strong>High Availability and Reliability</strong>: Amazon RDS offers built-in high availability with automated backups, automated failover, and Multi-AZ deployments for mission-critical applications. It ensures that databases are continuously available with minimal downtime.</p><p><strong>Scalability</strong>:RDS allows users to easily scale compute and storage resources vertically or horizontally This enables applications to handle growing workloads and traffic demands without significant downtime.</p><p><strong>Security</strong>: Amazon RDS provides various security features such as encryption at rest and in transit, network isolation using Virtual Private Cloud (VPC), security groups, and IAM integration. It helps in securing sensitive data and complying with regulatory requirements.</p><p>How it works:</p><ol><li><strong>Provisioning</strong>: Users start by provisioning an RDS instance through the AWS Management Console, CLI, or SDKs. During provisioning, users specify parameters such as the database engine (MySQL, PostgreSQL, Oracle, SQL Server, or Amazon Aurora), instance class (CPU, memory, and storage capacity), storage type (SSD or Magnetic), and other configuration settings.</li><li><strong>Deployment</strong>: Once provisioned, RDS automatically sets up and configures the underlying infrastructure required for the selected database engine. This includes launching virtual machines (EC2 instances) with the specified resources, installing the chosen database engine software, and setting up networking and security configurations.</li><li><strong>Access Control</strong>: RDS provides mechanisms for controlling access to the database instance. Users can define security groups to specify which IP addresses or EC2 instances are allowed to connect to the database, and IAM roles to manage database access for AWS services and users.</li><li><strong>Database Management</strong>: After the RDS instance is deployed and accessible, users can interact with it using standard database management tools and libraries. This includes creating databases, tables, indexes, and managing users and permissions.</li><li><strong>Automated Backups</strong>: RDS automatically takes regular backups of the database instance according to the configured backup retention period. These backups can be used for point-in-time recovery, restoring to a specific snapshot, or creating new database instances.</li><li><strong>High Availability</strong>: RDS provides options for achieving high availability and fault tolerance. Multi-AZ deployments automatically replicate data synchronously across multiple Availability Zones to ensure automatic failover in case of hardware or Availability Zone failures.</li><li><strong>Scaling</strong>: RDS allows users to scale their database instances vertically or horizontally. Vertical scaling involves upgrading or downgrading the instance class to increase or decrease CPU, memory, and storage capacity. Horizontal scaling involves adding read replicas to offload read-heavy workloads and improve performance.</li><li><strong>Monitoring and Performance Optimization</strong>: RDS offers built-in monitoring capabilities through Amazon CloudWatch, providing metrics such as CPU utilization, disk I/O, and database connections. Users can set up alarms to receive notifications for performance anomalies and optimize database performance using tools like Performance Insights.</li><li><strong>Security and Compliance</strong>: RDS implements various security features to protect data at rest and in transit. This includes encryption of data using AWS Key Management Service (KMS), network isolation using Virtual Private Cloud (VPC), and compliance with industry standards and regulations.</li><li><strong>Cost Management</strong>: RDS offers flexible pricing models that allow users to pay only for the resources they consume. Users can choose between On-Demand Instances, Reserved Instances, and Savings Plans to optimize costs based on their usage patterns and budget requirements.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*8pWeXrgfkaF_oKqhMjo0Fg.png" /></figure><p>Use cases for Amazon RDS:</p><ol><li><strong>Web Applications</strong>: RDS is frequently used to power the backend of web applications, including e-commerce platforms, content management systems, social media platforms, and other web-based services. Its scalability, reliability, and managed features make it an ideal choice for storing and managing relational data for web applications.</li><li><strong>Software as a Service (SaaS) Platforms</strong>: Many SaaS companies leverage RDS to manage multi-tenant databases efficiently. RDS allows SaaS providers to isolate customer data securely, provide high availability, and scale their databases as their user base grows.</li><li><strong>Enterprise Applications</strong>: RDS is suitable for running mission-critical enterprise applications such as Customer Relationship Management (CRM), Enterprise Resource Planning (ERP), and Human Resource Management (HRM) systems. Its managed features help enterprises focus on their core business functions while AWS handles database management tasks.</li><li><strong>Mobile Applications</strong>: Mobile app developers often use RDS as the backend database for mobile applications, handling user authentication, data synchronization, and offline data storage. RDS’s compatibility with mobile development frameworks and its managed features simplify database management for mobile app developers.</li><li><strong>Financial Services</strong>: Banks, insurance companies, and financial institutions use RDS to store and manage financial transactions, customer accounts, credit card data, and regulatory reporting data. RDS’s security features, audit logging, and compliance certifications make it suitable for handling sensitive financial data.</li></ol><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c332d35ce0b3" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[MongoDB vs. Mongoose]]></title>
            <link>https://medium.com/@asirreshmi0103/mongodb-vs-mongoose-d5b4096dcefa?source=rss-145d7a6ce7e6------2</link>
            <guid isPermaLink="false">https://medium.com/p/d5b4096dcefa</guid>
            <dc:creator><![CDATA[Asir Reshmi]]></dc:creator>
            <pubDate>Sun, 03 Mar 2024 05:42:00 GMT</pubDate>
            <atom:updated>2024-03-03T05:42:00.497Z</atom:updated>
            <content:encoded><![CDATA[<h3>What is MongoDB?</h3><p>MongoDB, an open-source NoSQL database system, has garnered substantial traction among developers for its flexibility and scalability. It belongs to the category of document-oriented relational databases, designed to store, manage, and retrieve vast amounts of unstructured or semi-structured data with ease. MongoDB’s primary advantage lies in its use of BSON (Binary JSON), a binary representation of JSON-like documents, making it a natural fit for projects dealing with complex data structures or frequently evolving schemas. With MongoDB, developers can store data without having to define a fixed schema beforehand, enabling agile development as applications can adapt and evolve over time. The ability to store data in JSON-like documents, along with support for rich queries and indexing, makes MongoDB a popular choice for applications dealing with real-time data and big data analytics. Additionally, MongoDB’s architecture is designed for horizontal scaling, with built-in sharding capabilities that distribute data across multiple nodes based on predefined sharding keys, making it suitable for high-performance applications requiring data distribution across multiple servers or clusters.</p><h3>Key Features of MongoDB</h3><p>MongoDB boasts several key features that set it apart in the realm of database systems. Its flexible document model allows for data storage in JSON-like documents, eliminating the need for rigid schema definitions and simplifying development processes. With MongoDB, developers can dynamically modify document structures, enabling applications to handle data with varying attributes without undergoing extensive schema migrations.</p><p>Scalability is another highlight of MongoDB, as it natively supports horizontal scaling, facilitating the seamless distribution of data across multiple servers or clusters. Additionally, MongoDB offers a robust aggregation framework, empowering developers to execute advanced data processing, transformation, and analysis operations efficiently.</p><p>The database’s support for geospatial indexes and queries further enhances its versatility, making MongoDB an attractive choice for location-based applications. Moreover, MongoDB features built-in replication functionality, ensuring data availability and reliability through automatic replication with customizable redundancy levels.</p><p>In summary, MongoDB’s combination of a flexible document model, dynamic schema, scalability, powerful aggregation framework, geospatial capabilities, and built-in replication makes it a comprehensive solution for modern application development and data management needs.</p><h3>What is Mongoose?</h3><p>Mongoose is an elegant Object Data Modeling (ODM) library designed specifically for MongoDB and JavaScript, serving as a vital component within the Node.js ecosystem. Acting as a liaison between applications and MongoDB databases, Mongoose facilitates structured data management by offering a schema-based approach. Unlike MongoDB’s schema-less nature, Mongoose encourages developers to define schemas outlining data types, default values, validation rules, and other constraints, ensuring data consistency and reducing the risk of anomalies. Beyond data modeling, Mongoose introduces powerful features like middleware and hooks, enabling developers to execute custom business logic before or after specific database operations. With its intuitive API and additional layers of abstraction, Mongoose simplifies database interactions and enhances developer productivity, making it a preferred choice for building scalable and maintainable applications.</p><h3>Key Features of Mongoose</h3><p>Mongoose, as a robust Object Data Modeling (ODM) library for MongoDB and JavaScript, offers several key features that streamline the development process and enhance data management. Its schema definition capability allows developers to establish clear data structures, data types, and validation rules for each field, ensuring data consistency and integrity. With a robust validation mechanism, Mongoose validates data against predefined rules, maintaining data quality and adherence to standards.</p><p>Moreover, Mongoose introduces middleware and hooks, empowering developers to implement custom logic before or after specific database operations, thereby enhancing flexibility and control over data manipulation. The library’s fluent API for query building simplifies the process of fetching data from the database, facilitating complex queries with ease.</p><p>Additionally, Mongoose supports population, enabling seamless referencing and retrieval of documents from other collections, which simplifies data relationships and enhances data retrieval efficiency. Lastly, Mongoose’s data casting feature automatically converts data types to match the schema, mitigating the risk of data type errors and ensuring data consistency throughout the application. These features collectively make Mongoose a powerful tool for building scalable and maintainable applications on top of MongoDB databases.</p><h3>MongoDB vs. Mongoose: Key Differences</h3><p><strong>Database Interaction</strong>:</p><ul><li>MongoDB: Schema-less design allows for flexible data storage without predefined structures, ideal for evolving data requirements.</li><li>Mongoose: Introduces schemas for structured data modeling and validation, ensuring consistency and integrity, particularly beneficial for maintaining a consistent data model.</li></ul><p><strong>Data Modeling and Validation</strong>:</p><ul><li>MongoDB: Schema-less nature permits storage of varied data types within the same collection, offering flexibility but requiring careful maintenance.</li><li>Mongoose: Enforces schemas for organized data modeling and validation, reducing errors and enhancing integrity, suitable for projects requiring strict data adherence.</li></ul><p><strong>Querying and Population</strong>:</p><ul><li>MongoDB: Offers a robust query language for versatile data retrieval, albeit with a potentially steeper learning curve.</li><li>Mongoose: Provides an intuitive API for simplified querying and introduces “population” for effortless referencing of documents from other collections.</li></ul><p><strong>Middleware and Hooks</strong>:</p><ul><li>MongoDB: Lacks built-in support for middleware and hooks, limiting customization options for data processing.</li><li>Mongoose: Offers middleware and hooks functionality, enabling developers to intercept and manipulate data before and after database operations, facilitating custom logic implementation.</li></ul><p><strong>Abstraction and Productivity</strong>:</p><ul><li>MongoDB: Requires developers to handle validation, schema management, and middleware at the application level, offering minimal abstraction.</li><li>Mongoose: Provides higher abstraction and a developer-friendly environment by managing validation, schema, and middleware, enhancing productivity and simplifying development tasks.</li></ul><h3>Use Cases for MongoDB</h3><p>MongoDB’s versatility makes it well-suited for a variety of use cases, including Content Management Systems (CMS), real-time analytics, and Internet of Things (IoT) applications. Its schema-less design and flexible data model make it ideal for CMS, where content types can vary significantly, and additional attributes can be added dynamically without disrupting existing data structures.</p><p>For real-time analytics, MongoDB’s speed and scalability enable efficient processing of large volumes of rapidly changing data, such as social media streams or IoT sensor data, facilitating data-driven decision-making. Moreover, MongoDB’s ability to handle unstructured data with ease makes it a powerful tool for IoT applications, where diverse data formats and structures are common. Its geospatial capabilities further enhance its suitability for IoT applications requiring location-based data tracking and management.</p><h3>Use Cases for Mongoose</h3><p>Mongoose’s schema enforcement makes it an excellent choice for a variety of use cases, including e-commerce platforms, collaborative applications, and data-intensive applications.</p><p>For e-commerce platforms, Mongoose’s structured data model ensures the accuracy and integrity of product information by enforcing a predefined schema for product details. This simplifies data retrieval and manipulation, reducing the risk of inconsistent or incorrect product data.</p><p>In collaborative applications, Mongoose’s schema brings uniformity to data modeling and interactions, promoting consistency and maintaining data integrity among multiple developers. By enforcing a predefined schema, developers can better understand the data structure, reducing misunderstandings during data access and modification.</p><p>For data-intensive applications handling sensitive information or requiring strict schema validation, Mongoose’s robust schema and validation capabilities ensure data accuracy and adherence to predefined rules. Whether managing financial transactions or user authentication systems, Mongoose helps maintain data consistency and security throughout the application.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d5b4096dcefa" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Database Management System]]></title>
            <link>https://medium.com/@asirreshmi0103/database-management-system-f9f56c1040b7?source=rss-145d7a6ce7e6------2</link>
            <guid isPermaLink="false">https://medium.com/p/f9f56c1040b7</guid>
            <dc:creator><![CDATA[Asir Reshmi]]></dc:creator>
            <pubDate>Sun, 03 Mar 2024 04:22:43 GMT</pubDate>
            <atom:updated>2024-03-03T04:22:43.979Z</atom:updated>
            <content:encoded><![CDATA[<p>A database management system (DBMS) is system software designed for creating, maintaining, and managing databases. Its primary function is to enable end users to perform various operations such as creating, reading, updating, and deleting data within a database. Acting as an intermediary between databases and users or application programs, a DBMS ensures that data is efficiently organized, protected, and remains readily accessible. As the most prevalent type of data management platform, DBMS plays a crucial role in ensuring data integrity, security, and reliability within organizations and across various applications.</p><h3>What does a DBMS do?</h3><p>The database management system (DBMS) comprises three essential components: data management, database engine, and database schema. These elements collectively facilitate concurrency, security, data integrity, and standardized data administration procedures. The DBMS undertakes various database administration tasks such as change management, performance monitoring, security enforcement, and backup and recovery. Additionally, it manages automated rollbacks, restarts, logging, and auditing activities within databases and associated applications.</p><p>By offering a centralized view of data accessible to multiple users from diverse locations in a controlled manner, the DBMS ensures data security and consistency. It enables the imposition of restrictions on data access and presentation, allowing for multiple views of a single database schema. Consequently, end users and software programs are relieved from the burden of understanding the physical location or storage medium of data, as the DBMS manages all requests seamlessly.</p><p>Furthermore, the DBMS provides both logical and physical data independence, shielding users and applications from the complexities of data storage and structural changes. Through its application programming interface (API), developers can interact with the database without the need for constant modifications, even if alterations are made to the database’s physical structure. This ensures seamless integration and operation of applications with minimal disruption.</p><p>Popular database models and management systems include RDBMS, NoSQL DBMS, NewSQL DBMS, in-memory DBMS, columnar DBMS, multimodel DBMS and cloud DBMS.</p><p>Using a Database Management System (DBMS) offers a multitude of benefits, which contribute to efficient data management and streamlined operations within an organization. Some of the key benefits include:</p><ol><li><strong>Data Organization and Storage</strong>: A DBMS provides a structured mechanism for organizing and storing data in a centralized location. This ensures data consistency, reduces redundancy, and facilitates easier retrieval and manipulation of data.</li><li><strong>Data Integrity</strong>: DBMS systems typically incorporate mechanisms to enforce data integrity constraints, ensuring that the data stored in the database remains accurate and reliable. This includes features such as primary keys, foreign keys, and data validation rules.</li><li><strong>Data Security</strong>: DBMS systems offer robust security features to protect sensitive data from unauthorized access, ensuring that only authorized users can access and modify the data. This includes user authentication, access control, and encryption techniques to safeguard data confidentiality.</li><li><strong>Concurrency Control</strong>: DBMS systems implement concurrency control mechanisms to manage simultaneous access to data by multiple users or applications. This ensures that transactions are executed in a controlled manner, preventing data inconsistencies and conflicts.</li><li><strong>Data Backup and Recovery</strong>: DBMS systems facilitate automated backup and recovery mechanisms to safeguard against data loss in the event of hardware failures, system crashes, or other disasters. This ensures business continuity and minimizes the risk of data loss.</li><li><strong>Data Consistency and Accuracy</strong>: With features such as transactions and ACID (Atomicity, Consistency, Isolation, Durability) properties, DBMS systems ensure that data modifications are carried out reliably and consistently, maintaining data accuracy and integrity.</li><li><strong>Scalability and Performance</strong>: DBMS systems are designed to handle large volumes of data and support scalability to accommodate growing data needs. Additionally, they optimize query execution and performance through indexing, query optimization, and caching mechanisms.</li><li><strong>Data Sharing and Collaboration</strong>: DBMS systems facilitate data sharing and collaboration among users and applications by providing centralized access to data. This promotes collaboration, data sharing, and integration across different departments and teams within an organization.</li><li><strong>Data Independence</strong>: DBMS systems offer both logical and physical data independence, allowing applications to interact with the data without being dependent on the underlying database structure or storage implementation. This simplifies application development and maintenance.</li><li><strong>Compliance and Regulation</strong>: DBMS systems help organizations comply with regulatory requirements and data governance policies by enforcing data privacy, security, and auditing standards. This ensures that organizations adhere to legal and regulatory guidelines related to data management and protection.</li></ol><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f9f56c1040b7" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[static webside]]></title>
            <link>https://medium.com/@asirreshmi0103/static-webside-d4fa2202d348?source=rss-145d7a6ce7e6------2</link>
            <guid isPermaLink="false">https://medium.com/p/d4fa2202d348</guid>
            <dc:creator><![CDATA[Asir Reshmi]]></dc:creator>
            <pubDate>Sun, 25 Feb 2024 04:07:48 GMT</pubDate>
            <atom:updated>2024-02-25T04:07:48.840Z</atom:updated>
            <content:encoded><![CDATA[<p>A static website is a type of website that displays fixed content to all users and does not change unless manually updated by a web developer. In a static website, the content is typically written directly in HTML, CSS, and possibly JavaScript files, and these files are stored on a web server. When a user visits a static website, the web server simply serves the pre-existing HTML files to the user’s web browser without any further processing.</p><p>Key characteristics of static websites</p><ol><li><strong>Fixed Content</strong>: The content of a static website remains the same for all users and does not change dynamically based on user interactions or other factors.</li><li><strong>Simple Structure</strong>: Static websites are often straightforward in structure, consisting of HTML pages linked together through navigation menus and hyperlinks.</li><li><strong>Fast Loading</strong>: Because static websites serve pre-built HTML files, they tend to load quickly since there is no need for server-side processing or database queries.</li><li><strong>Ease of Hosting</strong>: Static websites can be hosted on simple web servers without the need for advanced server-side technologies or databases.</li><li><strong>Limited Interactivity</strong>: Static websites typically lack interactive features such as user login systems, dynamic forms, or real-time updates, as these require server-side processing.</li></ol><p>Static websites are suitable for simple web presences such as personal blogs, portfolios, landing pages, or small business websites that do not require frequent updates or dynamic content. They are easy to create, cost-effective to host, and straightforward to maintain, making them a popular choice for many individuals and small businesses. However, they may not be suitable for websites that require frequent content updates, personalized user experiences, or advanced functionality.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d4fa2202d348" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Dainamic Webside]]></title>
            <link>https://medium.com/@asirreshmi0103/dainamic-webside-e42b93e5dff7?source=rss-145d7a6ce7e6------2</link>
            <guid isPermaLink="false">https://medium.com/p/e42b93e5dff7</guid>
            <dc:creator><![CDATA[Asir Reshmi]]></dc:creator>
            <pubDate>Sun, 25 Feb 2024 03:51:04 GMT</pubDate>
            <atom:updated>2024-02-25T04:02:14.745Z</atom:updated>
            <content:encoded><![CDATA[<p>A dynamic website is a type of website where the content can change or update dynamically, often in response to user interactions or external data. Unlike static websites, which display the same information to all users and don’t change unless manually updated, dynamic websites can generate content on-the-fly.</p><p>Dynamic websites typically use server-side technologies such as PHP, Python, Ruby on Rails, or Node.js to process user requests and generate HTML content dynamically. They often interact with databases to retrieve and store information, allowing for personalized user experiences, real-time updates, and data-driven content.</p><p>Examples of dynamic website features include user authentication, content management systems (CMS), e-commerce functionality, real-time updates like news feeds or social media streams, interactive web applications such as forms or calculators, and much more.</p><p>In essence, dynamic websites are more interactive and adaptable, making them suitable for applications where content needs to be personalized, frequently updated, or responsive to user actions.</p><p>Dynamic websites operate by processing user requests through server-side scripting, which can involve interacting with databases to retrieve or update information. Server-side scripts generate dynamic HTML content based on these interactions, which is then sent to the user’s browser. Client-side scripting, often using JavaScript, enhances interactivity and responsiveness. Users interact with the webpage, triggering new requests and updates, ensuring the site remains up-to-date and responsive to user actions.</p><p>Dynamic Website Elements<br> .Responsive page elements<br> .Localization<br> .Personalized suggestions<br> .Integrating social media or third-party content<br> .Dynamic visual display</p><p>Dynamic Website Examples<br> .YouTube<br> .Google<br> .Facebook</p><p>Dynamic websites offer personalized user experiences, interactivity, and fresh content, making them suitable for various applications. They can tailor content based on user demographics and behavior, facilitate real-time updates, and handle high traffic. However, developing and maintaining dynamic websites requires technical expertise and resources, and they may suffer from performance and security issues. Despite these challenges, dynamic websites remain a powerful tool for engaging users and delivering dynamic content.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e42b93e5dff7" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What is a Computer Virus?]]></title>
            <link>https://medium.com/@asirreshmi0103/what-is-a-computer-virus-4dc5bce20752?source=rss-145d7a6ce7e6------2</link>
            <guid isPermaLink="false">https://medium.com/p/4dc5bce20752</guid>
            <dc:creator><![CDATA[Asir Reshmi]]></dc:creator>
            <pubDate>Sun, 18 Feb 2024 09:35:08 GMT</pubDate>
            <atom:updated>2024-02-18T09:35:08.610Z</atom:updated>
            <content:encoded><![CDATA[<p>A computer virus is a program which can harm our device and files and infect them for no further use. When a virus program is executed, it replicates itself by modifying other computer programs and instead enters its own coding. This code infects a file or program and if it spreads massively, it may ultimately result in crashing of the device.</p><p>Across the world, Computer viruses are a great issue of concern as they can cause billions of dollars’ worth harm to the economy each year.</p><p>Since the computer virus only hits the programming of the device, it is not visible. But there are certain indications which can help you analyse that a device is virus-hit. Given below are such signs which may help you identify computer viruses:</p><ul><li><strong>Speed of the System </strong>— In case a virus is completely executed into your device, the time taken to open applications may become longer and the entire system processing may start working slowly</li><li><strong>Pop-up Windows </strong>— One may start getting too many pop up windows on their screen which may be virus affected and harm the device even more</li><li><strong>Self Execution of Programs — </strong>Files or applications may start opening in the background of the system by themselves and you may not even know about them</li><li><strong>Log out from Accounts — </strong>In case of a virus attack, the probability of accounts getting hacked increase and password protected sites may also get hacked and you might get logged out from all of them</li><li><strong>Crashing of the Device </strong>— In most cases, if the virus spreads in maximum files and programs, there are chances that the entire device may crash and stop working</li></ul><p>The first thing which you might notice in case of virus attack is the speed with which your system shall process. And then gradually other changes can also be observed.</p><h3>Types of Computer Virus</h3><p>Discussed below are the different types of computer viruses:</p><ul><li><strong>Boot Sector Virus </strong>— It is a type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks. The Boot sector comprises all the files which are required to start the Operating system of the computer. The virus either overwrites the existing program or copies itself to another part of the disk.</li><li><strong>Direct Action Virus </strong>— When a virus attaches itself directly to a .exe or .com file and enters the device while its execution is called a Direct Action Virus. If it gets installed in the memory, it keeps itself hidden. It is also known as Non-Resident Virus.</li><li><strong>Resident Virus </strong>— A virus which saves itself in the memory of the computer and then infects other files and programs when its originating program is no longer working. This virus can easily infect other files because it is hidden in the memory and is hard to be removed from the system.</li><li><strong>Multipartite Virus </strong>— A virus which can attack both, the boot sector and the executable files of an already infected computer is called a multipartite virus. If a multipartite virus attacks your system, you are at risk of cyber threat.</li><li><strong>Overwrite Virus </strong>— One of the most harmful viruses, the overwrite virus can completely remove the existing program and replace it with the malicious code by overwriting it. Gradually it can completely replace the host’s programming code with the harmful code.</li><li><strong>Polymorphic Virus </strong>— Spread through spam and infected websites, the polymorphic virus are file infectors which are complex and are tough to detect. They create a modified or morphed version of the existing program and infect the system and retain the original code.</li><li><strong>File Infector Virus </strong>— As the name suggests, it first infects a single file and then later spreads itself to other executable files and programs. The main source of this virus are games and word processors.</li><li><strong>Spacefiller Virus </strong>— It is a rare type of virus which fills in the empty spaces of a file with viruses. It is known as cavity virus. It will neither affect the size of the file nor can be detected easily.</li><li><strong>Macro Virus </strong>— A virus written in the same macro language as used in the software program and infects the computer if a word processor file is opened. Mainly the source of such viruses is via emails.</li></ul><p>How To Protect Your Computer from Virus?</p><p>The most suitable way of making your computer virus-free is by installing an Anti-virus software. Such software help in removing the viruses from the device and can be installed in a computer via two means:</p><p>Online download<br> Buying an Anti-virus software and installing it</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=4dc5bce20752" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[OOP]]></title>
            <link>https://medium.com/@asirreshmi0103/oop-be80910236d7?source=rss-145d7a6ce7e6------2</link>
            <guid isPermaLink="false">https://medium.com/p/be80910236d7</guid>
            <dc:creator><![CDATA[Asir Reshmi]]></dc:creator>
            <pubDate>Sun, 18 Feb 2024 09:06:08 GMT</pubDate>
            <atom:updated>2024-02-18T09:08:53.434Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*o-NBdZdNDQdRBIox12ljgg.jpeg" /></figure><p>Object-oriented programming is a programming paradigm, or classification, that organizes a group of data attributes with functions or methods into a unit, known as an object. Typically, OOP languages are class-based, meaning a class defines the data attributes and functions as a blueprint for creating objects, which are instances of the class. One class may represent multiple independent objects, which interact with each other in complex ways.</p><p>Object-oriented programming contains various structures, known as the building blocks of OOP. These structures include:</p><ul><li>Class: A class is a data type that provides a framework for creating objects. You can define a class to create multiple objects without writing additional code.</li><li>Object: In OOP, an object represents an instance, or creation, of a class. Objects define specific data, such as properties and behaviors, to implement code.</li><li>Method: A method is a function that performs a task or action. For example, a method may return information about an object’s data.</li><li>Attribute: This structure stores information about an object and defines its state. You can define an attribute as part of the class.</li></ul><h3>4 Principal of object-oriented programing</h3><h3>1. Encapsulation</h3><p>Encapsulation means to enclose data by containing it within an object. In OOP, encapsulation forms a barrier around data to protect it from the rest of the code. You can perform encapsulation by binding the data and its functions into a class. This action conceals the private details of a class and only exposes the functionality essential for interfacing with it. When a class doesn’t allow direct access to its private data, it’s well-encapsulated</p><h3>2. Abstraction</h3><p>Abstraction refers to using simplified classes, rather than complex implementation code, to access objects. Often, it’s easier to design a program when you can separate the interface of a class from its implementation. In OOP, you can abstract the implementation details of a class and present a clean, easy-to-use interface through the class member functions. Abstraction helps isolate the impact of changes made to the code so if an error occurs, the change only affects the implementation details of a class and not the outside code.</p><h3>3. Inheritance</h3><p>Most object-oriented languages support inheritance, which means a new class automatically inhabits the same properties and functionalities as its parent class. Inheritance allows you to organize classes into hierarchies, where a class might have one or more parent or child classes. If a class has a parent class, it means the class has inherited the properties of the parent. The child class can also modify or extend the behavior of its parent class. Inheritance allows you to reuse code without redefining the functions of a child class.</p><h3>4. Polymorphism</h3><p>Polymorphism refers to creating objects with shared behaviors. In OOP, polymorphism allows for the uniform treatment of classes in a hierarchy. When you write code for objects at the root of the hierarchy, any objects created by a child class within the hierarchy have the same functions. Depending on the type of object, it may execute different behaviors.</p><h3>Benefits of object-oriented programming</h3><p>Object-oriented programming is a popular programming style in many languages. By defining sets of classes that represent and encapsulate objects in a program, OOP can organize classes into modules, improving the structure of software programs.It’s common for software devoloper to use OOP when creating complex programs because it allows them to define classes and their relationships. Other benefits of OOP include:</p><ul><li>Reusable code: The inheritance principle of OOP allows you to reuse code without writing it repeatedly. This feature can help to reduce errors when creating code.</li><li>Increased productivity: By creating objects from classes, you can save time when developing new software. You can also use libraries and reusable code to increase your productivity.</li><li>Enhanced security: You can use encapsulation and abstraction to display limited data while concealing sensitive information. These features can provide enhanced security when developing complex code.</li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=be80910236d7" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Difference between Parallel Computing and Distributed Computing]]></title>
            <link>https://medium.com/@asirreshmi0103/difference-between-parallel-computing-and-distributed-computing-29d538e85847?source=rss-145d7a6ce7e6------2</link>
            <guid isPermaLink="false">https://medium.com/p/29d538e85847</guid>
            <dc:creator><![CDATA[Asir Reshmi]]></dc:creator>
            <pubDate>Sun, 11 Feb 2024 13:21:16 GMT</pubDate>
            <atom:updated>2024-02-11T13:21:16.096Z</atom:updated>
            <content:encoded><![CDATA[<p>Parallel Computing</p><p>In parallel computing multiple processors performs multiple tasks assigned to them simultaneously. Memory in parallel systems can either be shared or distributed. Parallel computing provides concurrency and saves time and money.</p><ul><li>Many operations are performed simultaneously</li><li>Single computer is required</li><li>Multiple processors perform multiple operations</li><li>It may have shared or distributed memory</li><li>Processors communicate with each other through bus</li></ul><p>Distributed Computing</p><p>In distributed computing we have multiple autonomous computers which seems to the user as single system. In distributed systems there is no shared memory and computers communicate with each other through message passing. In distributed computing a single task is divided among different computers.</p><ul><li>System components are located at different locations</li><li>Uses multiple computers</li><li>Multiple computers perform multiple operations</li><li>It have only distributed memory</li><li>Computer communicate with each other through message passing.</li><li>Improves system scalability, fault tolerance and resource sharing capabilities</li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=29d538e85847" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Difference between Hardware and Middle ware]]></title>
            <link>https://medium.com/@asirreshmi0103/difference-between-hardware-and-middle-ware-b654d1f46381?source=rss-145d7a6ce7e6------2</link>
            <guid isPermaLink="false">https://medium.com/p/b654d1f46381</guid>
            <dc:creator><![CDATA[Asir Reshmi]]></dc:creator>
            <pubDate>Sun, 11 Feb 2024 13:14:09 GMT</pubDate>
            <atom:updated>2024-02-11T13:14:09.679Z</atom:updated>
            <content:encoded><![CDATA[<p><strong>Hardware :</strong> Hardware, as name suggest, are simply physical component of computer i.e. input device, processing devices, output devices and storage devices as well as make computer device work and execute tasks</p><ul><li>Hardware are physical parts or devices or components that together makes computer system.</li><li>It is used to facilitate computing operations along with taking input and output or storing computed results.</li><li>Features of hardware includes processor, disk space, memory, usability, etc.</li><li>Benefits of hardware includes reduce costs, improve customer service, develop effective communication, increase efficiency, etc.</li><li>Its main purpose is make computer system work efficiently.</li><li>Hardware’s are important for computer to work properly and computer cannot function without computer hardware’s.</li><li>Hardware are hard, physical and can be touched.</li><li>Hardware’s are mostly visible.</li><li>Hardware’s are designed to support functions such as input, processing, output, secondary storage and communication.</li></ul><p><strong>Middle ware :</strong> Middle ware, as name suggests, are simply a type of software that handle various functions such as data management, application services, authentication, API management, etc. and provide services to application.</p><ul><li>Middle ware are software lies between operating system and application.</li><li>it provide common services and capabilities to application other than what’s offered by operating system.</li><li>eatures of middle ware includes reusability, self-discovery, self-configuration, flexibility, integration, etc.</li><li>Benefits of middle ware includes streamline process, improve efficiency, create different types of networked application, etc.</li><li>Its main purpose is to enable communication and data management for distributed applications and connects two software together.</li><li>Middle ware support modern and popular run times for a variety of uses cases and that’s why it is important.</li><li>Middle ware are software’s that cannot be touched.</li><li>Middle ware’s are mostly invisible.</li><li>Middle ware’s are designed to support number of application architectures and eliminate difficulty of integration.</li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=b654d1f46381" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Advantages and Disadvantages of laptop]]></title>
            <link>https://medium.com/@asirreshmi0103/advantages-and-disadvantages-of-laptop-b39842e9c9e6?source=rss-145d7a6ce7e6------2</link>
            <guid isPermaLink="false">https://medium.com/p/b39842e9c9e6</guid>
            <dc:creator><![CDATA[Asir Reshmi]]></dc:creator>
            <pubDate>Sun, 11 Feb 2024 13:02:13 GMT</pubDate>
            <atom:updated>2024-02-11T13:02:13.574Z</atom:updated>
            <content:encoded><![CDATA[<p><strong>Advantages of Laptops :</strong></p><p><strong>Mobility –</strong><br>The main advantage of a laptop, as compared with a stationary computer, is its mobility. The lightweight, compact size, the built-in battery within the laptop allowing it to simply move from one place to a different one. Many models are often worn in the least times, utilized in a park, cafe, or carted during a car.</p><p><strong>Finished product –</strong><br>The laptop is straightforward to use with none additional devices. It’s everything like its own keyboard, built-in mouse (touchpad), built-in speakers, built-in microphone, many laptops have a built-in camera.</p><p><strong>Internet access –</strong><br>Internet access is the second advantage for the increase in demand for the laptop because it provides the power to access the web through wireless technology Wi-Fi.</p><p><strong>Offline operation –</strong><br>The laptop is additionally convenient to use for all types of presentations. In this case, you are doing not dependent upon the technical equipment of the venue. As the laptop can work offline from its battery so no need to connect from the mains.</p><p><strong>Instant –</strong><br>Usually carrying a laptop means your ticket to instant access to information, be it personal or professional. It results in better collaboration between co-workers or students.</p><p><strong>Disadvantages of Laptops :</strong></p><p><strong>Frequent Upgrades –</strong><br>The laptops are difficult to upgrade thanks to their integrated design. The sole parts which will be upgraded are hard disc and memory as these are the sole parts that are accessible to the user. It’s very difficult to repair it. As every laptop has its own proprietary design and construction, they’re difficult to upgrade. Additionally, they need a high maintenance cost too.</p><p><strong>Higher price –</strong><br>The laptops are costly as compared to PC, because the smaller components required by the laptop come costly.</p><p><strong>Difficulty in customization –</strong><br>The laptop doesn’t offer an option for personalization consistent with one’s requirements. The laptop only gives access to the computer’s memory and disk drive. The opposite components like processors, graphics cards, and cooling systems aren’t easy to access and replace. So, when one among the laptop’s non-customization components becomes obsolete then you’ll need to buy a replacement laptop to stay up with the technology.</p><p><strong>Highly insecure –</strong><br>The laptops are generally stolen thanks to their heavy cost. The thieves may misuse the stolen business data or personal data which will convince be very dangerous. Hence, both the physical protection of laptops and the safeguarding of knowledge are very important.</p><p><strong>Health issues –</strong><br>Prolonged use of laptops can cause RSI thanks to their flat keyboard and track pad pointing devices. The integrated screen of the Laptop often causes the users to hunch for a far better view than can cause neck or spinal injuries.</p><p><strong>Durability –</strong><br>Thanks to their high portability laptops are subject to more wear and tear. Laptop components like screen hinges, latches, and power jacks are susceptible to deteriorate gradually thanks to ordinary use.</p><p><strong>Video Cards — </strong>It is easier to run as many video cards as possible on a desktop at a time, but laptops have a lot of limitations when it comes to the use of video cards because laptops are not compatible with the consumption of high power and may lead to permanent damage.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=b39842e9c9e6" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>