Type to SearchView Tags
Technology | Engineering R&D

Category blogs - Featured

Blog Category Listing

OPAF – The Industry Game Changes in DCS Market
64
The objective of Open Process Automation Forum (OPAF) Objective is to create /select standards and specifications for an open, interoperable, secure process automation architecture so end-users of controls systems can choose the modules offered by...
Blockchain
193
When someone thinks of the word ‘Blockchain’, the first thing that comes to their mind is “Bitcoin” or “Cryptocurrency”. No doubt, it was bitcoin’s success which brought Blockchain technology into the limelight. But Blockchain is the under-the-hood...
Collaboration at Telco Edge
112

Jun 11, 2021

Collaboration at Telco Edge

Anchal Sardana Associate General Manager

The promise of stringent low latency use cases in 5G can be only fulfilled by MEC. It’s an enabler in 5G to provide an enhanced customer experience and plays a crucial role in making new age digital services like autonomous car, AR/VR gaming, drone...
covid-19
111
The new paradigm of health care – Proactive and Preventive health care is the new paradigm. The proliferation of consumer devices - smartphones, smartwatches, fit bits, handheld devices are changing the health care industry. One of the significant...
Artificial Neural Network, Neural Architecture Search
130
Normal machine learning or deep learning applications with human intervention in feature selection provides a maximum accuracy of 70% or 80% for computer vision or big datasets. This is mainly due to poor feature selection, because of which the size...
Artificial Neural Network, Neural Architecture Search
142
Artificial neural network (ANN) is hot topic of research now, as there is no guarantee that a specific ANN model will give good accuracy for a problem. So, we need an appropriate architecture for neural system instead of repeated trial and error...
Oauth2.0 – Token based Authorization
106
Oauth 2.0 (Open authorization), is an approval to grant/delegate access. It is meant for a service to authorize another service with more security. It is a token-based authorization where authorization code and access token is generated to access...
A non-invasive approach for early diagnosis of retinal diseases
91
This blog proposes a non-invasive electrophysiology test for early diagnosis of retinal disorders, its procedure and advantages. This blog presents an overview of how retina functions, retinal disorders, some of the existing methodologies for...
Keycloak Multitenancy
1,096

May 13, 2021

Keycloak Multitenancy

Cheshta Attri Technical Lead

In multitenant applications, a single software instance can serve multiple tenants (users) or organizations. Each user’s data is isolated and cannot be accessed by others on the same software instance. Multitenancy maximizes resource sharing, allows...
Keycloak Multitenancy
1,096

May 13, 2021

Keycloak Multitenancy

Cheshta Attri Technical Lead

In multitenant applications, a single software instance can serve multiple tenants (users) or organizations. Each user’s data is isolated and cannot be accessed by others on the same software instance. Multitenancy maximizes resource sharing, allows...
Elatic vs Solar
15,540

Jul 26, 2016

ElasticSearch Vs Solr

Anil Rawat Lead Engineer , Engineering R & D Services

In big data search , primary choices are Elasticsearch and Solr that are open source enterprise search platforms and have the ability to perform full-text searches and faceted searches. In this blog, we take a deeper look and compare these two...
JProfiler
11,482
JProfiler is a Java profiler tool and is useful for developers/testers as it can be used to analyze performance bottlenecks, memory leaks, CPU loads and resolve threading issues.
Right Sensors for Object Tracking
6,623
Choosing right sensor for tracking objects is really important and there are many criteria to determine which sensor should be used. Read more on how sensors are classified based on property:
How to make a light, cheap solar powered car
4,749

Feb 04, 2015

How to develop a light-weight, cost-effective solar powered car

Sushant Kumar Member Technical Staff, Engineering And R&D Services

Through this blog, I would like to propose a basic idea for designing and developing a light-weight, cost-effective single seater solar car, and also discuss the various technologies involved  in this project, which  offers great scope f
Blockchain
193
When someone thinks of the word ‘Blockchain’, the first thing that comes to their mind is “Bitcoin” or “Cryptocurrency”. No doubt, it was bitcoin’s success which brought Blockchain technology into the limelight. But Blockchain is the under-the-hood...
Multihoming
1,960

Apr 15, 2016

What is Multihoming?

Jayaramakrishnan Sundararaj Technical Manager

Oauth2.0 – Token based Authorization
106
Oauth 2.0 (Open authorization), is an approval to grant/delegate access. It is meant for a service to authorize another service with more security. It is a token-based authorization where authorization code and access token is generated to access...

MongoDB in Big Data Analytics Applications
Raghavendra Ganji - Big Data Analytics CoE | March 18, 2016
3470 Views

bigdata

Automation – A Requirement or Necessity?
Rabia Sharma | March 18, 2016
919 Views

Automation

In today’s world, where things keep on changing on daily basis and we sometimes find it hard to adjust with the changing needs and scenarios, automation does play an important role for continuous delivery. QA being the gatekeepers, are not only limited to perform manual testing but also play an important role in designing frameworks and implementing test scenarios programmatically.


Improving Efficiency Of Vulnerability Assessment In NFV Based Cloud Networks
Saurabh Sharda - Senior Technical Specialist | March 3, 2016
891 Views

The concept of virtualizing the network equipment is picking up fast. Popularly known as Network Function Virtualization (NFV), this concept aims to virtualize network functions by running them as software on standard server grade hardware and do away with previously used proprietary equipment. The Specification group for NFV is being worked upon by the European Telecommunications Standards Institute (ETSI) and is made up of representatives from several leading telecommunication industries.